Resource allocation for secure communications in cooperative cognitive wireless powered communication networks

D Xu, Q Li - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
We consider a cognitive wireless powered communication network sharing the spectrum
with a primary network, which faces security threats from eavesdroppers (EAVs). We …

Minimizing secrecy outage probability for primary users in cognitive radio networks

Q Li, D Xu - AEU-International Journal of Electronics and …, 2018 - Elsevier
This paper considers a cognitive radio network with a set of secondary users (SUs) who
share a spectrum band licensed to a primary user (PU). The PU is assumed to be …

Offloading data traffic via cognitive small cells with wireless powered user equipments

D Xu, Q Li - EURASIP Journal on Wireless Communications and …, 2017 - Springer
This paper investigates data traffic offloading by considering a third-party cognitive small cell
with wireless powered user equipments (UEs) providing data traffic offloading service to a …

A linkable ring signature electronic cash scheme based on blockchain

X Liu, M Zhang, Y Zheng, Y Yang - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Aiming at the problem of repetitive spending in the current blockchain e-cash transactions, a
linkable ring signature scheme is proposed for blockchain. Based on the linkability of the …

A three-stage stackelberg game for secure communication with a wireless powered jammer

Q Li, D Xu - 2019 11th International Conference on Wireless …, 2019 - ieeexplore.ieee.org
This paper investigates physical layer security of a pair of legitimate source-destination
nodes in the presence of an eavesdropper. Specifically, the source-destination pair hires a …

Optimal power control and spectrum sensing for throughput maximisation in cognitive radio systems under PUEA

M Karimi, Z Dehghani, SMS Sadough… - IET …, 2019 - Wiley Online Library
The authors propose an optimal joint power control and multi‐band spectrum sensing
scheme for cognitive radio (CR) systems to increase the spectral efficiency and to overcome …

Secrecy Capacity and Energy Efficiency of Spectrum Sharing Networks Incorporating Physical Layer Security

YL Foo - arXiv preprint arXiv:2109.09132, 2021 - arxiv.org
Underutilized wireless channel is a waste of spectral resource. Eavesdropping compromises
data secrecy. How to overcome the two problems with one solution? In this paper, we …

Secure Transmission in Multicarrier Power-Splitting Wireless Powered Communication Networks with Full-duplex Receivers

Q Li, D Xu - 2019 IEEE 19th International Conference on …, 2019 - ieeexplore.ieee.org
We consider a three-node multicarrier network consisting of a source node, a wireless
powered full-duplex destination node, and an eavesdropper. The destination node is …

Legitimate surveillance with a wireless powered monitor in rayleigh fading channels

D Xu, Q Li - IEICE Transactions on Fundamentals of Electronics …, 2018 - search.ieice.org
This letter investigates the performance of a legitimate surveillance system, where a wireless
powered legitimate monitor aims to eavesdrop a suspicious communication link. Power …

Joint resource allocation for frequency-domain artificial noise assisted multiuser wiretap OFDM channels with finite-alphabet inputs

L Fan, B Tang, Q Jiang, F Liu, C Yin - Symmetry, 2019 - mdpi.com
The security issue on the physical layer is of significant challenge yet of paramount
importance for 5G communications. In some previous works, transmit power allocation has …