Cognitive radio network: Security and reliability trade-off-status, challenges, and future trend

DK Jasim, SB Sadkhan - 2021 1st Babylon International …, 2021 - ieeexplore.ieee.org
The security of a cognitive radio network (CRN) is one of the most important features that
should receive great attention, especially with the continuing developments in wireless …

Joint power and sub-channel allocation for secure transmission in NOMA-based mMTC networks

S Han, X Xu, X Tao, P Zhang - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
In this paper, we consider the physical layer security for non-orthogonal multiple access
(NOMA)-based uplink massive machine type communication (mMTC) networks. Aiming at …

Secure on-off transmission in mmWave systems with randomly distributed eavesdroppers

W Yang, L Tao, X Sun, R Ma, Y Cai, T Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
To meet ever-increasing mobile data traffic demands for next-generation wireless
communication systems, the plentiful spectrum resources in millimeter wave (mmWave) …

[PDF][PDF] 认知无线电非正交多址接入随机网络物理层安全性能分析

于宝泉, 蔡跃明, 胡健伟 - 电子与信息学报, 2020 - jeit.ac.cn
该文针对干扰源以及窃听节点均随机分布的通信场景, 分析了认知无线电启发式非正交多址接入
(CRNOMA) 网络中次用户通信对的安全通信性能. 采用随机几何理论, 将窃听节点和干扰节点建 …

Optimal access scheme for security provisioning of C-V2X computation offloading network with imperfect CSI

B Qiu, H Xiao, AT Chronopoulos, D Zhou… - IEEE Access, 2020 - ieeexplore.ieee.org
In a cellular vehicle-to-everything (C-V2X) enabled computation-offloading network,
vehicular users may deliver computation tasks to a cellular base station (BS) through vehicle …

Physical layer security in cognitive millimeter wave networks

Y Song, W Yang, X Yang, Z Xiang, B Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Millimeter wave (mmWave) communications and cognitive radio networks are two key
technologies to improve the spectral efficiency. For a cognitive mmWave wiretap network in …

Performance analysis of jamming technique in energy harvesting cognitive radio networks

K Ho-Van, T Do-Dac - Telecommunication Systems, 2019 - Springer
This paper proposes a jamming technique which employs a self-powered secondary
jammer to interfere a wire-tapper, who eavesdrops communications between a self-powered …

Reliability‐security trade‐off analysis of cognitive radio networks with jamming and licensed interference

K Ho-Van, T Do-Dac - Wireless Communications and Mobile …, 2018 - Wiley Online Library
Cognitive radio networks (CRNs) allow coexistence of unlicensed users (UUs) and licensed
users (LUs) and hence, mutual interference between UUs and LUs is neither ignored nor …

Exact secrecy throughput capacity study in mobile ad hoc networks

X Li, Y Zhang, S Zhao, Y Shen, X Jiang - Ad Hoc Networks, 2018 - Elsevier
The secrecy throughput capacity (STC) performance study of mobile ad hoc networks
(MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite …

Physical layer security in iot: A spatial-temporal perspective

S Zhang, J Peng, K Huang, X Xu… - 2017 9th International …, 2017 - ieeexplore.ieee.org
Delay and security are both highly concerned in the Internet of Things (IoT). In this paper, we
set up a secure analytical framework for IoT networks to characterize the network delay …