In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU communication from the interference of the SU and the risks of eavesdropping, the SU must have a reasonable adaptive transmission power which is set on the basis of channel state information, interference and security constraints of the PU. Accordingly, an upper bound and lower bound for the SU transmission power are derived. Furthermore, a power allocation...
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We co...
In a cognitive radio (CR) network, the transmitting signal of a secondary user (SU) is traditionally...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system trans...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harve...
The present contribution investigates the physical layer security in a cognitive radio network (CRN)...
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We co...
In a cognitive radio (CR) network, the transmitting signal of a secondary user (SU) is traditionally...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system trans...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harve...
The present contribution investigates the physical layer security in a cognitive radio network (CRN)...
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We co...
In a cognitive radio (CR) network, the transmitting signal of a secondary user (SU) is traditionally...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...