In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impai...
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We co...
In this paper, we study secure transmission designs for underlay cognitive radio networks in the pre...
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optim...
This paper investigates the secrecy performance of an underlay cooperative cognitive relaying networ...
This paper investigates the secrecy performance of an underlay cooperative cognitive relaying networ...
This paper investigates the secrecy performance of an underlay cooperative cognitive relaying networ...
This paper investigates the secrecy performance of an underlay cooperative cognitive relaying networ...
In this paper, an underlay cooperative cognitive network using a non-orthogonal multiple access (UCC...
Security performance and the impact of imperfect channel state information (CSI) in underlay coopera...
Relay communication has advantages over direct transmission in terms of secrecy capacity. In this pa...
Relay communication has advantages over direct transmission in terms of secrecy capacity. In this pa...
Relay communication has advantages over direct transmission in terms of secrecy capacity. In this pa...
We consider physical-layer security in a novel MISO cooperative overlay cognitive radio network (CRN...
In this paper, we evaluate probability of non-zero secrecy capacity of multi-hop relay networks over...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We co...
In this paper, we study secure transmission designs for underlay cognitive radio networks in the pre...
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optim...
This paper investigates the secrecy performance of an underlay cooperative cognitive relaying networ...
This paper investigates the secrecy performance of an underlay cooperative cognitive relaying networ...
This paper investigates the secrecy performance of an underlay cooperative cognitive relaying networ...
This paper investigates the secrecy performance of an underlay cooperative cognitive relaying networ...
In this paper, an underlay cooperative cognitive network using a non-orthogonal multiple access (UCC...
Security performance and the impact of imperfect channel state information (CSI) in underlay coopera...
Relay communication has advantages over direct transmission in terms of secrecy capacity. In this pa...
Relay communication has advantages over direct transmission in terms of secrecy capacity. In this pa...
Relay communication has advantages over direct transmission in terms of secrecy capacity. In this pa...
We consider physical-layer security in a novel MISO cooperative overlay cognitive radio network (CRN...
In this paper, we evaluate probability of non-zero secrecy capacity of multi-hop relay networks over...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We co...
In this paper, we study secure transmission designs for underlay cognitive radio networks in the pre...
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optim...