Y Zou, X Wang, W Shen - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers …
This letter investigates secure communications against eavesdropping in an underlay cognitive radio network. The secondary users do not know the interference level that they …
L Sibomana, H Tran… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secondary network physical layer security under the outage constraint of the primary user (PU) receiver and interference from the PU transmitter to the …
We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output …
We look into adopting improper Gaussian signaling (IGS) in order to enhance the secrecy performance of an underlay cognitive radio network since in interference-limited networks …
D Xu, Q Li - IET Communications, 2017 - Wiley Online Library
In this study, the authors investigate the physical‐layer security in a cognitive radio network where both the secondary user (SU) and the primary user (PU) are facing security threats …
TX Quach, H Tran, E Uhlemann, MT Truc - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are …
Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed …
In this paper, we present a method of utilizing channel diversity to improve the secrecy outage probability and the intercept probability in a cognitive radio (CR) network. With the …