Dual-threshold based secure on-off transmission scheme for dense HCNs with imperfect CSI

Y Xu, K Huang, Y Zou, X Hu - China Communications, 2019 - ieeexplore.ieee.org
In this paper, we propose a dual-threshold based secure On-Off transmission scheme,
where signals are transmitted only if the channel condition can guarantee secure and …

Towards secure and energy-efficient CRNs via embracing interference: A stochastic geometry approach

X Liu, K Zheng, XY Liu, X Wang, G Dai - IEEE Access, 2018 - ieeexplore.ieee.org
In a cognitive radio network (CRN), the interference caused by secondary users (SUs) is
conventionally regarded as an obstacle to the throughput of the primary network. However …

Adaptive secure transmission strategy for industrial wireless edge-enabled CPS

H Song, H Wen, Q Yang, J Tang, Y Chen… - IEEE …, 2021 - ieeexplore.ieee.org
For real-time industrial wireless edge-enabled cyber-physical systems, this paper proposes
an adaptive secure transmission mechanism under the large scale path loss to fight against …

Optimal access scheme for security provisioning of C-V2X computation offloading network with imperfect CSI

B Qiu, H Xiao, AT Chronopoulos, D Zhou… - IEEE Access, 2020 - ieeexplore.ieee.org
In a cellular vehicle-to-everything (C-V2X) enabled computation-offloading network,
vehicular users may deliver computation tasks to a cellular base station (BS) through vehicle …

Secrecy outage performance analysis for uplink CR-NOMA systems with hybrid SIC

H Lei, F Yang, IS Ansari, H Liu, KJ Kim… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the uplink cognitive radio-inspired nonorthogonal multiple access (CR-NOMA) systems,
the successive interference cancellation (SIC), and power control (PC) schemes were …

Energy-efficient primary security provisioning for the full-duplex cognitive radio networks

D Wang, P Ren - 2018 IEEE Global Communications …, 2018 - ieeexplore.ieee.org
In order to protect the primary information and provide some licensed spectrum for the
secondary system, we propose a secure transmission scheme, where the primary privacy …

Secrecy-based energy-efficient data offloading via dual connectivity over unlicensed spectrums

Y Wu, K Guo, J Huang, XS Shen - IEEE Journal on Selected …, 2016 - ieeexplore.ieee.org
Offloading cellular mobile users'(MUs') data traffic to small-cell networks is a cost-effective
approach to relieve congestion in macrocell cellular networks. However, as many small-cell …

Physical-Layer Security for Energy-Harvesting Multiuser Systems Under Hardware Impairments and Channel Estimation Errors

P Yan, X Ji, Y Zou, B Li - IEEE Transactions on Green …, 2023 - ieeexplore.ieee.org
This paper considers a typical system composed of multiple energy-constraint users, a
destination, and a passive eavesdropper who may intercept confidential information. Each …

Secrecy throughput optimization for the WPCNs with non-linear EH model

X Liu, Y Gao, M Guo, N Sha - IEEE Access, 2019 - ieeexplore.ieee.org
This paper investigates secure communication from a wireless-powered transmitter to a
desired receiver with multiple eavesdroppers in the wireless powered communication …

On–off-based secure transmission design with outdated channel state information

J Hu, W Yang, N Yang, X Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We design new secure on-off transmission schemes in wiretap channels with outdated
channel state information (CSI). In our design, we consider not only the outdated CSI from …