Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers

X Xu, B He, W Yang, X Zhou… - … Forensics and Security, 2015 - ieeexplore.ieee.org
… We consider the problem of secure communication between a secondary transmitter– … , we
design four transmission protocols to achieve the secure transmission in the CR network. We …

Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise

Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
… To enhance the secure transmission of the secondary network, we propose a simple and
decentralised transmission scheme, which jointly incorporates the secrecy guard zone and …

Robust secure transmission design for IRS-assisted mmWave cognitive radio networks

X Wu, J Ma, C Gu, X Xue, X Zeng - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… the secondary user (SU) by jointly designing the transmit BF at the CBS and reflect BF at the
IRS… As for the transmit BF at the CBS, we propose a heuristic robust transmit BF algorithm to …

Secure communication in cognitive radio networks

S Sanyal, R Bhadauria, C Ghosh - 2009 4th International …, 2009 - ieeexplore.ieee.org
… communication is required to connect and provide transmission, processing, recording and
… consider all these stages of security envisioned and facilitated by a cognitive radio network. …

Exploiting deep learning for secure transmission in an underlay cognitive radio network

M Zhang, K Cumanan, J Thiyagalingam… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… for secure transmission in a cognitive radio (CR) network. In particular, a neural network (NN…
receiver under the constraints of total transmit power of secondary transmitter, and the …

Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers

X Hu, X Zhang, H Huang, Y Li - … , Indoor, and Mobile Radio …, 2016 - ieeexplore.ieee.org
security (PLS) in an underlay cognitive radio (CR) network. Under an interference constraint
set by the primary user, we propose a secure transmission … of its power to transmit jamming …

Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks

M Xu, T Jing, X Fan, Y Wen… - … and Networking …, 2018 - ieeexplore.ieee.org
… In this paper, we study secure transmission in CCRNs where energy harvesting enabled
SUs (may be selected as a relay or jammer) can assist PUs to improve the secrecy rate. For a …

On the security of cognitive radio networks

M Elkashlan, L Wang, TQ Duong… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Securing data transmission in these networks is of the utmost importance. In this paper…
secure the transmission at the physical layer, where the eavesdropper overhears the transmission

Secure transmission for NOMA-based cognitive radio networks with imperfect CSI

Z Shang, T Zhang, G Hu, Y Cai… - IEEE Communications …, 2021 - ieeexplore.ieee.org
… wireless networks [1]–[4]. Intuitively, the combination of NOMA and cognitive radio networks
(… promising solution to improve the system performance of next-generation wireless network. …

Secure communication over radio channels

S Dolev, S Gilbert, R Guerraoui… - Proceedings of the twenty …, 2008 - dl.acm.org
… We study the problem of secure communication in a multichannel, single-hop radio network
with a malicious adversary that can cause collisions and spoof messages. We assume no …