Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise

H Dang-Ngoc, B Ho-Quoc… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Main design objectives of future wireless networks are information security and efficient
spectrum-and-energy utilization to serve a tremendous number of users and applications …

Secrecy throughput analysis of energy scavenging overlay networks with artificial noise

N Pham-Thi-Dan, B Ho-Quoc, K Ho-Van… - 2020 International …, 2020 - ieeexplore.ieee.org
Energy scavenging overlay networks with artificial noise (ESONwAN) integrate three
emerging (energy harvesting, cognitive radio, physical layer security) technologies to boost …

[HTML][HTML] Overlay networks with jamming and energy harvesting: security analysis

K Ho-Van, T Do-Dac - Arabian Journal for Science and Engineering, 2021 - Springer
In cognitive radio networks, direct communications between a primary sender–recipient pair
may be blocked due to uncertainties such as deep fading. Therefore, this paper studies …

Securing Multi-Destination Transmissions With Relay and Friendly Interference Collaboration

L Liang, X Li, H Huang, Z Yin, N Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Relay and friendly interference collaboration are effective technologies within the physical-
layer security (PLS) domain for countering eavesdroppers in wireless transmissions …

[HTML][HTML] Impact of channel estimation-and-artificial noise cancellation imperfection on artificial noise-aided energy harvesting overlay networks

K Ho-Van, T Do-Dac - Telecommunication Systems, 2021 - Springer
Abstract EHONs (Energy Harvesting Overlay Networks) satisfy stringent design
requirements such as high energy-and-spectrum utilization efficiencies. However, due to …

Secrecy performance of untrustworthy AF relay networks using cooperative jamming and SWIPT

EN Egashira, EEB Olivo, DPM Osorio… - 2019 IEEE 30th …, 2019 - ieeexplore.ieee.org
In this paper, the secrecy outage performance of a three-node amplify-and-forward relay
network with an untrustworthy relay is investigated. To enable a secure transmission, we …

Ergodic secrecy rate analysis and optimal power allocation for symbiotic radio networks

A Al-Nahari, R Jäntti, G Zheng, D Mishra, M Nie - IEEE Access, 2023 - ieeexplore.ieee.org
In this paper, we address the challenge of establishing secure communication within a
symbiotic radio (SR) network. This network comprises a primary transmitter (PT), a primary …

[HTML][HTML] Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading

H Dang-Ngoc, K Ho-Van, T Do-Dac - Wireless Personal Communications, 2021 - Springer
Overlay mechanism offers secondary users (SUs) chances to access licensed spectrum of
primary users (PUs) to improve spectrum utilization efficiency. However, these chances …

Secrecy performance analysis of heterogeneous networks with unreliable wireless backhaul and imperfect channel estimation

C Yin, E Garcia-Palacios, P Xiao… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
Wireless backhaul is an economical and flexible alternative to wired backhaul, however, it
experiences impairments. This research proposes a new secure heterogeneous system …

Overlay networks with nonlinear energy scavenging and noma-assisted decoding: security performance analysis

T Le-Thanh, K Ho-Van - Arabian Journal for Science and Engineering, 2022 - Springer
Overlay networks allow the unlicensed transmitter (UT) to aid the licensed transmitter (LT) by
sending the superimposed signal including messages of both UT and LT with a higher …