Cai, Yueming; Xu, Xiaoming; He, Biao; Yang, Weiwei; Zhou, Xiangyun
In this paper, we study secure transmission designs for underlay cognitive radio networks in the present of randomly distributed eavesdroppers. We consider the scenario where a secondary transmitter sends confidential messages to a secondary receiver subject to an interference constraint set by the primary user. We design two transmission protocols under different channel knowledge assumptions at the transmitter. For each protocol, we first give a comprehensive performance analysis to...[Show more]
Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.