Physical layer security in cognitive radio inspired NOMA network

Z Xiang, W Yang, G Pan, Y Cai… - IEEE Journal of Selected …, 2019 - ieeexplore.ieee.org
This paper investigates physical layer security (PLS) in cognitive radio inspired non-
orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary …

Resource allocation for secure communications in cooperative cognitive wireless powered communication networks

D Xu, Q Li - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
We consider a cognitive wireless powered communication network sharing the spectrum
with a primary network, which faces security threats from eavesdroppers (EAVs). We …

Secure users oriented downlink MISO NOMA

HM Wang, X Zhang, Q Yang… - IEEE Journal of Selected …, 2019 - ieeexplore.ieee.org
This paper proposes a secure users-oriented multiple-input and single-output non-
orthogonal multiple access downlink transmission scheme, where multiple legitimate users …

URJA: Usage jammer as a resource allocation for secure transmission in a CR-NOMA-based 5G femtocell system

I Budhiraja, N Kumar, S Tyagi, S Tanwar… - IEEE Systems …, 2020 - ieeexplore.ieee.org
In this article, a joint user pairing and secure resource allocation scheme for cognitive radio
inspired nonorthogonal multiple access (CR-NOMA) femtocells in the presence of a jammer …

Deep reinforcement learning based intelligent user selection in massive MIMO underlay cognitive radios

Z Shi, X Xie, H Lu - IEEE Access, 2019 - ieeexplore.ieee.org
Cognitive radio (CR) and massive multiple-input multiple-output (MIMO) have attracted
much interest recently due to the amazing ability to accommodate more users and improve …

[HTML][HTML] Residual energy analysis in cognitive radios with energy harvesting UAV under reliability and secrecy constraints

W Khalid, H Yu, S Noh - Sensors, 2020 - mdpi.com
The integration of unmanned aerial vehicles (UAVs) with a cognitive radio (CR) technology
can improve the spectrum utilization. However, UAV network services demand reliable and …

Stackelberg game for secure CR-NOMA networks against internal eavesdropper

S Abidrabbu, A Abushattal… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The combination of Cognitive Radio with Nonorthogonal Multiple Access (CR-NOMA) has
enormous potential interest to improve spectral efficiency and increase system capacity in …

Model-based Bayesian reinforcement learning for enhancing primary user performance under jamming attack

AN Elbattrawy, AH Abd El-Malek, SI Rabia, WK Zahra - Ad Hoc Networks, 2023 - Elsevier
Due to the broadcast nature of wireless networks, jamming attacks are inevitable. Therefore,
this paper considers enhancing the throughput of a primary user (PU) suffering from a …

Physical layer security approaches in 5G wireless communication networks

P Singh, P Pawar, A Trivedi - 2018 First International …, 2018 - ieeexplore.ieee.org
Rapid growth in the fifth generation (5G) wireless network applications demands new
requirements on the data storage, computation, and networking. Thus, it will introduce new …

[HTML][HTML] Joint power allocation and collaborative beamforming for physical layer security in underlay CR NOMA relay systems

C Hu, Q Li, L Yang, J Qin - Physical Communication, 2021 - Elsevier
In this paper, we investigate the problem of joint power allocation and collaborative
beamforming for physical layer security in underlay cognitive radio non-orthogonal multiple …