Secrecy in cognitive radio networks

F Gabry - 2014 - diva-portal.org
secrecy in wireless networks. In particular we investigate the cooperation between transmitters
in a cognitive radio network … of games between the primary network and the secondary …

Physical-layer security with multiuser scheduling in cognitive radio networks

Y Zou, X Wang, W Shen - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
… attacks in the cognitive radio network and propose the user … and maximizes the achievable
secrecy rate of cognitive transmissions … We analyze the achievable secrecy rate and intercept …

Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks

VD Nguyen, TQ Duong, OA Dobre… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
secrecy capacity of the secondary system, as well as to help the primary system improve the
secrecy capacity… [20] to improve the secrecy capacity of the primary system while satisfying …

Energy efficiency analysis of cooperative jamming in cognitive radio networks with secrecy constraints

F Gabry, A Zappone, R Thobaben… - IEEE Wireless …, 2015 - ieeexplore.ieee.org
… ; ie, the primary receiver is viewed as an eavesdropper from the secondary network perspective.
In this paper we investigate cooperation for secrecy in cognitive radio networks from an …

A note on the secrecy capacity of the multiple-antenna wiretap channel

T Liu, S Shamai - IEEE Transactions on Information Theory, 2009 - ieeexplore.ieee.org
… This paper presents an alternative characterization of the secrecy capacity of the multiple-antenna
wiretap channel under a more general matrix constraint on the channel input using a …

Secrecy capacity results for a secure NOMA-based cognitive radio network with an external eavesdropper

KA Mehr, JM Niya, H Seyedarabi, SK Nobar - Physical Communication, 2020 - Elsevier
… In this paper, we investigate a secure cognitive radio network (CRN), which deploys non-…
This scenario models a NOMA-based overlay cognitive radio paradigm with an external …

Secrecy outage performance of SWIPT cognitive radio network with imperfect CSI

A Singh, MR Bhatnagar, RK Mallik - IEEE Access, 2019 - ieeexplore.ieee.org
… cognitive radio network is derived with perfect CSI assumption, we explore the secrecy
performance under imperfect CSI conditions. Note that, impact of imperfect CSI on the secrecy

Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis

W Li, M Ghogho, B Chen… - IEEE Communications …, 2012 - ieeexplore.ieee.org
… Authors in [13] proposed a two-antenna full duplex radio design that uses a balun. The
transmit antenna transmits the positive signal, and to cancel self-interference, the radio combines …

Increasing the secrecy capacity by cooperation in wireless networks

N Marina, R Bose, A Hjørungnes - … , Indoor and Mobile Radio …, 2009 - ieeexplore.ieee.org
… We will see later that the secrecy capacity in the abovementioned region vanishes. That …
Secrecy Capacity In this section, we develop expressions for the secrecy capacity of the …

Secrecy capacity scaling of large-scale cognitive networks

Y Chen, J Zhang, X Wang, X Tian, W Wu, F Wu… - … ad hoc networking and …, 2014 - dl.acm.org
… that the secrecy capacity of the primary network is not affected, while the secondary network …
for overlaid wireless networks: A cognitive radio network versus a primary network,” IEEE/…