Optimization or alignment: Secure primary transmission assisted by secondary networks

Y Cao, N Zhao, FR Yu, M Jin, Y Chen… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Security is a challenging issue for cognitive radio (CR) to be used in future 5G mobile
systems. Conventionally, interference will degrade the performance of a primary user (PU) …

Covert wireless communication with a Poisson field of interferers

B He, S Yan, X Zhou… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we study covert communication in wireless networks consisting of a transmitter,
Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers. Bob and …

Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks

B Li, X Qi, K Huang, Z Fei, F Zhou… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper develops a tractable analysis framework to evaluate the reliability and security
performance of cooperative non-orthogonal multiple access (co-NOMA) in cognitive …

A secure multiuser privacy technique for wireless IoT networks using stochastic privacy optimization

JH Anajemba, T Yue, C Iwendi… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the exponential increase of interconnected communicating devices which make up the
Internet of Things (IoT), securing the network transmission and the fifth generation (5G) …

On the secure spectral-energy efficiency tradeoff in random cognitive radio networks

X Xu, W Yang, Y Cai, S Jin - IEEE Journal on selected areas in …, 2016 - ieeexplore.ieee.org
Spectrum efficiency (SE) and energy efficiency (EE) in secure communications have
attracted much attention recently due to the fact that future wireless networks need to …

Achieving covert communication in overlay cognitive radio networks

R Chen, Z Li, J Shi, L Yang, J Hu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we investigate the covert communications in an overlay cognitive radio (CR)
network, where multiple secondary transmitters (STs) opportunistically send confidential …

Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio …

S Vimal, L Kalaivani, M Kaliappan, A Suresh… - Neural Computing and …, 2020 - Springer
The cognitive radio network (CR) is a primary and promising technology to distribute the
spectrum assignment to an unlicensed user (secondary users) which is not utilized by the …

A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks

Y Wen, Y Huo, L Ma, T Jing… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we consider a centralized cooperative cognitive radio network (CCRN), where
a primary base station sends a message to a primary user. Meanwhile, a secondary user …

Secure on-off transmission in mmWave systems with randomly distributed eavesdroppers

W Yang, L Tao, X Sun, R Ma, Y Cai, T Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
To meet ever-increasing mobile data traffic demands for next-generation wireless
communication systems, the plentiful spectrum resources in millimeter wave (mmWave) …

Energy efficiency of secure cognitive radio networks with cooperative spectrum sharing

X Liu, K Zheng, L Fu, XY Liu, X Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Energy-efficient and secure wireless communications have recently earned tremendous
interests due to economic, environmental, and military concerns. This paper investigates the …