A Design of Minimizing Interference and Maximizing Throughput in Cognitive Radio Network by Joint Optimization of the Channel Allocation and Power Control

TS Babu, SN Rao, P Satyanarayana - International Journal of Wireless …, 2023 - Springer
Most of the existing technologies for cognitive radio network (CRN) is essential for providing
an effective solution for spectrum utilization problem in the wireless medium. Power …

Secure spectrum-sharing wiretap networks with full-duplex relaying

Z Shang, T Zhang, Y Cai, Y Liu, W Yang - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of dual-hop randomize-and-forward
(RaF) cognitive wiretap networks over Rayleigh fading channels, in which the RaF relay is …

Secure V2V Communications in Relay-assisted Cognitive Radio Vehicular Networks with Imperfect CSI

Y Zhang, J Hou, X Zhao - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
This paper considers a relay-based underlay cognitive radio vehicular network, where a
secondary source vehicle transmits information to a secondary destination vehicle with a …

Impact of artificial noise on security capability of energy harvesting overlay networks

K Ho-Van, T Do-Dac - Wireless Communications and Mobile …, 2021 - Wiley Online Library
Artificial noise, energy harvesting, and overlay communications can assure design metrics of
modern wireless networks such as data security, energy efficiency, and spectrum utilization …

Multicast network security with asymmetric cooperative relaying

DK Sarker, MZI Sarkar, MS Anower… - International Journal of …, 2022 - Springer
This paper exhibits the confidentiality performance study of a cooperative multicast network
consisting of K asymmetric relays over Nakagami-m fading channels, where the …

Secrecy outage probability in energy harvesting aided underlay cognitive radio network under eavesdroppers scenarios

KO Odeyemi, PA Owolawi… - Transactions on …, 2020 - Wiley Online Library
In this paper, the secrecy outage probability (SOP) of an energy harvesting aided underlay
single input multiple output cognitive radio network under the multiple eavesdroppers is …

Relay selection for security improvement in cognitive radio networks with energy harvesting

K Ho-Van, T Do-Dac - Wireless Communications and Mobile …, 2021 - Wiley Online Library
This paper selects an unlicensed relay among available self‐powered relays to not only
remain but also secure information transmission from an unlicensed source to an unlicensed …

Physical layer security in cognitive radio networks using improper Gaussian signaling

G Oliveira, E Fernandez, S Mafra… - IEEE …, 2018 - ieeexplore.ieee.org
We look into adopting improper Gaussian signaling (IGS) in order to enhance the secrecy
performance of an underlay cognitive radio network since in interference-limited networks …

On the secrecy analysis of dual-hop SWIPT-based multi-source underlay cognitive radio networks

F El Bouanani, I Lahmar, ZEAA Ismaili… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates the intercept probability (IP) performance for a dual-hop multi-
secondary user (SU) underlay cognitive-radio networks. Whereby, the relay R is self …

Secrecy outage probability of inter‐vehicular cognitive radio networks

SÖ Ata, E Erdogan - International Journal of Communication …, 2020 - Wiley Online Library
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary
user wishes to transmit a confidential information to the secondary destination in the …