Enhancing PHY security of cooperative cognitive radio multicast communications

VD Nguyen, TQ Duong, OS Shin… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
In this paper, we propose a cooperative approach to improve the security of both primary
and secondary systems in cognitive radio multicast communications. During their access to …

Cooperative relaying and jamming for primary secure communication in cognitive two-way networks

D Wang, P Ren, Q Du, L Sun… - 2016 IEEE 83rd vehicular …, 2016 - ieeexplore.ieee.org
In this paper, we investigate a new cooperative paradigm to provide information security for
the primary system in cognitive two-way networks where the two-way secondary system can …

Physical layer security for primary system: A symbiotic approach in cooperative cognitive radio networks

VD Nguyen, TQ Duong, OS Shin - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
In this paper, we proposed a symbiotic approach for a secure primary network by allowing
the secondary users to send the jamming noise to degrade the wiretap ability of the …

Secure cognitive radio system with cooperative secondary networks

W Liu, L Guo, T Kang, J Zhang… - 2015 22nd International …, 2015 - ieeexplore.ieee.org
In cognitive radio (CR) systems, we often use jamming schemes to improve the physical-
layer security in the presence of passive eavesdroppers. However, it also needs additional …

Joint beamforming and power allocation for secure communication in cognitive radio networks

T Chen, HQ Yuan, TZ Zhao, ZS Zhang… - IET …, 2016 - Wiley Online Library
In this study, secure communication in cognitive radio networks is investigated. A
cooperative jammer is utilised to transmit artificial noise for interfering with the …

Multi-phase smart relaying and cooperative jamming in secure cognitive radio networks

PH Lin, F Gabry, R Thobaben… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, we investigate cooperative secure communications in a four-node cognitive
radio network where the secondary receiver is treated as a potential eavesdropper with …

Secure beamforming for untrusted MISO cognitive radio networks

M Zhang, Y Liu - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
In this paper, we study the secure beamforming design for a cognitive radio network (CRN),
where a primary transmitter-receiver pair coexists with an untrusted secondary transmitter …

Beamforming for cooperative secure transmission in cognitive two-way relay networks

Q Li, L Yang - IEEE Transactions on Information Forensics and …, 2019 - ieeexplore.ieee.org
In this paper, we investigate beamforming design for cooperative secure transmission in
cognitive two-way relay networks, where the cognitive transmitter (CT) with multiple …

Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints

TX Quach, H Tran, E Uhlemann, MT Truc - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio
Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are …

Interference improves PHY security for cognitive radio networks

H Zhang, T Wang, L Song, Z Han - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In a cognitive radio (CR) network, the transmitting signal of a secondary user (SU) is
traditionally considered to be harmful for the primary user (PU), since it decreases the …