Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed …
VD Nguyen, TM Hoang, OS Shin - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
With fast growth of wireless services, secrecy has become an increasingly important issue for wireless networks. In this paper, we investigate the secrecy capacity of the primary …
X Hu, X Zhang, H Huang, Y Li - 2016 IEEE 27th Annual …, 2016 - ieeexplore.ieee.org
This paper studies the physical layer security (PLS) in an underlay cognitive radio (CR) network. Under an interference constraint set by the primary user, we propose a secure …
X Xu, B He, W Yang, X Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter …
Wireless communication systems are vulnerable to eavesdropping attack in which the attacker overhear the transmitted data in the network. Hence, the physical-layer security is of …
In this paper, we present a method of utilizing channel diversity to improve the secrecy outage probability and the intercept probability in a cognitive radio (CR) network. With the …
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage multitier hierarchical networks. Securing data transmission in these networks is of the utmost …
J Bai, X Tao, J Xu, Q Cui - IEEE communications letters, 2014 - ieeexplore.ieee.org
Motivated by information-theoretic security, the Poisson model for secure connectivity in stochastic networks has recently received great attention. Although several expressions for …
In this paper, we investigate the physical-layer security of a secure communication in single- input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two …