A Pandey, S Yadav - IEEE Open Journal of Vehicular …, 2021 - ieeexplore.ieee.org
This paper investigates the joint impact of nodes' mobility and imperfect channel estimates on the secrecy performance of an underlay cognitive radio vehicular network over Nakagami …
SÖ Ata, E Erdogan - International Journal of Communication …, 2020 - Wiley Online Library
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the …
Y Pei, YC Liang, L Zhang, KC Teh… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In this paper, we address the physical-layer security issue of a secondary user (SU) in a spectrum-sharing cognitive radio network (CRN) from an information-theoretic perspective …
This paper investigates the secrecy performance of an underlay cognitive radio network (CRN) with outdated channel state information (CSI) for two practical scenarios, ie, scenario …
In contrast with the traditional cryptography, physical layer security has attracted the attention of many researchers having aim at reinforcing the security of communication …
In this paper, we present a method of utilizing channel diversity to improve the secrecy outage probability and the intercept probability in a cognitive radio (CR) network. With the …
L Sibomana, H Tran… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secondary network physical layer security under the outage constraint of the primary user (PU) receiver and interference from the PU transmitter to the …
Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
The authors study the secure transmission design in random cognitive radio networks where the primary users, the secondary users and the eavesdroppers are randomly distributed …
A Pandey, S Yadav - 2019 IEEE Conference on Information and …, 2019 - ieeexplore.ieee.org
This paper investigates the secrecy performance of an intervehicular cognitive relaying network. We assume that the primary receiver (PU) in the primary network is fixed, whereas …