Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed …
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage multitier hierarchical networks. Securing data transmission in these networks is of the utmost …
M Zhang, Y Liu - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
In this paper, we study the secure beamforming design for a cognitive radio network (CRN), where a primary transmitter-receiver pair coexists with an untrusted secondary transmitter …
S Thakur, A Singh - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
This work explores the physical layer security of an underlay cognitive radio network (CRN) in the presence of a powerful interferer called a primary transmitter (PT) under peak …
We consider a cooperation scenario between primary users and untrusted secondary users in cognitive radio networks. The secondary users are willing to help the primary users to …
K Shim, NT Do, B An, SY Nam - 2016 International Conference …, 2016 - ieeexplore.ieee.org
In this paper, we consider a multi-hop decode-and-forward (DF) relaying transmission in underlay cognitive radio networks. Considering the presence of an eavesdropper that …
Y Zou, X Wang, W Shen - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers …
In this study, the physical layer security for cognitive radio network (CRN) will be investigated in which a secondary user transmitter (SU-Tx) sends confidential information to …
This letter investigates secure communications against eavesdropping in an underlay cognitive radio network. The secondary users do not know the interference level that they …