Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Optimal transmission with artificial noise in MISOME wiretap channels

N Yang, M Elkashlan, TQ Duong… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We investigate the optimal physical-layer secure transmission with artificial noise in the
wiretap channel with N antennas at the transmitter, a single antenna at the receiver, and M …

Achieving covert communication in overlay cognitive radio networks

R Chen, Z Li, J Shi, L Yang, J Hu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we investigate the covert communications in an overlay cognitive radio (CR)
network, where multiple secondary transmitters (STs) opportunistically send confidential …

Artificial-noise aided secure transmission in large scale spectrum sharing networks

Y Deng, L Wang, SAR Zaidi, J Yuan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We investigate beamforming and artificial noise generation at the secondary transmitters to
establish secure transmission in large scale spectrum sharing networks, where multiple …

Resource allocation for cognitive radio with primary user secrecy outage constraint

D Xu, Q Li - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
We consider a cognitive radio network where multiple secondary users (SUs) coexist with a
primary user (PU). There exist multiple eavesdroppers (EAVs) who attempt to overhear the …

Enhancing PHY security of cooperative cognitive radio multicast communications

VD Nguyen, TQ Duong, OS Shin… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
In this paper, we propose a cooperative approach to improve the security of both primary
and secondary systems in cognitive radio multicast communications. During their access to …

Secrecy rate optimization for cooperative cognitive radio networks aided by a wireless energy harvesting jammer

X Chen, L Guo, X Li, C Dong, J Lin… - IEEE …, 2018 - ieeexplore.ieee.org
In this paper, a novel wireless energy harvesting cooperative jammer (EH-CJ)-aided
transmission scheme, which can enhance the security for cooperative cognitive radio …

Joint beamforming for secure communication in RIS-assisted cognitive radio networks

X Wu, J Ma, X Xue - Journal of Communications and Networks, 2022 - ieeexplore.ieee.org
This paper studies the security and communication efficiency problem of a reconfigurable
intelligent surface (RIS) assisted cognitive radio network, in which we proposed a scheme …

SIC‐Coding Schemes for Underlay Two‐Way Relaying Cognitive Networks

PN Son, TT Duy, K Ho-Van - Wireless Communications and …, 2020 - Wiley Online Library
In this paper, we propose an underlay two‐way relaying scheme with the successive
interference cancellation (SIC) solution in which two secondary sources transmit …

The secrecy analysis over physical layer in NOMA-enabled cognitive radio networks

L Wei, T Jing, X Fan, Y Wen… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
An underlay cognitive radio network (CRN) with non-orthogonal multiple access (NOMA) is
a promising multiple access scheme to solve the problem of scarce spectrum. This novel …