Attacker identification and intrusion detection for in-vehicle networks

J Ning, J Wang, J Liu, N Kato - IEEE communications letters, 2019 - ieeexplore.ieee.org
As the most wide-spread in-vehicle data bus protocol, CAN (Controller Area Network) has
attracted more and more attention due to its lack of security protection mechanism. A variety …

Secrecy performance analysis with relay selection methods under impact of co‐channel interference

TT Duy, TQ Duong, TL Thanh, VNQ Bao - IET Communications, 2015 - Wiley Online Library
In this study, the authors evaluate secrecy performance of cooperative protocols with relay
selection methods under impact of co‐channel interference. In particular, the authors …

Secrecy outage performance of a cooperative cognitive relay network

P Chakraborty, S Prakriya - IEEE Communications Letters, 2016 - ieeexplore.ieee.org
In this letter, we analyze the physical layer secrecy performance of a two-hop cooperative
cognitive underlay relay network with a decode and forward relay and a passive …

Secure full-duplex spectrum-sharing wiretap networks with different antenna reception schemes

T Zhang, Y Cai, Y Huang, TQ Duong… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of full-duplex multi-antenna spectrum-
sharing wiretap networks in which a jamming signal is simultaneously transmitted by the full …

Secure transmission in cognitive MIMO relaying networks with outdated channel state information

T Zhang, Y Cai, Y Huang, TQ Duong, W Yang - IEEE Access, 2016 - ieeexplore.ieee.org
In this paper, we introduce transmit antenna selection/maximal-ratio combining (TAS/MRC)
scheme in dual-hop randomize-and-forward (RaF) cognitive multiple-input multiple-output …

Secrecy performance review for IoT-based cognitive farming system

K Chopra, MA Alam - Recent Patents on Engineering, 2024 - benthamdirect.com
Smart farm management has complex challenges; therefore, there is a need to improve the
overall adaptability, profitability, and environmental soundness of the farming systems …

Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints

TX Quach, H Tran, E Uhlemann, MT Truc - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio
Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are …

Secure Cooperative Half-Duplex Cognitive Radio Networks With -th Best Relay Selection

MN Nguyen, NP Nguyen, DB Da Costa… - IEEE …, 2017 - ieeexplore.ieee.org
In this paper, we study the secrecy performance of a half-duplex cognitive relay network in
the presence of multiple eavesdroppers and multiple primary users. In particular, generic K …

Secure multiantenna cognitive wiretap networks

T Zhang, Y Huang, Y Cai, C Zhong… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a multiantenna cognitive wiretap
network, where the secondary transmitter (Alice) communicates with the secondary receiver …

Secure communications in cognitive underlay networks over Nakagami-m channel

NP Nguyen, TL Thanh, TQ Duong… - Physical Communication, 2017 - Elsevier
In this paper, the secure communication of a cognitive radio network (CRN) over Nakagami-
m fading channel is investigated. An underlay protocol is used in the considered network …