S Jia, J Zhang, H Zhao, Y Lou, Y Xu - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, the physical layer security of underlay cognitive decode-and-forward (DF) relay networks is investigated, wherein one secondary transmitter (ST) exchanges confidential …
In this paper, we analyze sum throughput and (asymptotic) sum ergodic rate performance of two co-existing downlink multiuser underlay secondary networks employing either fixed-rate …
A Banerjee, SP Maity - IEEE Transactions on Mobile Computing, 2021 - ieeexplore.ieee.org
This work considers a cognitive radio (CR) network consisting of a set of CR transmit-receive node pairs, one fusion center (FC), multiple primary user emulation attack (PUEA) nodes, an …
This paper proposes a jamming technique which employs a self-powered secondary jammer to interfere a wire-tapper, who eavesdrops communications between a self-powered …
When direct source‐destination communications are in outage, relay selection is a preferable solution to improve reliability for this communications. However, such a relay …
K Ho-Van, T Do-Dac - Wireless Communications and Mobile …, 2018 - Wiley Online Library
Cognitive radio networks (CRNs) allow coexistence of unlicensed users (UUs) and licensed users (LUs) and hence, mutual interference between UUs and LUs is neither ignored nor …
We evaluate the effective secrecy throughput (EST) of multiple-input-multiple-output relay- assisted free-space optical communication, where legitimate nodes (Alice, Relays, and Bob) …
M Shokair, W Saad, SM Ibraheem - China Communications, 2018 - ieeexplore.ieee.org
In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop …
K Ho-Van, T Do-Dac - Arabian Journal for Science and Engineering, 2022 - Springer
This paper adopts a relay among available secondary relays and exploits non-selected relays as jammers to maintain and secure legitimate secondary source-to-destination …