With the development of Internet of Things (IoTs), devices are now connecting and communicating together on a heretofore unheard-of scale, forming huge heterogeneous networks of mobile IoT-enabled devices. For beyond 5G- (B5G-) enabled networks, this raises concerns in terms of spectral resource allocation and associated security. Cognitive radio is one effective solution to such a spectrum sharing issue which can be adopted to these B5G networks, which works on the principle of sharing spectrum between primary and secondary users. In this paper, we develop the confidentiality of cognitive radio network (CRNs) for IoT over k-μ fading channels, with the information transmitted between secondary networks with multiple cooperative eavesdropper...
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system trans...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harve...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
peer-reviewedWith the development of Internet of Things (IoTs), devices are now connecting and commu...
At present, the fifth generation (5G) communication networks are in the time of large-scale deployme...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system trans...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harve...
With the development of Internet of Things (IoTs), devices are now connecting and communicating toge...
peer-reviewedWith the development of Internet of Things (IoTs), devices are now connecting and commu...
At present, the fifth generation (5G) communication networks are in the time of large-scale deployme...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In Rician-fading scenario, cognitive radio networks (CRNs) with a source in a secondary system trans...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harve...