Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise

Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where
the primary users, the secondary users and the eavesdroppers are randomly distributed …

Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers

X Xu, B He, W Yang, X Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we study physical layer security in an underlay cognitive radio (CR) network.
We consider the problem of secure communication between a secondary transmitter …

Impact of interference on secrecy capacity in a cognitive radio network

Z Shu, Y Yang, Y Qian, RQ Hu - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
In this paper, we investigate secrecy capacity of a cognitive radio network based on
stochastic geometry distributions. We consider the Poisson process of both the secondary …

On the security of cognitive radio networks

M Elkashlan, L Wang, TQ Duong… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage
multitier hierarchical networks. Securing data transmission in these networks is of the utmost …

Physical layer security in cognitive radio networks using improper Gaussian signaling

G Oliveira, E Fernandez, S Mafra… - IEEE …, 2018 - ieeexplore.ieee.org
We look into adopting improper Gaussian signaling (IGS) in order to enhance the secrecy
performance of an underlay cognitive radio network since in interference-limited networks …

Secure communications in cognitive underlay networks over Nakagami-m channel

NP Nguyen, TL Thanh, TQ Duong… - Physical Communication, 2017 - Elsevier
In this paper, the secure communication of a cognitive radio network (CRN) over Nakagami-
m fading channel is investigated. An underlay protocol is used in the considered network …

Secure communications in underlay cognitive radio networks: User scheduling and performance analysis

L Yang, H Jiang, SA Vorobyov, J Chen… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter investigates secure communications against eavesdropping in an underlay
cognitive radio network. The secondary users do not know the interference level that they …

Secure transmission in underlay cognitive radio network with outdated channel state information

S Thakur, A Singh - Physical Communication, 2019 - Elsevier
This paper investigates the secrecy performance of an underlay cognitive radio network
(CRN) with outdated channel state information (CSI) for two practical scenarios, ie, scenario …

Secrecy performance of underlay cognitive radio networks with primary interference

S Thakur, A Singh - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
This work explores the physical layer security of an underlay cognitive radio network (CRN)
in the presence of a powerful interferer called a primary transmitter (PT) under peak …

Secrecy Outage Probability and Strictly Positive Secrecy Capacity of Cognitive Radio Networks with Adaptive Transmit Power

F Alanazi - Wireless Personal Communications, 2023 - Springer
In this article, we derive the Secrecy Outage Probability (SOP) and the Probability of Strictly
Positive Secrecy Capacity (SPSC) for Cognitive Radio Networks with Adaptive Transmit …