Secure transmission in cognitive satellite terrestrial networks
This paper investigates the physical layer security of a satellite network, whose downlink
spectral resource is shared with a terrestrial cellular network. We propose to employ a multi …
spectral resource is shared with a terrestrial cellular network. We propose to employ a multi …
Secrecy Capacity Analysis Over Fading Channels
In this letter, we study the secrecy capacity of the classic Wyner's model over the α-μ fading
channels, where α and μ specify the nonlinearity and clustering of fading channels …
channels, where α and μ specify the nonlinearity and clustering of fading channels …
On secure NOMA systems with transmit antenna selection schemes
This paper investigates the secrecy performance of a two-user downlink non-orthogonal
multiple access systems. Both single-input and single-output and multiple-input and single …
multiple access systems. Both single-input and single-output and multiple-input and single …
Software defined space-terrestrial integrated networks: Architecture, challenges, and solutions
A space and terrestrial integrated network (STIN) converges satellite communication
networks, mobile wireless networking, and the Internet, has greatly extended the scope of …
networks, mobile wireless networking, and the Internet, has greatly extended the scope of …
On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection
In this paper, we consider an underlay multiple-input-multiple-output (MIMO) cognitive radio
network (CRN) including a pair of primary nodes, a couple of secondary nodes, and an …
network (CRN) including a pair of primary nodes, a couple of secondary nodes, and an …
Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- Channels
This paper considers a multiple-input-multiple-output (MIMO) cognitive wiretap system over
Nakagami-m channels with generalized selection combining (GSC), where confidential …
Nakagami-m channels with generalized selection combining (GSC), where confidential …
Multi-antenna wireless legitimate surveillance systems: Design and performance analysis
To improve national security, government agencies have long been committed to enforcing
powerful surveillance measures on suspicious individuals or communications. In this paper …
powerful surveillance measures on suspicious individuals or communications. In this paper …
Secrecy outage of max–min TAS scheme in MIMO-NOMA systems
This paper considers a secure nonorthogonal multiple access system, where confidential
messages are transmitted from a base station to multiple legitimate destinations and …
messages are transmitted from a base station to multiple legitimate destinations and …
A comprehensive review of cooperative MIMO WSN: its challenges and the emerging technologies
S Asheer, S Kumar - Wireless Networks, 2021 - Springer
The distributed nodes of a Wireless Sensor Network (WSN) cooperate among themselves to
emulate a virtual multi-antenna system to get similar benefits as the conventional MIMO …
emulate a virtual multi-antenna system to get similar benefits as the conventional MIMO …
Energy-aware relay selection improves security-reliability tradeoff in energy harvesting cooperative cognitive radio systems
P Yan, Y Zou, X Ding, J Zhu - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
This article investigates the physical layer security for a cooperative cognitive radio (CCR)
system with energy-harvesting (EH) technique, which consists of a cognitive source (CS) …
system with energy-harvesting (EH) technique, which consists of a cognitive source (CS) …