C Tang, G Pan, T Li - IEEE Wireless Communications Letters, 2014 - ieeexplore.ieee.org
An underlay cognitive radio unit over Nakagami-m fading channel, which consists of a source S, a secondary user (SU), and an eavesdropper who wants to eavesdrop the …
H Zhao, H Liu, Y Liu, C Tang… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks (CRNs) over Rayleigh fading channels. In a single input …
H Zhao, Y Tan, G Pan, Y Chen - Frontiers of Information Technology & …, 2017 - Springer
This paper investigates the secrecy performance of maximal ratio combining (MRC) and selection combining (SC) with imperfect channel state information (CSI) in the physical layer …
H Liu, H Zhao, H Jiang, C Tang, G Pan, T Li… - Science China …, 2016 - Springer
In this paper, we investigate the physical-layer secrecy outage performance of underlay spectrum sharing systems over Rayleigh and log-normal fading channels in the presence of …
P Ramírez-Espinosa, RJ Sánchez-Alarcón… - IEEE …, 2020 - ieeexplore.ieee.org
We show that for a legitimate communication under multipath quasi-static fading with a reduced number of scatterers, it is possible to achieve perfect secrecy even in the presence …
YY Xu, K Xiao - 2016 25th Wireless and Optical Communication …, 2016 - ieeexplore.ieee.org
This paper investigates the outage performance of the secure cooperative system over correlated Rayleigh fading channels in the presence of the eavesdropper and the jammer …
Traditional approaches to wireless communication security (eg, encryption) focus on maintaining the message integrity so that the contents are only accessible to the intended …