In this paper, physical-layer security (PLS) for an underlay cognitive radio network (CRN) over cascaded Rayleigh fading channels is studied. The underlying cognitive radio system …
Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed …
N Bhargav, SL Cotton… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we consider the transmission of confidential information over a κ-μ fading channel in the presence of an eavesdropper who also experiences κ-μ fading. In particular …
D Xu, Q Li - IET Communications, 2017 - Wiley Online Library
In this study, the authors investigate the physical‐layer security in a cognitive radio network where both the secondary user (SU) and the primary user (PU) are facing security threats …
SÖ Ata - … on Telecommunications and Signal Processing (TSP), 2018 - ieeexplore.ieee.org
Next-generation wireless communication systems with high user mobility inherit cascaded fading channel models, where the fading effects are more severe than classical channel …
J Zhang, G Pan - AEU-International Journal of Electronics and …, 2017 - Elsevier
In this paper, we investigate the secrecy outage performance of a dual-hop inter-vehicle communication system, in which all nodes are in motion and all fading channels are …
J Zhang, C Kundu, OA Dobre… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
We investigate the secrecy performance of an underlay small-cell cognitive radio network under unreliable backhaul connections. The small-cell network shares the same spectrum …
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit …
We look into adopting improper Gaussian signaling (IGS) in order to enhance the secrecy performance of an underlay cognitive radio network since in interference-limited networks …