Abstract—Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage multitier hierarchical networks. Securing data transmission in these networks is of the utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information (CSI) of the eavesdropper’s channel is not available at the secondary transmitter. We present new closed-form expressions for the exact and a...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In limited space scenarios, the antennas in the multiantenna cognitive radio (CR) system are closely...
We consider an underlay cognitive network with secondary users that support full-duplex communicatio...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
This paper considers a single-input-multiple-output underlay cognitive wiretap system over Nakagami-...
This paper considers a single-input-multiple-output underlay cognitive wiretap system over Nakagami-...
This paper considers a single-input-multiple-output underlay cognitive wiretap system over Nakagami-...
This paper considers a multiple-input-multiple-output (MIMO) cognitive wiretap system over Nakagami-...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
This paper investigates a secure transmission in the multiple-input multiple-output (MIMO) cognitive...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
We consider an underlay cognitive network with secondary users that support full-duplex communicatio...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In limited space scenarios, the antennas in the multiantenna cognitive radio (CR) system are closely...
We consider an underlay cognitive network with secondary users that support full-duplex communicatio...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
This paper considers a single-input-multiple-output underlay cognitive wiretap system over Nakagami-...
This paper considers a single-input-multiple-output underlay cognitive wiretap system over Nakagami-...
This paper considers a single-input-multiple-output underlay cognitive wiretap system over Nakagami-...
This paper considers a multiple-input-multiple-output (MIMO) cognitive wiretap system over Nakagami-...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
This paper investigates a secure transmission in the multiple-input multiple-output (MIMO) cognitive...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
We consider an underlay cognitive network with secondary users that support full-duplex communicatio...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In limited space scenarios, the antennas in the multiantenna cognitive radio (CR) system are closely...
We consider an underlay cognitive network with secondary users that support full-duplex communicatio...