Secure 5G downlink NOMA cognitive relay network: joint the impact of imperfect spectrum sensing and outdated CSI

M Zhang, X Wang, E Li, G Yang, X Wang - Wireless Networks, 2024 - Springer
This article studies the interweave cognitive network with non-orthogonal multiple access
(NOMA) principle under the appearance of one eavesdropper. The best relay selection …

Robust secure beamforming design for cooperative cognitive radio nonorthogonal multiple access networks

Q Li, S Zhao - Security and Communication Networks, 2021 - Wiley Online Library
By the integration of cooperative cognitive radio (CR) and nonorthogonal multiple access
(NOMA), cooperative CR NOMA networks can improve the spectrum efficiency of wireless …

Secrecy outage analysis by applying bi-directional beamforming in underlay MIMO-CRN

N Nandan, S Majhi - 2018 14th International Wireless …, 2018 - ieeexplore.ieee.org
This paper presents the optimal physical-layer security scheme of both primary user (PU)
and secondary user (SU) in the underlay multiple-input multiple-output cognitive-radio …

Reliability and security of CR-STAR-RIS-NOMA assisted IoT networks

X Li, J Zhang, C Han, W Hao, M Zeng… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The Internet-of-Things (IoT) has greatly facilitated our daily lives. Nevertheless, how to
achieve higher spectral efficiency, large-scale device access, and lower latency for the next …

On Secrecy Performance in Underlay Cognitive Radio Networks with EH and TAS over α-μ Channel

MA Khodeir, SM Alquran - 2022 13th International Conference …, 2022 - ieeexplore.ieee.org
This paper investigates the secrecy outage performance of Multiple Input Multiple Output
(MIMO) secondary nodes for underlay Cognitive Radio Network (CRN) over α–μ fading …

Improving Physical-Layer Security for Cognitive Networks via Artificial Noise-Aided Rate Splitting

P Yan, W Duan, Q Sun, G Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
This letter investigates secrecy performance for cognitive transmissions, where a secondary
user (SU) shares same spectrum with a primary user (PU) simultaneously ensuring the …

Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware …

P Tran Tin, D The Hung, TN Nguyen, TT Duy… - Entropy, 2019 - mdpi.com
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay
cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit …

Exploiting Secure Multihop Transmission in Underlying Cognitive Radio Networks: Analysis and Deep Learning Approaches

K Shim, B An - … on Artificial Intelligence in Information and …, 2023 - ieeexplore.ieee.org
This paper studies the impact of the eavesdropping attacks on secure multihop transmission
in cognitive radio networks. When secondary users transmit confidential information, the …

Secrecy outage performance with EH and TAS for realistic underlay cognitive radio networks using MIMO systems

MA Khodeir, SM Alquran - 2021 12th International Conference …, 2021 - ieeexplore.ieee.org
This work studies the physical layer security performance for Multiple Input Multiple Output
(MIMO) secondary nodes. The proposed model is assumed to operate in underlay Cognitive …

Secure short-packet communications in cognitive Internet of Things

Y Chen, Z Xiang, X Qiao, T Zhang… - 2020 IEEE 3rd …, 2020 - ieeexplore.ieee.org
To deal with the problem of spectrum scarcity in the Internet of Things (IoT), cognitive radio
technology is introduced into IoT, namely, cognitive IoT. This paper investigates the secrecy …