Secure communication in multiantenna cognitive radio networks with imperfect channel state information

Y Pei, YC Liang, KC Teh, KH Li - IEEE Transactions on Signal …, 2011 - ieeexplore.ieee.org
In this paper, we address the issue of optimal transmitter design to achieve physical layer
security for a multiple-input single-output (MISO) cognitive radio network (CRN), in which a …

Secure communication over MISO cognitive radio channels

Y Pei, YC Liang, L Zhang, KC Teh… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In this paper, we address the physical-layer security issue of a secondary user (SU) in a
spectrum-sharing cognitive radio network (CRN) from an information-theoretic perspective …

Robust masked beamforming for MISO cognitive radio networks with unknown eavesdroppers

J Xiong, D Ma, KK Wong, J Wei - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper studies a cognitive radio network (CRN), in which a multiple-input single-output
(MISO) secondary transmitter (SU-Tx) aims to send confidential messages to its receiver (SU …

Multiantenna secure cognitive radio networks with finite-alphabet inputs: A global optimization approach for precoder design

W Zeng, YR Zheng, C Xiao - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
This paper considers the precoder design for multiantenna secure cognitive radio networks.
We use finite-alphabet inputs as the signaling and exploit statistical channel state …

Secure beamforming for untrusted MISO cognitive radio networks

M Zhang, Y Liu - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
In this paper, we study the secure beamforming design for a cognitive radio network (CRN),
where a primary transmitter-receiver pair coexists with an untrusted secondary transmitter …

Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers

X Xu, B He, W Yang, X Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we study physical layer security in an underlay cognitive radio (CR) network.
We consider the problem of secure communication between a secondary transmitter …

On the security of cognitive radio networks

M Elkashlan, L Wang, TQ Duong… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage
multitier hierarchical networks. Securing data transmission in these networks is of the utmost …

Resource allocation for cognitive radio with primary user secrecy outage constraint

D Xu, Q Li - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
We consider a cognitive radio network where multiple secondary users (SUs) coexist with a
primary user (PU). There exist multiple eavesdroppers (EAVs) who attempt to overhear the …

Beamforming with artificial noise for secure MISOME cognitive radio transmissions

A Al-Nahari, G Geraci, M Al-Jamali… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In this paper, we consider multiple-input single-output multi-eavesdropper cognitive radio
networks (MISOME-CRNs), where a secondary user (SU) aims to transmit confidential …

Secure communications with untrusted secondary nodes in cognitive radio networks

H Jeon, SW McLaughlin, IM Kim… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We consider a cooperation scenario between primary users and untrusted secondary users
in cognitive radio networks. The secondary users are willing to help the primary users to …