SÖ Ata, E Erdogan - International Journal of Communication …, 2020 - Wiley Online Library
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the …
X Chen, L Guo, X Li, C Dong, J Lin… - IEEE …, 2018 - ieeexplore.ieee.org
In this paper, a novel wireless energy harvesting cooperative jammer (EH-CJ)-aided transmission scheme, which can enhance the security for cooperative cognitive radio …
Physical layer security protects the transmitted data by trying to prevent the information from reaching the adversary. Adding artificial noise (AN) to the transmitted data helps to achieve …
G Pan, H Lei, Y Deng, L Fan, J Yang… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) system, including one base station (BS) equipped with multiple …
R Su, Y Wang, R Sun - … on Personal, Indoor and Mobile Radio …, 2019 - ieeexplore.ieee.org
In this paper, we propose a destination-aided jamming scheme for secrecy simultaneous wireless information and power transfer (SWIPT) in cognitive relay networks. In which, an …
In this work, a multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) system including one base station (BS) equipped with multiple …
F Zhou, Z Li, J Cheng, Q Li, J Si - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A multiple-input single-output cognitive radio downlink network is studied with simultaneous wireless information and power transfer. In this network, a secondary user coexists with …
S Thakur, A Singh, S Majhi - IEEE Transactions on Cognitive …, 2023 - ieeexplore.ieee.org
The presence of correlated and imperfect channel state information (CSI) affects the secrecy performance of cognitive radio networks (CRN). In this paper, we propose a physical layer …
In this paper, the secure communication of a cognitive radio network (CRN) over Nakagami- m fading channel is investigated. An underlay protocol is used in the considered network …