Performance of adaptive multi-user underlay NOMA transmission with simple user selection

A Jee, K Janghel, S Prakriya - IEEE Transactions on Cognitive …, 2022 - ieeexplore.ieee.org
In this paper, we demonstrate that despite the power constraints on all transmit nodes
caused by the interference temperature limit (ITL) imposed by the primary user, power …

Relay selection for improved physical layer security in cognitive relay networks using artificial noise

S Jia, J Zhang, H Zhao, Y Lou, Y Xu - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, the physical layer security of underlay cognitive decode-and-forward (DF) relay
networks is investigated, wherein one secondary transmitter (ST) exchanges confidential …

Optimizing performance of co-existing underlay secondary networks

P Chakraborty, S Prakriya - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
In this paper, we analyze sum throughput and (asymptotic) sum ergodic rate performance of
two co-existing downlink multiuser underlay secondary networks employing either fixed-rate …

Jamming in eavesdropping on throughput maximization in green cognitive radio networks

A Banerjee, SP Maity - IEEE Transactions on Mobile Computing, 2021 - ieeexplore.ieee.org
This work considers a cognitive radio (CR) network consisting of a set of CR transmit-receive
node pairs, one fusion center (FC), multiple primary user emulation attack (PUEA) nodes, an …

Performance analysis of jamming technique in energy harvesting cognitive radio networks

K Ho-Van, T Do-Dac - Telecommunication Systems, 2019 - Springer
This paper proposes a jamming technique which employs a self-powered secondary
jammer to interfere a wire-tapper, who eavesdrops communications between a self-powered …

Relay Selection‐and‐Jamming Scheme with Nonlinear Energy Harvesting

T Pham-Minh, K Ho-Van… - Wireless …, 2021 - Wiley Online Library
When direct source‐destination communications are in outage, relay selection is a
preferable solution to improve reliability for this communications. However, such a relay …

Reliability‐security trade‐off analysis of cognitive radio networks with jamming and licensed interference

K Ho-Van, T Do-Dac - Wireless Communications and Mobile …, 2018 - Wiley Online Library
Cognitive radio networks (CRNs) allow coexistence of unlicensed users (UUs) and licensed
users (LUs) and hence, mutual interference between UUs and LUs is neither ignored nor …

Effective secrecy throughput analysis of relay-assisted free-space optical communications

MEP Monteiro, JL Rebelatto, RD Souza… - Physical communication, 2019 - Elsevier
We evaluate the effective secrecy throughput (EST) of multiple-input-multiple-output relay-
assisted free-space optical communication, where legitimate nodes (Alice, Relays, and Bob) …

Statistical analysis of a class of secure relay assisted cognitive radio networks

M Shokair, W Saad, SM Ibraheem - China Communications, 2018 - ieeexplore.ieee.org
In this paper, the problem of communication security in an underlay wiretap cognitive radio
network is addressed and statistically investigated. We rely on a simple dual-hop …

Relay-and-jammers selection for performance improvement of energy harvesting underlay cognitive networks

K Ho-Van, T Do-Dac - Arabian Journal for Science and Engineering, 2022 - Springer
This paper adopts a relay among available secondary relays and exploits non-selected
relays as jammers to maintain and secure legitimate secondary source-to-destination …