Biblio
Filters: Author is Khodeir, Mahmoud A. [Clear All Filters]
Physical-Layer Security in Underlay Cognitive Radio System with Full-Duplex Secondary User over Nakagami-m Fading Channel. 2022 13th International Conference on Information and Communication Systems (ICICS). :495–501.
.
2022. In this paper, we study an underlay Cognitive Radio (CR) system with energy harvesting over Nakagami-m fading channel. This system consists of a secondary source, a secondary receiver, a primary receiver and a single eavesdropper. The source in the secondary network has one antenna and transmits information to the secondary receiver equipped with two separated antennas to operate in a Full-Duplex (FD) mode. The upper and lower bounds for the Strictly Positive Secrecy Capacity (SPSC) are derived and the numerical results demonstrate that the performance of the proposed system can be improved by increasing the average channel power gain between the source and the destination. Here, the lower and upper bounds are merged to form the exact SPSC when the total interference is below a predefined limit.
On Secrecy Performance in Underlay Cognitive Radio Networks with EH and TAS over α-μ Channel. 2022 13th International Conference on Information and Communication Systems (ICICS). :463–468.
.
2022. This paper investigates the secrecy outage performance of Multiple Input Multiple Output (MIMO) secondary nodes for underlay Cognitive Radio Network (CRN) over α–μ fading channel. Here, the proposed system consists of one active eavesdropper and two primary nodes each with a single antenna. The power of the secondary transmitter depends on the harvested energy from the primary transmitter to save more energy and spectrum. Moreover, a Transmit Antenna Selection (TAS) scheme is adopted at the secondary source, while the Maximal Ratio Combining (MRC) technique is employed at the secondary receiver to optimize the quality of the signal. A lower bound closed-form phrase for the secrecy outage performance is derived to demonstrate the effects of the channel parameters. In addition, numerical results illustrate that the number of source transmit antennas, destination received antenna, and the eavesdropper received antenna have significant effects on improving the secrecy performance.