Blockchain and extreme learning machine based spectrum management in cognitive radio networks

C Rajesh Babu, B Amutha - Transactions on Emerging …, 2022 - Wiley Online Library
In recent times, spectrum sensing and spectrum management become a crucial design
issue in cognitive radio networks (CRN). To improve the spectrum utilization in CRN, the …

Secure hybrid satellite-UWOC cooperative relaying system under malicious unmanned aerial vehicle eavesdropper threat

KO Odeyemi, PA Owolawi - International Journal of Wireless …, 2021 - inderscienceonline.com
In this paper, the secrecy performance of a hybrid satellite-Underwater Optical
Communication (UWOC) system in the presence of an Unmanned Aerial Vehicle (UAV) …

Effect of best relay selection scheme on secrecy outage of underlay cognitive radio networks with energy harvesting: Design and simulation

MA Khodeir, SM Alquran - Simulation Modelling Practice and Theory, 2022 - Elsevier
In this paper, the secrecy outage performance is studied for optimal relay selection (ORS)
schemes with energy harvesting system deployed at the secondary transmitter to improve …

Secrecy outage performance with EH and TAS for realistic underlay cognitive radio networks using MIMO systems

MA Khodeir, SM Alquran - 2021 12th International Conference …, 2021 - ieeexplore.ieee.org
This work studies the physical layer security performance for Multiple Input Multiple Output
(MIMO) secondary nodes. The proposed model is assumed to operate in underlay Cognitive …

[PDF][PDF] Secrecy performance for underlay cooperative cognitive radio network with energy harvesting and transmit antenna selection using MIMO over Nakagami-m …

M Khodeir, S Alquran - Jordan J. Electr. Eng., 2021 - ejmanager.com
This paper introduces underlay multiple input multiple output (MIMO) cooperative
communication involving source, destination, eavesdropper, primary nodes and decode and …

Enhancing physical layer security via a UAV friendly jammer for NOMA‐based IoT systems with imperfect CSI

Y Chen, Z Zhang, B Li - Transactions on Emerging …, 2021 - Wiley Online Library
In this article, we investigate physical layer security in downlink Internet of Things networks
under imperfect channel state information (CSI), in which a controller (Alice) intends to serve …

Physical-layer security in underlay cognitive radio system with full-duplex secondary user over Nakagami-m fading channel

MA Khodeir, WS Alrayahneh - 2022 13th International …, 2022 - ieeexplore.ieee.org
In this paper, we study an underlay Cognitive Radio (CR) system with energy harvesting
over Nakagami-m fading channel. This system consists of a secondary source, a secondary …

[PDF][PDF] Realistic Secrecy Outage Performance for Underlay Cognitive Radio Networks Using MIMO Systems with EH and TAS

S MOH'D ALQURAN, MA Khodeir - 2021 - easychair.org
In this paper, the physical layer secrecy outage performance of Multiple Input Multiple Output
(MIMO) secondary nodes is studied. The proposed model is assumed to operate in underlay …