ABSTRACT
In this paper, we conduct an investigation into the security and reliability aspects of a cognitive non-orthogonal multiple access (NOMA) network operating under outage constraints imposed by multiple primary users (PUs). Specifically, we examine a scenario where secondary users (SUs) have the capability to operate in NOMA mode, allowing them to harness the licensed spectrum band of multiple PUs, provided that the interference generated by SUs remains below a predefined threshold. Given that context, both SUs and PUs are susceptible in this spectrum-sharing environment, a potential threat arises in the form of an eavesdropper who seeks to exploit the secrecy of messages exchanged among SUs. Given this setting, we derive a power allocation policy for the SUs, formulate closed-form expressions for outage probability (OP) and intercept probability (IP) to assess system performance, and analyze the trade-off between reliability and security. Finally, we supplement our findings with numerical examples and discussions to illustrate the proposed concepts.
- S. Arzykulov, G. Nauryzbayev, T. A. Tsiftsis, and B. Maham. 2019. Performance analysis of underlay cognitive radio non-orthogonal multiple access networks. IEEE Trans. Veh. Technol. 68, 9 (Sept. 2019), 9318–9322.Google ScholarCross Ref
- V. Aswathi and A. V. Babu. 2021. Performance Analysis of NOMA-Based Underlay Cognitive Radio Networks With Partial Relay Selection. IEEE Trans. Veh. Tech. 70, 5 (April 2021), 4615–4630.Google Scholar
- L. Dai, B. Wang, Z. Ding, Z. Wang, S. Chen, and L. Hanzo. 2018. A Survey of Non-Orthogonal Multiple Access for 5G. IEEE Communications Surveys Tutorials 20, 3 (thirdquarter 2018), 2294–2323. https://doi.org/10.1109/COMST.2018.2835558Google ScholarCross Ref
- V. N. Vo et al.2023. Outage Probability Minimization in Secure NOMA Cognitive Radio Systems With UAV Relay: A Machine Learning Approach. IEEE Trans. Cognitive Commun. and Networking 9, 2 (2023), 435–451. https://doi.org/10.1109/TCCN.2022.3226184Google ScholarCross Ref
- Youhong Feng, Shihao Yan, Zhen Yang, Nan Yang, and Jinhong Yuan. 2019. Beamforming Design and Power Allocation for Secure Transmission With NOMA. IEEE Transactions on Wireless Communications 18, 5 (2019), 2639–2651. https://doi.org/10.1109/TWC.2019.2906202Google ScholarDigital Library
- S. M. R. Islam, N. Avazov, O. A. Dobre, and K. Kwak. 2017. Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges. IEEE Communications Surveys Tutorials 19, 2 (Secondquarter 2017), 721–742. https://doi.org/10.1109/COMST.2016.2621116Google ScholarDigital Library
- J.N. Laneman, D.N.C. Tse, and G.W. Wornell. 2004. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory 50, 12 (2004), 3062–3080. https://doi.org/10.1109/TIT.2004.838089Google ScholarDigital Library
- M. Li, H. Yuan, C. Maple, W. Cheng, and G. Epiphaniou. 2023. Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks. IEEE Systems J. 17, 1 (2023), 1045–1055.Google ScholarCross Ref
- Xingwang Li, Mengyan Huang, Changsen Zhang, Dan Deng, Khaled M. Rabie, Yuan Ding, and Jianhe Du. 2019. Security and Reliability Performance Analysis of Cooperative Multi-Relay Systems With Nonlinear Energy Harvesters and Hardware Impairments. IEEE Access 7 (2019), 102644–102661. https://doi.org/10.1109/ACCESS.2019.2930664Google ScholarCross Ref
- Yuanwei Liu, Zhiguo Ding, Maged Elkashlan, and Jinhong Yuan. 2016. Nonorthogonal Multiple Access in Large-Scale Underlay Cognitive Radio Networks. IEEE Transactions on Vehicular Technology 65, 12 (2016), 10152–10157. https://doi.org/10.1109/TVT.2016.2524694Google ScholarCross Ref
- H. Nikopour and H. Baligh. 2013. Sparse code multiple access. In IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). 332–336. https://doi.org/10.1109/PIMRC.2013.6666156Google ScholarCross Ref
- Mustafa Ozger, Ecehan B. Pehlivanoglu, and Ozgur B. Akan. 2022. Energy-Efficient Transmission Range and Duration for Cognitive Radio Sensor Networks. IEEE Trans. Cognitive Commun. and Networking 8, 2 (2022), 907–918.Google ScholarCross Ref
- P.R. Patel and J.M. Holtzman. 1993. Analysis of a DS/CDMA successive interference cancellation scheme using correlations. In Proceedings of GLOBECOM ’93. IEEE Global Telecommunications Conference. 76–80 vol.1. https://doi.org/10.1109/GLOCOM.1993.318102Google ScholarCross Ref
- Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, Georges Kaddoum, and Quang Anh Tran. 2019. Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks. Wireless Networks 255 (2019). https://doi.org/10.1007/s11276-017-1605-zGoogle ScholarDigital Library
- Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, and Mai Tran Truc. 2020. Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints. IEEE Access 8 (2020), 18442–18455. https://doi.org/10.1109/ACCESS.2020.2968325Google ScholarCross Ref
- Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura. 2013. System-level performance evaluation of downlink non-orthogonal multiple access (NOMA). In IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). 611–615. https://doi.org/10.1109/PIMRC.2013.6666209Google ScholarCross Ref
- Y. Song, W. Yang, Z. Xiang, H. Wang, and F. Cao. 2020. Research on Cognitive Power Allocation for Secure Millimeter-Wave NOMA Networks. IEEE Trans. Veh. Tech. 69, 11 (2020), 13424–13436.Google ScholarCross Ref
- V. N. Vo, T. G. Nguyen, and H. Tran C. So-In. 2020. Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers. Mobile Netw. Appl. 2020 (Feb. 2020), 193–210.Google Scholar
- Peng Wang, Jun Xiao, and Li Ping. 2006. Comparison of orthogonal and non-orthogonal approaches to future wireless cellular systems. IEEE Vehicular Technology Magazine 1, 3 (2006), 4–11. https://doi.org/10.1109/MVT.2006.307294Google ScholarCross Ref
- Zhongwu Xiang, Weiwei Yang, Gaofeng Pan, Yueming Cai, and Yi Song. 2019. Physical Layer Security in Cognitive Radio Inspired NOMA Network. IEEE Journal of Selected Topics in Signal Processing 13, 3 (2019), 700–714. https://doi.org/10.1109/JSTSP.2019.2902103Google ScholarCross Ref
- Z. Yuan, G. Yu, W. Li, Y. Yuan, X. Wang, and J. Xu. 2016. Multi-User Shared Access for Internet of Things. In IEEE 83rd Vehicular Technology Conference (VTC Spring). 1–5. https://doi.org/10.1109/VTCSpring.2016.7504361Google ScholarCross Ref
Index Terms
- Security and Reliability Performance Analysis of Cognitive NOMA Network Under Outage Constraint of Multiple Primary Users
Recommendations
Optimal Power Allocation Strategies for Fading Cognitive Radio Channels with Primary User Outage Constraint
In this paper, we consider a cognitive radio (CR) network where a secondary (cognitive) user shares the spectrum for transmission with a primary (non-cognitive) user over block-fading (BF) channels. It is assumed that the primary user has a constant-...
Performance of Cognitive Radios in Dynamic Fading Channels Under Primary Outage Constraint
This article investigates the performance of a cognitive user in a dynamic fading environment. The cognitive user communicates, using a spectrum-sharing technology, over a channel reserved to a primary user (PU). The transmit power of the cognitive user ...
Optimal power allocation for cognitive radio under primary users outage loss constraint
ICC'09: Proceedings of the 2009 IEEE international conference on CommunicationsIn this paper, we consider a secondary link sharing the spectrum with a primary link in a fading cognitive radio (CR) network. Instead of applying the conventional interference power constraint at the primary user (PU) receiver for the secondary user (...
Comments