Aided opportunistic jammer selection for secrecy improvement in underlay cognitive radio networks

P Xie, J Zhu, M Zhang, L Xing, G Zhang… - Wireless Personal …, 2019 - Springer
In this paper, we consider the physical-layer security for the primary system in an underlay
cognitive radio model which comprises of a primary source–destination pair, a secondary …

Data capture of cognitive radio-based red network by a blue network in tactical wireless networks

TT Nguyen, H Vu-Van, I Koo - IEEE Sensors Journal, 2016 - ieeexplore.ieee.org
In this paper, we consider data capture of a cognitive radio-based red network in tactical
wireless networks. In the blue (friendly) network, an eavesdropping sensor node is deployed …

Joint User and Power Allocation in Underlay Cognitive Radio Networks with Multiple Primary Users' Security Constraints

D Xu, Q Li - IEICE Transactions on Fundamentals of Electronics …, 2017 - search.ieice.org
In this letter, we consider a cognitive radio network where multiple secondary users (SUs)
share the spectrum bands with multiple primary users (PUs) who are facing security threats …

Secure communications with secondary user selection in underlay cognitive radio networks

M Qin, S Yang, Z Han, R Zhang… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
This paper investigates the effect of multiuser gain provided by the secondary user selection
on the secrecy performance of the primary users. We propose a simple secondary user …

Robust beamforming for secrecy rate in cooperative cognitive radio multicast communications

VD Nguyen, TQ Duong, OS Shin… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
In this paper, we propose a cooperative approach to improve the security of both primary
and secondary systems in cognitive radio multicast communications. During their access to …

Secured primary system with the assistance of secondary system in spectrum‐sharing environment

TV Truong, VD Nguyen, TX Doan… - IET …, 2017 - Wiley Online Library
Consider an underlay cognitive radio network where an eavesdropper (Eve) targets to
intercept the information exchanging between the primary nodes. The secondary system is …

[PDF][PDF] Performance Enhancement of Cognitive Radio Networks via Multi-Power Level Transmission

S Khomejani - 2017 - kclpure.kcl.ac.uk
The ubiquitous trend to the “next generation communication” is a symbol of the
communication arena's need for independence, efficiency and flexibility. Cognitive radio …

Efficient techniques for securing wireless communications systems

D Karas - 2016 - didaktorika.gr
In this thesis, physical-layer (PHY) security is investigated, which exploits channel
characteristics, such as noise and multipath fading, in order to ensure confidential …