Ergodic secrecy rate analysis and optimal power allocation for symbiotic radio networks

A Al-Nahari, R Jäntti, G Zheng, D Mishra, M Nie - IEEE Access, 2023 - ieeexplore.ieee.org
In this paper, we address the challenge of establishing secure communication within a
symbiotic radio (SR) network. This network comprises a primary transmitter (PT), a primary …

Secrecy performance of SIMO underlay cognitive radio networks over α–μ fading channels

S Yadav, DS Gurjar - IEEE Access, 2021 - ieeexplore.ieee.org
This paper investigates the secrecy performance of a single-input multiple-output (SIMO)
based underlay cognitive radio networks. In particular, a single-antenna secondary …

Optimal power allocation by imperfect hardware analysis in untrusted relaying networks

A Kuhestani, A Mohammadi, KK Wong… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
By taking a variety of realistic hardware imperfections into consideration, we propose an
optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a …

Ergodic achievable secrecy rate of multiple-antenna relay systems with cooperative jamming

R Zhao, Y Huang, W Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates the ergodic achievable secrecy rate (EASR) of multiple-antenna
amplify-and-forward relay systems, where one eavesdropper can wiretap the relay. To …

A collaboration incentive exploiting the primary-secondary systems' cross interference for PHY security enhancement

K Tourki, MO Hasna - IEEE Journal of Selected Topics in Signal …, 2016 - ieeexplore.ieee.org
We investigate the spectrum sharing possibility as an incentive to enhance the physical
layer security. The concept behind is that a legitimate source-destination pair …

Secure communication via an untrusted non-regenerative relay in fading channels

J Huang, A Mukherjee… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We investigate a relay network where the source can potentially utilize an untrusted non-
regenerative relay to augment its direct transmission of a confidential message to the …

Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints

TX Quach, H Tran, E Uhlemann, MT Truc - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio
Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are …

Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer

A Kuhestani, A Mohammadi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we examine the secrecy performance of two-way relaying between a large-
scale multiple antenna base station (BS) and a single antenna mobile user (MU) in the …

Secrecy performance of underlay cognitive radio networks with primary interference

S Thakur, A Singh - IEEE Transactions on Network Science …, 2022 - ieeexplore.ieee.org
This work explores the physical layer security of an underlay cognitive radio network (CRN)
in the presence of a powerful interferer called a primary transmitter (PT) under peak …

Secure cooperative single carrier systems under unreliable backhaul and dense networks impact

HT Nguyen, J Zhang, N Yang, TQ Duong… - IEEE …, 2017 - ieeexplore.ieee.org
In this paper, the impacts of unreliable backhaul links on the secrecy performance of
cooperative single carrier heterogeneous networks in the presence of eavesdroppers are …