At present, the fifth generation (5G) communication networks are in the time of large-scale deployment principally because its characteristics consists of large bandwidth, fast response, and high stability. As a partner of 5G, the Internet of Things (IoT) involves billions of devices around the world, which can make the wireless communication environment more intelligent and convenient. However, the problem that cannot be ignored is the physical layer security of 5G-IoT networks. Based on this, we perform a security analysis of cognitive radio networks (CRN) for IoT, where the CRN is the single-input multiple-output (SIMO) model experiencing κ-μ shadowed fading with multiple eavesdroppers. To analyze the confidentiality of the system under ...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
peer-reviewedWith the development of Internet of Things (IoTs), devices are now connecting and commu...
In this article we explore the security issues on physical layer for cognitive radio networks. First...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system trans...
Abstract We propose and analyze minimum selection-generalized selection combining (MS-GSC) at second...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
peer-reviewedWith the development of Internet of Things (IoTs), devices are now connecting and commu...
In this article we explore the security issues on physical layer for cognitive radio networks. First...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system trans...
Abstract We propose and analyze minimum selection-generalized selection combining (MS-GSC) at second...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...
In this letter, we consider a single-input multiple-output cognitive wiretap system over generalized...