Secrecy energy efficiency maximization in an underlying cognitive radio–NOMA system with a cooperative relay and an energy-harvesting user

CE Garcia, MR Camana, I Koo - Applied Sciences, 2020 - mdpi.com
Security is considered a critical issue in the deployment of 5G networks because of the
vulnerability of information that can be intercepted by eavesdroppers in wireless …

Enhancing physical-layer security for IoT with nonorthogonal multiple access assisted semi-grant-free transmission

K Cao, H Ding, B Wang, L Lv, J Tian… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Nonorthogonal multiple access (NOMA) assisted semi-grant-free transmission admits grant-
free users to access the channels otherwise solely occupied by grant-based users, and has …

Security performance analysis for power domain NOMA employing in cognitive radio networks

TA Hoang, CB Le, DT Do - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the
fundamental characteristics and it exhibits the possibility of users to decode the messages of …

[PDF][PDF] Trusted transmission: Strengthening security in CR-inspired RSMA systems amidst untrusted users

H Lei, D Sang, IS Ansari, N Saeed, G Pan… - Proc. 2024 IEEE …, 2024 - researchgate.net
This study investigates the secrecy performance of a rate-splitting multiple-access system
inspired by cognitive radio principles, where the primary user takes on the role of a potential …

Reliable and secure transmission in multiple antennas hybrid satellite-terrestrial cognitive networks relying on NOMA

HN Nguyen, NL Nguyen, NT Nguyen, AT Le… - IEEE …, 2020 - ieeexplore.ieee.org
We study a hybrid satellite-terrestrial cognitive network (HSTCN) relying on non-orthogonal
multiple access (NOMA) interconnecting a satellite and multiple terrestrial nodes. In this …

Multi-phase smart relaying and cooperative jamming in secure cognitive radio networks

PH Lin, F Gabry, R Thobaben… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, we investigate cooperative secure communications in a four-node cognitive
radio network where the secondary receiver is treated as a potential eavesdropper with …

Aided opportunistic jammer selection for secrecy improvement in underlay cognitive radio networks

P Xie, J Zhu, M Zhang, L Xing, G Zhang… - Wireless Personal …, 2019 - Springer
In this paper, we consider the physical-layer security for the primary system in an underlay
cognitive radio model which comprises of a primary source–destination pair, a secondary …

[PDF][PDF] Outage Probability and Intercept Probability Of Cognitive IoTs Networks With Relay Selection, Passive Eavesdropper and Hardware Noises.

PX Minh, N Van Hien, PQ Hop, TT Duy, NT Hieu… - RICE, 2022 - annals-csis.org
Recently, physical-layer security (PLS) has been reported in many literature (ie,[1]-[4]) as an
efficient approach to obtain security for wireless communication systems. For the secure …

Physical layer security in underlay CCRNs with fixed transmit power

S Wang, X Xu, W Yang - … on Internet and Information Systems (TIIS), 2015 - koreascience.kr
In this paper, we investigate physical layer security for multiple decode-and-forward (DF)
relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the …

Physical Layer Security for CRNs over Beaulieu‐Xie Fading Channels

Y Zeng, Y Hua, Y Fang, X Wang - … Communications and Mobile …, 2022 - Wiley Online Library
In recent years, the access of massive communication devices leads to the insufficient
spectrum resources of wireless networks. One of the practical means to resolve the problem …