A review of security issues and solutions for precision health in Internet-of-Medical-Things systems

N Li, M Xu, Q Li, J Liu, S Bao, Y Li, J Li… - Security and …, 2023 - sands.edpsciences.org
Precision medicine provides a holistic perspective of an individual's health, including
genetic, environmental, and lifestyle aspects to realize individualized therapy. The …

Energy efficiency analysis of cooperative jamming in cognitive radio networks with secrecy constraints

F Gabry, A Zappone, R Thobaben… - IEEE Wireless …, 2015 - ieeexplore.ieee.org
We investigate energy-efficient cooperation for secrecy in cognitive radio networks. In
particular, we consider a four-node cognitive scenario where the secondary receiver is …

Enhancing secrecy rate in cognitive radio networks via stackelberg game

A Al-Talabani, Y Deng, A Nallanathan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, a game theory-based cooperation scheme is investigated to enhance the
physical layer security in both primary and secondary transmissions of a cognitive radio …

New bandwidth efficient relaying schemes in cooperative cognitive two-way relay networks with physical layer security

AH Abd El-Malek, AM Salhab… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, a new cooperative two-way cognitive relaying scheme is proposed. In this
model, a primary user (PU) network consisting of two PU sources communicate with each …

Evolutionary game-based secrecy rate adaptation in wireless sensor networks

G Jiang, S Shen, K Hu, L Huang… - International Journal of …, 2015 - journals.sagepub.com
Physical layer security, whose aim is to maximize the secrecy rate of a source while keeping
eavesdroppers ignorant of data transmitted, is extremely suitable for Wireless Sensor …

Multi-phase smart relaying and cooperative jamming in secure cognitive radio networks

PH Lin, F Gabry, R Thobaben… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, we investigate cooperative secure communications in a four-node cognitive
radio network where the secondary receiver is treated as a potential eavesdropper with …

Secure transmission with guaranteed user satisfaction in heterogeneous networks: A two-level stackelberg game approach

N Wu, X Zhou, M Sun - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
In this paper, secure transmission in a heterogeneous network in the presence of multiple
eavesdroppers is studied. A game-theoretic framework is proposed to enhance the security …

Energy efficient optimization for physical layer security in cognitive relay networks

J Ouyang, WP Zhu, D Massicotte… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
This paper is concerned with the energy efficiency of secure transmission in an underlay
cognitive relay network (CRN), where a secondary source communicates with a secondary …

Multi-slot spectrum sensing schedule and transmitted energy allocation in harvested energy powered cognitive radio networks under secrecy constraints

TNK Hoan, I Koo - IEEE Sensors Journal, 2017 - ieeexplore.ieee.org
Herein, the authors consider harvested energy powered cognitive radio networks (CRNs) in
which harvested energy is stored in a rechargeable battery which has finite capacity. In …

Distributed joint resource and power allocation in self-organized femtocell networks: A potential game approach

A Shahid, S Aslam, HS Kim, KG Lee - Journal of network and computer …, 2014 - Elsevier
Femtocells, which are widely deployed within a macrocell, are considered to be a novel
technology that leads to the escalation of indoor coverage and capacity. However, due to …