On physical layer security for cognitive radio networks with primary user interference

L Sibomana, H Tran… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
layer security under the outage constraint of the primary user (PU) receiver and interference
from … In particular, a secondary user (SU) transmitter sends confidential messages to trusted …

A collaboration incentive exploiting the primary-secondary systems' cross interference for PHY security enhancement

K Tourki, MO Hasna - IEEE Journal of Selected Topics in Signal …, 2016 - ieeexplore.ieee.org
… incentive to enhance the physical layer security. The concept behind is that a legitimate …
pair, referred to as primary network (PN), as a reward. Meanwhile, the ST has to secure its own …

Enhancing security of primary user in underlay cognitive radio networks with secondary user selection

M Qin, S Yang, H Deng, MH Lee - IEEE Access, 2018 - ieeexplore.ieee.org
… secondary user selection to enhance the security of primary users… In order to achieve multiuser
gain, two secondary user … the interference at primary user via secondary user selection in …

On physical layer security for cognitive radio networks

Z Shu, Y Qian, S Ci - IEEE Network, 2013 - ieeexplore.ieee.org
… in order to calculate the interference from the secondary users to the primary users and the
… and IP is the interference power at the primary receiver from the secondary users. We now …

Improving physical‐layer security for primary users in cognitive radio networks

D Xu, Q Li - IET Communications, 2017 - Wiley Online Library
… -layer security in a cognitive radio network where both the secondary user (SU) and the primary
user (PU) are facing security … as a friendly jammer to interfere with the eavesdroppers by …

Physical layer security of a multiantenna-based CR network with single and multiple primary users

A Singh, MR Bhatnagar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… rate subject to interference power constraints at the primary user (PU) under available
channel knowledge. In [19], secure communications with untrusted secondary users in CR …

An overview and future directions on physical-layer security for cognitive radio networks

DH Tashman, W Hamouda - IEEE Network, 2020 - ieeexplore.ieee.org
… -layer security (PLS) for CRNs is provided. Some of the major attacks over the physical layer
of CRN are presented, such as primary user … not to exceed the interference level that the PU …

Physical layer security in the presence of interference

DS Karas, AAA Boulogeorgos… - IEEE Wireless …, 2017 - ieeexplore.ieee.org
We evaluate and quantify the joint effect of fading and multiple interferers on the physical-layer
(PHY) security of a system consisting of a base-station (BS), a legitimate user, and an …

A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

J Marinho, J Granjal, E Monteiro - … Journal on Information Security, 2015 - Springer
… (DSA) approach [1], CR users, also designated as secondary users (SUs), are able to … way
to the primary users (PUs) and without causing them any harmful interference. The accurate …

Physical layer security issues in interference-alignment-based wireless networks

N Zhao, FR Yu, M Li, Q Yan… - IEEE Communications …, 2016 - ieeexplore.ieee.org
… Thus, in this article, the physical layer security issues of two primary attacks, jamming and …
jamming signal along with interference among users. Also, an AN scheme is proposed for the …