In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) transmitter (SU-Tx) communicates with multiple SU receivers (SU-Rxs). There exist multiple eavesdroppers (EAVs) who illegally listen to the secondary network communication. Further, the primary network consists of a primary user (PU) transmitter serving multiple PU receivers. In particular, the SU-Tx transmit power is subject to the joint constraint of PU outage and SU maximum transmit power limit. Moreover, we investigate the secondary network physical layer security in terms of average secrecy capacity for both cases of known and unknown channel information of the EAV at the SU-Tx. Numerical results are provided to evaluate the impact of the ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We co...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harve...
With fast growth of wireless services, secrecy has become an increasingly important issue for wirele...
peer reviewedWith fast growth of wireless services, secrecy has become an increasingly important iss...
The cognitive radio network (CRN) concept has been proposed as a solution to the growing demand and ...
In this study, the authors consider the physical‐layer security for transmission in underlay cogniti...
Increasingly, more spectrum bands are utilized for unlicensed use in wireless cognitive networks. It...
Vehicular communication has been envisioned to support a myriad of essential fifth-generation and be...
In this paper, we investigate secrecy capacity of a cognitive radio network based on stochastic geom...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We co...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harve...
With fast growth of wireless services, secrecy has become an increasingly important issue for wirele...
peer reviewedWith fast growth of wireless services, secrecy has become an increasingly important iss...
The cognitive radio network (CRN) concept has been proposed as a solution to the growing demand and ...
In this study, the authors consider the physical‐layer security for transmission in underlay cogniti...
Increasingly, more spectrum bands are utilized for unlicensed use in wireless cognitive networks. It...
Vehicular communication has been envisioned to support a myriad of essential fifth-generation and be...
In this paper, we investigate secrecy capacity of a cognitive radio network based on stochastic geom...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We co...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...