Physical layer security in cognitive radio networks using improper Gaussian signaling

G Oliveira, E Fernandez, S Mafra… - IEEE …, 2018 - ieeexplore.ieee.org
We look into adopting improper Gaussian signaling (IGS) in order to enhance the secrecy
performance of an underlay cognitive radio network since in interference-limited networks …

Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels

H Zhao, H Liu, Y Liu, C Tang… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secrecy outage performance of maximal ratio combining
(MRC) in cognitive radio networks (CRNs) over Rayleigh fading channels. In a single input …

Impact of interference on secrecy capacity in a cognitive radio network

Z Shu, Y Yang, Y Qian, RQ Hu - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
In this paper, we investigate secrecy capacity of a cognitive radio network based on
stochastic geometry distributions. We consider the Poisson process of both the secondary …

Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels

M Bouabdellah, F El Bouanani… - 2018 International …, 2018 - ieeexplore.ieee.org
Wireless communication systems are vulnerable to eavesdropping attack in which the
attacker overhear the transmitted data in the network. Hence, the physical-layer security is of …

Secure communications in cognitive underlay networks over Nakagami-m channel

NP Nguyen, TL Thanh, TQ Duong… - Physical Communication, 2017 - Elsevier
In this paper, the secure communication of a cognitive radio network (CRN) over Nakagami-
m fading channel is investigated. An underlay protocol is used in the considered network …

Improving physical‐layer security for primary users in cognitive radio networks

D Xu, Q Li - IET Communications, 2017 - Wiley Online Library
In this study, the authors investigate the physical‐layer security in a cognitive radio network
where both the secondary user (SU) and the primary user (PU) are facing security threats …

Secure communications with untrusted secondary nodes in cognitive radio networks

H Jeon, SW McLaughlin, IM Kim… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We consider a cooperation scenario between primary users and untrusted secondary users
in cognitive radio networks. The secondary users are willing to help the primary users to …

Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers

X Xu, B He, W Yang, X Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we study physical layer security in an underlay cognitive radio (CR) network.
We consider the problem of secure communication between a secondary transmitter …

Physical layer security in cognitive vehicular networks

S Kavaiya, DK Patel, Z Ding, YL Guan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In contrast with the traditional cryptography, physical layer security has attracted the
attention of many researchers having aim at reinforcing the security of communication …

Physical layer security in multi-antenna cognitive heterogeneous cellular networks: a unified secrecy performance analysis

X Qi, K Huang, B Li, L Jin, X Ji - Science China Information Sciences, 2018 - Springer
Cognitive heterogeneous cellular networks (CHCNs) are emerging as a promising approach
to next-generation wireless communications owing to their seamless coverage and high …