In this paper, the physical-layer security (PLS) for an underlay cognitive radio network (CRN) with multiple non-colluding eavesdroppers is studied. We assume that a secondary user …
This paper thoroughly investigates the performance of short-packet communications over cascaded fading channels that have a variety of applications in mobile-to-mobile (M2M) …
In this paper, we investigate an overlay cognitive radio network (CRN) in which one user is selected among multiple secondary users (SUs) to harvest energy from primary …
In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is …
DH Tashman, W Hamouda - ICC 2022-IEEE International …, 2022 - ieeexplore.ieee.org
In this paper, physical-layer security (PLS) of an underlay cognitive radio network (CRN) operating over cascaded Rayleigh fading channels is examined. In this scenario, a …
NA Khalek, W Hamouda - ICC 2022-IEEE International …, 2022 - ieeexplore.ieee.org
In Cognitive radio (CR), users take advantage of vacant licensed bands to transmit their data as they become available. Cognitive users employ an autonomous perception-action …
The current paper studies comprehensive analysis of various cooperative spectrum sensing (CSS) schemes in generalized κ− μ fading environment. More precisely, the optimization of …
Spectrum sharing (SS) and energy harvesting (EH) basically improve spectrum-and-energy efficiencies required by modern communications systems. Nonetheless, most publications …
The ever-increasing demand for high-data services and the emergence of new use cases with stringent latency, spectral, and energy efficiency requirements present new challenges …