RIS-assisted physical layer security in emerging RF and optical wireless communication systems: A comprehensive survey
Security and latency are crucial aspects in the design of future wireless networks. Physical
layer security (PLS) has received a growing interest from the research community in recent …
layer security (PLS) has received a growing interest from the research community in recent …
Joint Impact of Nodes Mobility and Imperfect Channel Estimates on the Secrecy Performance of Cognitive Radio Vehicular Networks Over Nakagami-m Fading …
This paper investigates the joint impact of nodes' mobility and imperfect channel estimates
on the secrecy performance of an underlay cognitive radio vehicular network over Nakagami …
on the secrecy performance of an underlay cognitive radio vehicular network over Nakagami …
RIS-aided physical layer security improvement in underlay cognitive radio networks
Reconfigurable intelligent surface (RIS) technology is considered one of the leading
technologies for sixth-generation wireless communication, and it has also been revealed to …
technologies for sixth-generation wireless communication, and it has also been revealed to …
Overlay cognitive radio networks enabled energy harvesting with random AF relays
In this paper, we investigate an overlay cognitive radio network (CRN) in which one user is
selected among multiple secondary users (SUs) to harvest energy from primary …
selected among multiple secondary users (SUs) to harvest energy from primary …
Relay selection for improving physical layer security in D2D underlay communications
This paper investigates the physical layer security of inband underlay Device-to-Device
(D2D) communication, where the direct link between D2D users is not available. In this …
(D2D) communication, where the direct link between D2D users is not available. In this …
Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting
a vast array of devices, underscoring the critical need for robust data security, particularly at …
a vast array of devices, underscoring the critical need for robust data security, particularly at …
Deep-Q Learning for Distributed Spectrum Reuse Maximization in Underlay Cognitive Radio Systems
In this letter, we consider the problem of maximizing spectrum reuse in an underlay cognitive
radio (CR) system where multiple secondary transmitters (STs) are communicating with the …
radio (CR) system where multiple secondary transmitters (STs) are communicating with the …
Secrecy outage performance of NOMA relay networks using partial relay selection in the presence of multiple colluding eavesdroppers
Nowadays, security becomes one of the utmost important issues in designing mobile
communication networks, especially for non-orthogonal multiple access (NOMA), in which …
communication networks, especially for non-orthogonal multiple access (NOMA), in which …
Security in physical layer of cognitive radio networks
DH Tashman, W Hamouda - 2022 - IET
Fifth-generation (5G) networks and beyond are anticipated to support a vast number of
connections and services. Due to the enormous amount of confidential data shared between …
connections and services. Due to the enormous amount of confidential data shared between …
Joint channel allocation and transmit power control for underlay EH‐CRNs: A clustering‐based multi‐agent DDPG approach
To address the concerns of energy supply and spectrum scarcity for wireless devices,
energy harvesting cognitive radio networks have been proposed. To improve spectrum …
energy harvesting cognitive radio networks have been proposed. To improve spectrum …