Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Nov 12, 2015 · In this paper, we consider using the SUs' interference to improve the PU's secrecy capacity and providing the SUs the opportunity to access the ...
People also ask
In this paper, we tackle the problem of secure data transmission between a secondary user transmitter and receiver through a relay in the presence of an ...
In a cognitive radio (CR) network, the transmitting signal of a secondary user (SU) is traditionally considered to be harmful for the primary user (PU), ...
Dive into the research topics of 'Interference Improves PHY Security for Cognitive Radio Networks'. Together they form a unique fingerprint. Sort by; Weight ...
Turning interference weakness into PHY security enhancement for cognitive radio networks. Abstract: Traditionally, the transmitting power of secondary users ...
Jul 2, 2015 · This article investigates the physical-layer security of cognitive radio (CR) networks, which are vulnerable to various newly arising ...
This Cognitive radio has proved to be a promising solution to improve the utilization of the radio spectrum. This new concept allows different wireless networks ...
This means that when the density of eavesdroppers increases, they have a higher prob- ability that they are close to the secondary users. Thus, the interference ...
This paper investigates the secrecy performance of an underlay cognitive radio network (CRN) with outdated channel state information (CSI) for two practical ...
In this paper, we investigate the secondary network physical layer security under the outage constraint of the primary user (PU) receiver and interference from ...