Resource allocation for cognitive radio with primary user secrecy outage constraint
D Xu, Q Li - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
We consider a cognitive radio network where multiple secondary users (SUs) coexist with a
primary user (PU). There exist multiple eavesdroppers (EAVs) who attempt to overhear the …
primary user (PU). There exist multiple eavesdroppers (EAVs) who attempt to overhear the …
Outage analysis of opportunistic relay selection in underlay cooperative cognitive networks under general operation conditions
K Ho-Van - IEEE Transactions on Vehicular Technology, 2015 - ieeexplore.ieee.org
This paper investigates the impact of practical operation conditions such as channel
information imperfection (CII), independent nonidentical (ini) fading distributions, strict power …
information imperfection (CII), independent nonidentical (ini) fading distributions, strict power …
Minimizing secrecy outage probability for primary users in cognitive radio networks
Q Li, D Xu - AEU-International Journal of Electronics and …, 2018 - Elsevier
This paper considers a cognitive radio network with a set of secondary users (SUs) who
share a spectrum band licensed to a primary user (PU). The PU is assumed to be …
share a spectrum band licensed to a primary user (PU). The PU is assumed to be …
Exact outage analysis of underlay cooperative cognitive networks with reactive relay selection under imperfect channel information
K Ho-Van - Wireless Personal Communications, 2015 - Springer
This paper investigates the effect of imperfect channel information on the outage
performance of underlay cooperative cognitive networks with reactive relay selection under …
performance of underlay cooperative cognitive networks with reactive relay selection under …
Achievable secrecy capacity in an underlay cognitive radio network
L Sibomana, HJ Zepernick… - 2014 IEEE Conference on …, 2014 - ieeexplore.ieee.org
In this paper, we consider a spectrum sharing cognitive radio network where a secondary
user (SU) transmitter (SU-Tx) communicates with multiple SU receivers (SU-Rxs). There …
user (SU) transmitter (SU-Tx) communicates with multiple SU receivers (SU-Rxs). There …
On the Performance of Opportunistic Relay Selection in Cognitive Radio Networks with Primary User's Interference and Direct Channel
K Ho-Van, L Pham-Hong, S Vo-Que… - Wireless Personal …, 2016 - Springer
This paper analyzes outage performance of opportunistic relay selection in cognitive radio
networks with primary user's interference and direct channel over independent non …
networks with primary user's interference and direct channel over independent non …
On the Outage Performance of Reactive Relay Selection in Cooperative Cognitive Networks Over Nakagami-m Fading Channels
K Ho-Van - Wireless Personal Communications, 2017 - Springer
This paper evaluates outage performance of reactive relay selection in cognitive radio
networks over Nakagami-m fading channels under consideration of imperfect channel …
networks over Nakagami-m fading channels under consideration of imperfect channel …
Optimal power allocation for cognitive radio networks with primary user secrecy rate loss constraint
D Xu, Q Li - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
This paper considers a cognitive radio (CR) network in the presence of a malicious
eavesdropper who attempts to receive confidential messages from a pair of primary users …
eavesdropper who attempts to receive confidential messages from a pair of primary users …
Impact of secondary user communication on security communication of primary user
L Sibomana, H Tran, QA Tran - Security and Communication …, 2015 - Wiley Online Library
Cognitive radio network concept has been considered as a promising solution to improve
the spectrum utilization. However, it may be vulnerable to security problems as the primary …
the spectrum utilization. However, it may be vulnerable to security problems as the primary …
Symbol Error Probability of Secondary User in Underlay Cognitive Radio Networks with Adaptive Transmit Power Constraint
HS Nguyen, NXH Nguyen, QP Ma, J Jalowiczor… - … , Services and Security …, 2020 - Springer
The objective of this paper is to study the performance of a cognitive radio network (CRN)
under the influence of an eavesdropper (EAV) which can wiretap the primary user (PU) …
under the influence of an eavesdropper (EAV) which can wiretap the primary user (PU) …