A covert jamming scheme against an intelligent eavesdropper in cooperative cognitive radio networks

Y Wen, L Liu, J Li, X Hou, N Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In this work, we design a covert jamming scheme against an intelligent Eve towards physical
layer security in a cooperative cognitive radio networks. To protect the primary message …

Secrecy rate maximization for cooperative overlay cognitive radio networks with artificial noise

YY He, J Evans, S Dey - 2014 IEEE International Conference …, 2014 - ieeexplore.ieee.org
We consider physical-layer security in a novel MISO cooperative overlay cognitive radio
network (CRN) with a single eavesdropper. We aim to design an artificial noise (AN) aided …

Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks

Q Gao, Y Huo, L Ma, X Xing, X Cheng… - IET …, 2017 - Wiley Online Library
In this study, the authors investigate the problem of jammer selection (JS) for enhancing the
secrecy goodput in a cooperative cognitive radio network with the multiple‐input–multiple …

Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints

TX Quach, H Tran, E Uhlemann, MT Truc - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio
Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are …

Secure transmission in underlay cognitive radio network with outdated channel state information

S Thakur, A Singh - Physical Communication, 2019 - Elsevier
This paper investigates the secrecy performance of an underlay cognitive radio network
(CRN) with outdated channel state information (CSI) for two practical scenarios, ie, scenario …

Joint beamforming and power allocation for secure communication in cognitive radio networks

T Chen, HQ Yuan, TZ Zhao, ZS Zhang… - IET …, 2016 - Wiley Online Library
In this study, secure communication in cognitive radio networks is investigated. A
cooperative jammer is utilised to transmit artificial noise for interfering with the …

Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers

L Hu, H Wen, B Wu, J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice)
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …

A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks

Y Wen, Y Huo, L Ma, T Jing… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we consider a centralized cooperative cognitive radio network (CCRN), where
a primary base station sends a message to a primary user. Meanwhile, a secondary user …

Improving physical‐layer security for primary users in cognitive radio networks

D Xu, Q Li - IET Communications, 2017 - Wiley Online Library
In this study, the authors investigate the physical‐layer security in a cognitive radio network
where both the secondary user (SU) and the primary user (PU) are facing security threats …

Relay selection for improved security in cognitive relay networks with jamming

S Jia, J Zhang, H Zhao, R Zhang - IEEE Wireless …, 2017 - ieeexplore.ieee.org
In this letter, we consider an underlay cognitive radio network in which a secondary
transmitter (ST) communicates with a secondary destination (SD) with the aid of multiple …