Covert communication in underlay multi-antenna cognitive radio networks

H Fan, W Yang, H Shi, G Pan, J Si… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this paper, we investigated a multi-antenna covert communication in underlay cognitive
radio networks (UCRNs), by considering both cases that Willie has the perfect and statistical …

Secure V2V communications in relay-assisted cognitive radio vehicular networks with imperfect CSI

Y Zhang, J Hou, X Zhao - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
This article considers a relay-based underlay cognitive radio vehicular network, where a
secondary source vehicle transmits information to a secondary destination vehicle with a …

Secrecy performance optimization of SWIPT wireless networks in partial secrecy regime

S Thakur, S Thakor - IEEE Transactions on Green …, 2024 - ieeexplore.ieee.org
This work considers a single-input-single-output (SISO) simultaneous wireless information
and power transfer (SWIPT) system, which comprises a single-antenna transmitter named …

Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User

SP Indraganti, S Vappangi - IEEE Access, 2024 - ieeexplore.ieee.org
In this paper, we investigate the integration of physical layer security (PLS) and cognitive
radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral …

Rate-Splitting Multiple Access for Secure Communications Over CR MISO SWIPT Systems With Non-Linear EH Users

CE Garcia, MR Camana, J Querol… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this paper, we investigate a secure transmission for a rate-splitting multiple-access
(RSMA)-based multiple-input single-output (MISO) underlay cognitive radio (CR) system …

Secrecy performance intelligent prediction for CRNs: An Self-CondenseNet approach

Y Zeng, D Zhang, B Chen, P Jia, J Sun - AEU-International Journal of …, 2024 - Elsevier
This paper studies the physical layer security (PLS) of cognitive radio networks (CRNs) with
Fisher–Snedecor F distribution. To resolve the security issues within CRNs, we derived …

Investigations on Secrecy Performance of Downlink Overlay CR-NOMA System With SIC Imperfections

KK Godugu, S Vappangi - IEEE Access, 2024 - ieeexplore.ieee.org
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two technologies
witnessed to offer tremendous possibilities for the next generation wireless networks to …

Hybrid selection combining scheme for correlated cooperative communication over κ-μ fading channels

S Kirubakaran, MD Selvaraj - Physical Communication, 2024 - Elsevier
Due to poor (limited) scattering, a correlation among channels is inevitable, resulting in
performance degradation of wireless communication systems. In this paper, we propose a …

Joint channel allocation and transmit power control for underlay EH‐CRNs: A clustering‐based multi‐agent DDPG approach

X Liu, X Kuang, Z Li, K Zheng - IET Communications, 2024 - Wiley Online Library
To address the concerns of energy supply and spectrum scarcity for wireless devices,
energy harvesting cognitive radio networks have been proposed. To improve spectrum …

Secrecy Analysis of NOMA System with Imperfect SIC in Overlay Cognitive Radio Networks

KK Godugu, S Vappangi - 2023 3rd International Conference …, 2023 - ieeexplore.ieee.org
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) can be regarded as two
promising technologies which bestows with tremendous possible solutions for the next …