<> "The repository administrator has not yet configured an RDF license."^^ . <> . . . "Secrecy Performance of Cooperative Cognitive\r\nRadio Networks Under Joint Secrecy Outage and\r\nPrimary User Interference Constraints"^^ . "In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio\r\nNetwork (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three\r\nconstraints which include peak transmit power level and interference limitation with respect to the primary\r\nuser (PU) as well as secrecy outage constraints due to the EAV. Secrecy outage is achieved when the EAV\r\ncannot decode the targeted signal, but communications in the secondary network is still possible (non-zero\r\ncapacity exists). Approximation expressions of the secrecy outage probability and the probability of non-zero\r\nsecrecy capacity are derived to evaluate the secrecy performance. Monte Carlo simulations are provided to\r\nexamine the accuracy of the derived approximation expressions. Based on this, power allocation policies\r\nfor the SUs are derived, satisfying all the constraints while maximizing the secrecy performance as well as\r\nthe quality of service performance of the secondary network. It can be concluded that with knowledge of\r\nthe channel state information (CSI) of the EAV it is possible to calculate the optimal value for the secrecy\r\noutage threshold of the secondary user (SU) which in turn allows maximizing the secrecy performance. Most\r\ninterestingly, our numerical results illustrate that the secrecy performance of the system is much improved\r\nwhen the parameters obtained using the CSI of the EAV are calculated optimally. Thence, the system can\r\nadjust the power allocation so that no eavesdropping occurs even without reducing quality of service (QoS)\r\nperformance compared to a network without any EAV."^^ . "2020" . . "8" . . "IEEE Access"^^ . . . "21693536" . . . . . . . . . . . . . . . . "Elisabeth"^^ . "Uhlemann"^^ . "Elisabeth Uhlemann"^^ . . "Hung"^^ . "Tran"^^ . "Hung Tran"^^ . . "Truc Mai"^^ . "Tran"^^ . "Truc Mai Tran"^^ . . "Xuan Truong"^^ . "Quach"^^ . "Xuan Truong Quach"^^ . . . . . . "Secrecy Performance of Cooperative Cognitive\r\nRadio Networks Under Joint Secrecy Outage and\r\nPrimary User Interference Constraints (PDF)"^^ . . . "08964376.pdf"^^ . . . "Secrecy Performance of Cooperative Cognitive\r\nRadio Networks Under Joint Secrecy Outage and\r\nPrimary User Interference Constraints (Other)"^^ . . . . . . "indexcodes.txt"^^ . . . "Secrecy Performance of Cooperative Cognitive\r\nRadio Networks Under Joint Secrecy Outage and\r\nPrimary User Interference Constraints (Other)"^^ . . . . . . "lightbox.jpg"^^ . . . "Secrecy Performance of Cooperative Cognitive\r\nRadio Networks Under Joint Secrecy Outage and\r\nPrimary User Interference Constraints (Other)"^^ . . . . . . "preview.jpg"^^ . . . "Secrecy Performance of Cooperative Cognitive\r\nRadio Networks Under Joint Secrecy Outage and\r\nPrimary User Interference Constraints (Other)"^^ . . . . . . "medium.jpg"^^ . . . "Secrecy Performance of Cooperative Cognitive\r\nRadio Networks Under Joint Secrecy Outage and\r\nPrimary User Interference Constraints (Other)"^^ . . . . . . "small.jpg"^^ . . "HTML Summary of #3995 \n\nSecrecy Performance of Cooperative Cognitive \nRadio Networks Under Joint Secrecy Outage and \nPrimary User Interference Constraints\n\n" . "text/html" . . . "Information Technology (IT)"@en . . . "Scopus-indexed journals"@en . . . "ISI-indexed journals"@en . .