Enhancing security of primary user in underlay cognitive radio networks with secondary user selection

M Qin, S Yang, H Deng, MH Lee - IEEE Access, 2018 - ieeexplore.ieee.org
This paper investigates the effect of multiuser gain provided by the secondary user selection
on the secrecy performance of the primary users. We first propose a simple scheme where …

Physical-layer security with multiuser scheduling in cognitive radio networks

Y Zou, X Wang, W Shen - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we consider a cognitive radio network that consists of one cognitive base
station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers …

Secure communications in underlay cognitive radio networks: User scheduling and performance analysis

L Yang, H Jiang, SA Vorobyov, J Chen… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter investigates secure communications against eavesdropping in an underlay
cognitive radio network. The secondary users do not know the interference level that they …

On physical layer security for cognitive radio networks with primary user interference

L Sibomana, H Tran… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secondary network physical layer security under the outage
constraint of the primary user (PU) receiver and interference from the PU transmitter to the …

Physical layer security of underlay cognitive radio using maximal ratio combining

H Zhao, D Wang, C Tang, Y Liu, G Pan, T Li… - Frontiers of Information …, 2016 - Springer
We investigate the secrecy outage performance of maximal ratio combining (MRC) in
cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output …

Physical layer security in cognitive radio networks using improper Gaussian signaling

G Oliveira, E Fernandez, S Mafra… - IEEE …, 2018 - ieeexplore.ieee.org
We look into adopting improper Gaussian signaling (IGS) in order to enhance the secrecy
performance of an underlay cognitive radio network since in interference-limited networks …

Improving physical‐layer security for primary users in cognitive radio networks

D Xu, Q Li - IET Communications, 2017 - Wiley Online Library
In this study, the authors investigate the physical‐layer security in a cognitive radio network
where both the secondary user (SU) and the primary user (PU) are facing security threats …

Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints

TX Quach, H Tran, E Uhlemann, MT Truc - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio
Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are …

Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise

Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where
the primary users, the secondary users and the eavesdroppers are randomly distributed …

Physical layer security of a multiantenna-based CR network with single and multiple primary users

A Singh, MR Bhatnagar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we present a method of utilizing channel diversity to improve the secrecy
outage probability and the intercept probability in a cognitive radio (CR) network. With the …