2021 18th International Joint Conference on Computer Science and Software Engineering (JCSSE) 2021
DOI: 10.1109/jcsse53117.2021.9493817
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security in Cognitive Radio Networks for IoT Using UAV With Reconfigurable Intelligent Surfaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…A TRIS is used in the secondary network to manage the secondary network's interference and prevent information leakage. More recently, a more complicated ARIS-assisted CR network was studied in [116]. In particular, the primary transmitter communicates with multiple primary GUs but is interfered by the secondary network, where the secondary transmitter transmits the information to multiple secondary GUs with the help of ARIS.…”
Section: E Cognitive Radiomentioning
confidence: 99%
See 1 more Smart Citation
“…A TRIS is used in the secondary network to manage the secondary network's interference and prevent information leakage. More recently, a more complicated ARIS-assisted CR network was studied in [116]. In particular, the primary transmitter communicates with multiple primary GUs but is interfered by the secondary network, where the secondary transmitter transmits the information to multiple secondary GUs with the help of ARIS.…”
Section: E Cognitive Radiomentioning
confidence: 99%
“…2) Aerial RIS: Besides improving communication links, ARIS can also be used to enhance the secrecy of RANTN networks [116], [151]- [154]. In this context, the works in [151] and [152] considered the problem of secure transmissions between a legitimate pair of source and destination ground nodes communicating through an ARIS under the presence of a ground eavesdropper.…”
Section: F Physical Layer Securitymentioning
confidence: 99%
“…In [26], the authors considered multiple UAVs communication networks carrying RISs and clustered the ground users to finally maximized the minimum rate for multi-user clusters. The authors of literatures [27,28] considered all the security issues to improve the security performance of the communication network with the help of UAVs and RIS. The authors in [29][30][31] all considered the multi-user models.…”
Section: Introductionmentioning
confidence: 99%
“…We have also done the detailed research on related work. The combination of UAVs and RIS can usually be divided into two types, which are UAVs carrying RIS [25][26][27][28] and RIS built on the surface of buildings [29][30][31][32][33][34][35]. The authors in [25] maximized the user's information rate by alternately optimizing the position of the UAV and the phase of the RIS.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation