Secure communications in cognitive underlay networks over Nakagami-m channel

NP Nguyen, TL Thanh, TQ Duong… - Physical Communication, 2017 - Elsevier
In this paper, the secure communication of a cognitive radio network (CRN) over Nakagami-
m fading channel is investigated. An underlay protocol is used in the considered network …

Secrecy Outage Analysis for SIMO Underlay Cognitive Radio Networks over Generalized- Fading Channels

H Lei, H Zhang, IS Ansari, G Pan… - IEEE Signal Processing …, 2016 - ieeexplore.ieee.org
In this letter, we consider a single-input multiple-output cognitive wiretap system over
generalized-K channels, where the eavesdropper overhears the transmission from the …

Optimal transmission with artificial noise in MISOME wiretap channels

N Yang, M Elkashlan, TQ Duong… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We investigate the optimal physical-layer secure transmission with artificial noise in the
wiretap channel with N antennas at the transmitter, a single antenna at the receiver, and M …

On secrecy performance of multiantenna-jammer-aided secure communications with imperfect CSI

X Chen, J Chen, H Zhang, Y Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, secure communication aided by a multiantenna cooperative jammer is
investigated. Under very practical but adverse assumptions, ie, no instantaneous jammer …

Secure communications with untrusted secondary nodes in cognitive radio networks

H Jeon, SW McLaughlin, IM Kim… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We consider a cooperation scenario between primary users and untrusted secondary users
in cognitive radio networks. The secondary users are willing to help the primary users to …

Wireless physical-layer security with multiple receivers and eavesdroppers: Outage probability and average secrecy capacity

Y Chen, W Li, H Shu - … on Personal, Indoor, and Mobile Radio …, 2015 - ieeexplore.ieee.org
The wiretap channel model in a wireless scenario is analyzed where there is a transmitter,
multiple legitimate receivers, non-colluding and colluding eavesdroppers; each of them is …

On the secrecy outage probability and performance trade-off of the multi-hop cognitive relay networks

MN Pham - Telecommunication Systems, 2020 - Springer
We study the physical-layer security of multi-hop secondary network under spectrum sharing
constraint caused by the primary, which consists of many simultaneously independent direct …

Cognitive radio network with secrecy and interference constraints

H Tran, G Kaddoum, F Gagnon, L Sibomana - Physical Communication, 2017 - Elsevier
In this paper, we investigate the physical-layer security of a secure communication in single-
input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two …

A versatile secure transmission strategy in the presence of outdated CSI

J Hu, N Yang, X Zhou, W Yang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We study secure transmission considering the practical scenario in which only outdated
knowledge of the legitimate receiver's channel and statistical knowledge of the …

Secrecy analysis of cooperative vehicular relaying networks over double-Rayleigh fading channels

A Pandey, S Yadav - Wireless Personal Communications, 2020 - Springer
In this paper, we investigate physical-layer security performance of the cooperative vehicular
relaying networks, wherein the communication from a source vehicle to the destination …