On Securing Cognitive Radio Networks-Enabled SWIPT Over Cascaded - Fading Channels With Multiple Eavesdroppers

DH Tashman, W Hamouda… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, the physical-layer security (PLS) for an underlay cognitive radio network (CRN)
with multiple non-colluding eavesdroppers is studied. We assume that a secondary user …

A covert jamming scheme against an intelligent eavesdropper in cooperative cognitive radio networks

Y Wen, L Liu, J Li, X Hou, N Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In this work, we design a covert jamming scheme against an intelligent Eve towards physical
layer security in a cooperative cognitive radio networks. To protect the primary message …

Dual antenna selection in secure cognitive radio networks

G Chen, Y Gong, P Xiao… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates data transmission and physical-layer secrecy in cognitive radio (CR)
networks. We propose to apply full-duplex transmission and dual antenna selection at a …

Physical layer security enhancement using artificial noise in cellular vehicle-to-everything (C-V2X) networks

C Wang, Z Li, XG Xia, J Shi, J Si… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The secure transmission of confidential information in cellular vehicle-to-everything (C-V2X)
communication networks is vitally important for user's personal safety. However, for C-V2X …

Secure communication over MISO cognitive radio channels

Y Pei, YC Liang, L Zhang, KC Teh… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In this paper, we address the physical-layer security issue of a secondary user (SU) in a
spectrum-sharing cognitive radio network (CRN) from an information-theoretic perspective …

Secure communication in OFDMA-based cognitive radio networks: An incentivized secondary network coexistence approach

MR Abedi, N Mokari, MR Javan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we propose a secure cooperative communications scheme for orthogonal
frequency-division multiple-access (OFDMA) cognitive radio networks (CRNs), where a …

On residual energy maximization in DF cognitive radio networks with multiple eavesdroppers

A Banerjee, SP Maity - IEEE Transactions on Cognitive …, 2019 - ieeexplore.ieee.org
This paper explores the issues of energy harvesting (EH) and multiple eavesdropping in an
underlay cognitive radio network (CRN) that comprises of a secondary transmitter (SU T) …

Outage constrained robust secrecy energy efficiency maximization for EH cognitive radio networks

L Ni, X Da, H Hu, M Zhang… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
In this letter, we investigate the outage-constrained robust secure design in a multiple-input
single-output (MISO) energy harvesting (EH) cognitive radio network (CRN), where the …

Physical layer security of interference-limited land mobile satellite communication systems

V Bankey, PK Upadhyay… - … Conference on Advanced …, 2018 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a downlink land mobile satellite
(LMS) system, where a satellite transmits signal to a legitimate user in the presence of an …

Secrecy outage performance analysis for uplink CR-NOMA systems with hybrid SIC

H Lei, F Yang, IS Ansari, H Liu, KJ Kim… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the uplink cognitive radio-inspired nonorthogonal multiple access (CR-NOMA) systems,
the successive interference cancellation (SIC), and power control (PC) schemes were …