Secure transmission using decode-and-forward protocol for underlay cognitive radio networks

NT Do, B An - … Conference on Ubiquitous and Future Networks, 2015 - ieeexplore.ieee.org
In this paper, we study the physical layer security for underlay cognitive radio network in the
presence of an eavesdropper that tries to intercept the secondary transmission. Specifically …

Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information

K Shim, NT Do, B An, SY Nam - 2016 International Conference …, 2016 - ieeexplore.ieee.org
In this paper, we consider a multi-hop decode-and-forward (DF) relaying transmission in
underlay cognitive radio networks. Considering the presence of an eavesdropper that …

Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels

M Bouabdellah, F El Bouanani… - 2018 International …, 2018 - ieeexplore.ieee.org
Wireless communication systems are vulnerable to eavesdropping attack in which the
attacker overhear the transmitted data in the network. Hence, the physical-layer security is of …

Secure performance analysis of buffer-aided cognitive relay networks

A Sun, T Liang, Y Zhang - 2015 IEEE International Conference …, 2015 - ieeexplore.ieee.org
The paper investigates a decode-and-forward buffer-aided relay selection for an underlay
cognitive radio network in the presence of an eavesdropper. The secondary users operating …

The underlay cooperative cognitive network with secure transmission

PN Son, HY Kong - 2014 27th Biennial Symposium on …, 2014 - ieeexplore.ieee.org
In this paper, we propose and analyze an underlay cooperative cognitive network with
Physical Layer Security where a best relay is selected based on maximizing end-to-end …

Relay selection scheme for improving the physical layer security in cognitive radio networks

M Al-jamali, A Al-Nahari… - 2015 23nd Signal …, 2015 - ieeexplore.ieee.org
The security in cognitive radio networks (CRNs) has been attracting continuously growing
attention, due to the open and dynamic nature of cognitive radio architecture. In this paper …

On physical layer security for reactive DF cognitive relay networks

L Sibomana, HJ Zepernick… - 2014 IEEE Globecom …, 2014 - ieeexplore.ieee.org
This paper analyzes the physical layer security for cognitive relay networks under the peak
interference power constraint of the primary user receiver. In particular, a secondary user …

Secrecy outage performance for dual-hop underlay cognitive radio system over Nakagami-m fading

M Bouabdellah, F El Bouanani… - Proceedings of the 2nd …, 2018 - dl.acm.org
In this paper, the security performance of a dual-hop underlay cognitive radio (CR) system is
investigated. In this system, we consider that the transmitted information by a source node S …

Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers

X Xu, B He, W Yang, X Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we study physical layer security in an underlay cognitive radio (CR) network.
We consider the problem of secure communication between a secondary transmitter …

Secrecy outage probability of minimum relay selection in multiple eavesdroppers DF cognitive radio networks

J Ding, Q Yang, J Yang - 2016 IEEE 83rd Vehicular Technology …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the secrecy outage probability in a dual-hop decode-and-
forward (DF) secondary cognitive radio network, which is equipped with one source, one …