Resource allocation for underlay cognitive radio networks: A survey

M El Tanab, W Hamouda - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
For conventional wireless networks, the main target of resource allocation (RA) is to
efficiently utilize the available resources. Generally, there are no changes in the available …

Resource allocation trends for ultra dense networks in 5G and beyond networks: A classification and comprehensive survey

N Sharma, K Kumar - Physical Communication, 2021 - Elsevier
With an exaggerating upsurge in mobile data traffic, the wireless networks are confronted
with a subtle task of enhancing their network capacity. The shortage of spectrum resources …

Physical layer network security in the full-duplex relay system

G Chen, Y Gong, P Xiao… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The
resulting analysis shows that FDR networks have better secrecy performance than half …

Robust chance-constrained secure transmission for cognitive satellite–terrestrial networks

B Li, Z Fei, Z Chu, F Zhou, KK Wong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cognitive satellite–terrestrial networks (CSTNs) have been recognized as a promising
network architecture for addressing spectrum scarcity problem in next-generation …

Secure communications in NOMA system: Subcarrier assignment and power allocation

H Zhang, N Yang, K Long, M Pan… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Secure communication is a promising technology for wireless networks because it ensures
secure transmission of information. In this paper, we investigate the joint subcarrier (SC) …

Physical-layer security for full duplex communications with self-interference mitigation

F Zhu, F Gao, T Zhang, K Sun… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we design transmit beamforming for a full duplex base station (FD-BS)
considering both self-interference mitigation and physical-layer security. The proposed …

Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- Fading Channels

C Tang, G Pan, T Li - IEEE Wireless Communications Letters, 2014 - ieeexplore.ieee.org
An underlay cognitive radio unit over Nakagami-m fading channel, which consists of a
source S, a secondary user (SU), and an eavesdropper who wants to eavesdrop the …

Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks

D Wang, F Zhou, VCM Leung - IEEE Transactions on Cognitive …, 2019 - ieeexplore.ieee.org
In order to provide information privacy for the primary network and support the secondary
quality-of-service (QoS) requirement, we design a cooperative primary preserving strategy …

Resource allocation for secure communications in cooperative cognitive wireless powered communication networks

D Xu, Q Li - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
We consider a cognitive wireless powered communication network sharing the spectrum
with a primary network, which faces security threats from eavesdroppers (EAVs). We …

Dual antenna selection in secure cognitive radio networks

G Chen, Y Gong, P Xiao… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates data transmission and physical-layer secrecy in cognitive radio (CR)
networks. We propose to apply full-duplex transmission and dual antenna selection at a …