Physical layer security in cognitive radio networks for IoT using UAV with reconfigurable intelligent surfaces

NQ Long, VH Dang, C So-In… - … joint conference on …, 2021 - ieeexplore.ieee.org
In this paper, the secrecy performance of a cognitive radio networks (CRN) for Internet of
Things (IoT) in the presence of an eavesdropper (EAV) is investigated. In particular, a …

Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users

AM Al-Rjoob, AA Ababnah, MF Al-Mistarihi… - … Journal of Computers …, 2024 - Taylor & Francis
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting
a vast array of devices, underscoring the critical need for robust data security, particularly at …

Joint Trajectory Optimization and Power Control for Cognitive UAV-Assisted Secure Communications

C Wang, H Yang, L Xiao, H Lu… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Cognitive unmanned aerial vehicle (UAV) communication systems combine benefits of both
the cognitive radio and UAV, which improves the spectral efficiency and communication …

Computer Information Processing System Based on RFID Internet‐of‐Things Encryption Technology

C Yuan - Scientific Programming, 2022 - Wiley Online Library
With the increasing development of information science and technology and the vigorous
use and promotion of new technologies, profound changes have taken place in all aspects …

Capacity Analysis under Random Blockage in Internet of Things over F Distribution

F Almehmadi - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
In this paper, the average channel capacity and the outage capacity with random blockage
under the composite F fading channels is considered. To this end, closed-form analytical …

Outage analysis of cognitive communication system using opportunistic relay selection and secondary users as relays

H Javadzadeh, A Zahedi - International Journal of Electronics …, 2023 - Taylor & Francis
Efficient bandwidth utilisation is significant in new communication systems where secondary
users can be used besides primary users considering interference issues and idle state of …