X Xu, B He, W Yang, X Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we study physical layer security in an underlay cognitive radio (CR) network. We consider the problem of secure communication between a secondary transmitter …
Z Shu, Y Yang, Y Qian, RQ Hu - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
In this paper, we investigate secrecy capacity of a cognitive radio network based on stochastic geometry distributions. We consider the Poisson process of both the secondary …
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage multitier hierarchical networks. Securing data transmission in these networks is of the utmost …
We look into adopting improper Gaussian signaling (IGS) in order to enhance the secrecy performance of an underlay cognitive radio network since in interference-limited networks …
In this paper, the secure communication of a cognitive radio network (CRN) over Nakagami- m fading channel is investigated. An underlay protocol is used in the considered network …
This letter investigates secure communications against eavesdropping in an underlay cognitive radio network. The secondary users do not know the interference level that they …
This paper investigates the secrecy performance of an underlay cognitive radio network (CRN) with outdated channel state information (CSI) for two practical scenarios, ie, scenario …
S Thakur, A Singh - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
This work explores the physical layer security of an underlay cognitive radio network (CRN) in the presence of a powerful interferer called a primary transmitter (PT) under peak …
F Alanazi - Wireless Personal Communications, 2023 - Springer
In this article, we derive the Secrecy Outage Probability (SOP) and the Probability of Strictly Positive Secrecy Capacity (SPSC) for Cognitive Radio Networks with Adaptive Transmit …