Robust power control and beamforming in cognitive radio networks: A survey

Y Xu, X Zhao, YC Liang - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Traditional spectrum allocation policies may result in temporarily unused radio spectrum.
Cognitive radio (CR) has emerged as a promising technology to exploit the radio spectrum …

On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping

J Zhu, Y Zou, G Wang, YD Yao… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we consider a multiple-input-multiple-output (MIMO) system consisting of one
source, one destination, and one eavesdropper, where each node is equipped with an …

Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels

Q Zhang, X Huang, Q Li, J Qin - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Considering simultaneous wireless information and power transfer (SWIPT), we investigate
cooperative-jamming (CJ) aided robust secure transmission design in multiple-input-single …

Robust masked beamforming for MISO cognitive radio networks with unknown eavesdroppers

J Xiong, D Ma, KK Wong, J Wei - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper studies a cognitive radio network (CRN), in which a multiple-input single-output
(MISO) secondary transmitter (SU-Tx) aims to send confidential messages to its receiver (SU …

Interference improves PHY security for cognitive radio networks

H Zhang, T Wang, L Song, Z Han - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In a cognitive radio (CR) network, the transmitting signal of a secondary user (SU) is
traditionally considered to be harmful for the primary user (PU), since it decreases the …

On physical layer security for cognitive radio networks with primary user interference

L Sibomana, H Tran… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secondary network physical layer security under the outage
constraint of the primary user (PU) receiver and interference from the PU transmitter to the …

Robust layered transmission in secure MISO multiuser unicast cognitive radio systems

DWK Ng, M Shaqfeh, R Schober… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper studies robust resource-allocation algorithm design for a multiuser multiple-input-
single-output (MISO) cognitive radio (CR) downlink communication network. We focus on a …

Physical layer security for primary system: A symbiotic approach in cooperative cognitive radio networks

VD Nguyen, TQ Duong, OS Shin - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
In this paper, we proposed a symbiotic approach for a secure primary network by allowing
the secondary users to send the jamming noise to degrade the wiretap ability of the …

Energy‐efficient relay selection scheme for physical layer security in cognitive radio networks

L Jiang, H Tian - Mathematical Problems in Engineering, 2015 - Wiley Online Library
Security is a critical issue in cognitive radio (CR) relay networks. Most previous work
concentrates on maximizing secrecy capacity (SC) as a criterion to guarantee the security …

Physical Layer Security in Wireless Networks: Design and Enhancement.

L Wang - 2015 - qmro.qmul.ac.uk
Security and privacy have become increasingly significant concerns in wireless
communication networks, due to the open nature of the wireless medium which makes the …