Due to the open nature of wireless communication systems, the data transmission over these networks are vulnerable to malicious attack. To safeguard the transmitted data …
Most of the well-known fading distributions, if not all of them, could be encompassed by the Fox's H-function fading. Consequently, we investigate the physical layer security over Fox's …
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit …
This paper investigates the secrecy performance of a single-input multiple-output (SIMO) based underlay cognitive radio networks. In particular, a single-antenna secondary …
P Yan, J Yang, M Liu, J Sun… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper considers a multiple-input-multiple-output (MIMO) energy-harvesting (EH) system, which is made up of a source (S) and a destination (D) as well as an eavesdropper …
This work is concerned with the physical layer security of the free space optical (FSO) communication network comprising of a transmitter, a receiver, an eavesdropper (Eve), and …
The underlay cognitive radio-based hybrid radio frequency/free-space optical (RF/FSO) systems have emerged as a promising technology due to their ability to eliminate spectrum …
Physical-layer security is emerging approach that can benefit conventional encryption methods. The main idea of physical layer security is to take advantage of the features of the …
L Han, WP Zhu, M Lin - IEEE transactions on communications, 2022 - ieeexplore.ieee.org
In this paper, we investigate the outage performance of an uplink (UL) non-orthogonal multiple access (NOMA)-based hybrid satellite-terrestrial relay network (HSTRN), in which …