Secure transmission in cognitive wiretap networks

T Zhang, Y Cai, Y Huang, C Zhong… - 2016 IEEE 83rd …, 2016 - ieeexplore.ieee.org
In this paper, we analyze the secrecy performance of multi-antenna cognitive wiretap
network, where the secondary transmitter (Alice) communicates with the secondary receiver …

On ergodic secrecy capacity of random wireless networks with protected zones

W Liu, Z Ding, T Ratnarajah… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we investigate physical-layer security in a random wireless network where
both legitimate and eavesdropping nodes are randomly deployed. In the first scenario, we …

Secure communication in multiantenna cognitive radio networks with imperfect channel state information

Y Pei, YC Liang, KC Teh, KH Li - IEEE Transactions on Signal …, 2011 - ieeexplore.ieee.org
In this paper, we address the issue of optimal transmitter design to achieve physical layer
security for a multiple-input single-output (MISO) cognitive radio network (CRN), in which a …

Physical layer security for primary system: A symbiotic approach in cooperative cognitive radio networks

VD Nguyen, TQ Duong, OS Shin - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
In this paper, we proposed a symbiotic approach for a secure primary network by allowing
the secondary users to send the jamming noise to degrade the wiretap ability of the …

Restricting passive attacks in 6G vehicular networks: a physical layer security perspective

S Kavaiya, DK Patel - Wireless Networks, 2023 - Springer
Modern wireless technologies confirm the massive connectivity with sufficient data rate in
intelligent transportation systems. Passive attacks may compromise the user's transmission …

Secrecy performance of underlay cognitive radio networks with primary interference

S Thakur, A Singh - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
This work explores the physical layer security of an underlay cognitive radio network (CRN)
in the presence of a powerful interferer called a primary transmitter (PT) under peak …

Secrecy outage performance analysis of DF cognitive relay network with co-channel interference

Q Yang, J Ding, A Hu - Wireless Personal Communications, 2019 - Springer
In this paper, we investigate the secrecy outage performance of the decode-and-forward
cognitive relay network with the existence of the co-channel interference, where all nodes …

Secure transmission using decode-and-forward protocol for underlay cognitive radio networks

NT Do, B An - … Conference on Ubiquitous and Future Networks, 2015 - ieeexplore.ieee.org
In this paper, we study the physical layer security for underlay cognitive radio network in the
presence of an eavesdropper that tries to intercept the secondary transmission. Specifically …

Secrecy outage analysis with Kth best relay selection in dual-hop inter-vehicle communication systems

J Zhang, G Pan - AEU-International Journal of Electronics and …, 2017 - Elsevier
In this paper, we investigate the secrecy outage performance of a dual-hop inter-vehicle
communication system, in which all nodes are in motion and all fading channels are …

Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition

D Wang, P Ren, Q Du, L Sun… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We study the cooperative secure transmissions in (multiple-input signal-output) MISO
vehicular relay networks where the infrastructure node with multiple antennas sends two …