Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers

X Xu, B He, W Yang, X Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we study physical layer security in an underlay cognitive radio (CR) network.
We consider the problem of secure communication between a secondary transmitter …

Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise

Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where
the primary users, the secondary users and the eavesdroppers are randomly distributed …

On the security of cognitive radio networks

M Elkashlan, L Wang, TQ Duong… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage
multitier hierarchical networks. Securing data transmission in these networks is of the utmost …

Secure beamforming for untrusted MISO cognitive radio networks

M Zhang, Y Liu - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
In this paper, we study the secure beamforming design for a cognitive radio network (CRN),
where a primary transmitter-receiver pair coexists with an untrusted secondary transmitter …

Secrecy performance of underlay cognitive radio networks with primary interference

S Thakur, A Singh - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
This work explores the physical layer security of an underlay cognitive radio network (CRN)
in the presence of a powerful interferer called a primary transmitter (PT) under peak …

Secure communications with untrusted secondary nodes in cognitive radio networks

H Jeon, SW McLaughlin, IM Kim… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We consider a cooperation scenario between primary users and untrusted secondary users
in cognitive radio networks. The secondary users are willing to help the primary users to …

Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information

K Shim, NT Do, B An, SY Nam - 2016 International Conference …, 2016 - ieeexplore.ieee.org
In this paper, we consider a multi-hop decode-and-forward (DF) relaying transmission in
underlay cognitive radio networks. Considering the presence of an eavesdropper that …

Physical-layer security with multiuser scheduling in cognitive radio networks

Y Zou, X Wang, W Shen - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we consider a cognitive radio network that consists of one cognitive base
station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers …

Proposed relay selection scheme for physical layer security in cognitive radio networks

H Sakran, M Shokair, O Nasr, S El-Rabaie, AA El-Azm - Iet Communications, 2012 - IET
In this study, the physical layer security for cognitive radio network (CRN) will be
investigated in which a secondary user transmitter (SU-Tx) sends confidential information to …

Secure communications in underlay cognitive radio networks: User scheduling and performance analysis

L Yang, H Jiang, SA Vorobyov, J Chen… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter investigates secure communications against eavesdropping in an underlay
cognitive radio network. The secondary users do not know the interference level that they …