skip to main content
10.1145/3628797.3628862acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

Security and Reliability Performance Analysis of Cognitive NOMA Network Under Outage Constraint of Multiple Primary Users

Published:07 December 2023Publication History

ABSTRACT

In this paper, we conduct an investigation into the security and reliability aspects of a cognitive non-orthogonal multiple access (NOMA) network operating under outage constraints imposed by multiple primary users (PUs). Specifically, we examine a scenario where secondary users (SUs) have the capability to operate in NOMA mode, allowing them to harness the licensed spectrum band of multiple PUs, provided that the interference generated by SUs remains below a predefined threshold. Given that context, both SUs and PUs are susceptible in this spectrum-sharing environment, a potential threat arises in the form of an eavesdropper who seeks to exploit the secrecy of messages exchanged among SUs. Given this setting, we derive a power allocation policy for the SUs, formulate closed-form expressions for outage probability (OP) and intercept probability (IP) to assess system performance, and analyze the trade-off between reliability and security. Finally, we supplement our findings with numerical examples and discussions to illustrate the proposed concepts.

References

  1. S. Arzykulov, G. Nauryzbayev, T. A. Tsiftsis, and B. Maham. 2019. Performance analysis of underlay cognitive radio non-orthogonal multiple access networks. IEEE Trans. Veh. Technol. 68, 9 (Sept. 2019), 9318–9322.Google ScholarGoogle ScholarCross RefCross Ref
  2. V. Aswathi and A. V. Babu. 2021. Performance Analysis of NOMA-Based Underlay Cognitive Radio Networks With Partial Relay Selection. IEEE Trans. Veh. Tech. 70, 5 (April 2021), 4615–4630.Google ScholarGoogle Scholar
  3. L. Dai, B. Wang, Z. Ding, Z. Wang, S. Chen, and L. Hanzo. 2018. A Survey of Non-Orthogonal Multiple Access for 5G. IEEE Communications Surveys Tutorials 20, 3 (thirdquarter 2018), 2294–2323. https://doi.org/10.1109/COMST.2018.2835558Google ScholarGoogle ScholarCross RefCross Ref
  4. V. N. Vo et al.2023. Outage Probability Minimization in Secure NOMA Cognitive Radio Systems With UAV Relay: A Machine Learning Approach. IEEE Trans. Cognitive Commun. and Networking 9, 2 (2023), 435–451. https://doi.org/10.1109/TCCN.2022.3226184Google ScholarGoogle ScholarCross RefCross Ref
  5. Youhong Feng, Shihao Yan, Zhen Yang, Nan Yang, and Jinhong Yuan. 2019. Beamforming Design and Power Allocation for Secure Transmission With NOMA. IEEE Transactions on Wireless Communications 18, 5 (2019), 2639–2651. https://doi.org/10.1109/TWC.2019.2906202Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. M. R. Islam, N. Avazov, O. A. Dobre, and K. Kwak. 2017. Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges. IEEE Communications Surveys Tutorials 19, 2 (Secondquarter 2017), 721–742. https://doi.org/10.1109/COMST.2016.2621116Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J.N. Laneman, D.N.C. Tse, and G.W. Wornell. 2004. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory 50, 12 (2004), 3062–3080. https://doi.org/10.1109/TIT.2004.838089Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Li, H. Yuan, C. Maple, W. Cheng, and G. Epiphaniou. 2023. Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks. IEEE Systems J. 17, 1 (2023), 1045–1055.Google ScholarGoogle ScholarCross RefCross Ref
  9. Xingwang Li, Mengyan Huang, Changsen Zhang, Dan Deng, Khaled M. Rabie, Yuan Ding, and Jianhe Du. 2019. Security and Reliability Performance Analysis of Cooperative Multi-Relay Systems With Nonlinear Energy Harvesters and Hardware Impairments. IEEE Access 7 (2019), 102644–102661. https://doi.org/10.1109/ACCESS.2019.2930664Google ScholarGoogle ScholarCross RefCross Ref
  10. Yuanwei Liu, Zhiguo Ding, Maged Elkashlan, and Jinhong Yuan. 2016. Nonorthogonal Multiple Access in Large-Scale Underlay Cognitive Radio Networks. IEEE Transactions on Vehicular Technology 65, 12 (2016), 10152–10157. https://doi.org/10.1109/TVT.2016.2524694Google ScholarGoogle ScholarCross RefCross Ref
  11. H. Nikopour and H. Baligh. 2013. Sparse code multiple access. In IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). 332–336. https://doi.org/10.1109/PIMRC.2013.6666156Google ScholarGoogle ScholarCross RefCross Ref
  12. Mustafa Ozger, Ecehan B. Pehlivanoglu, and Ozgur B. Akan. 2022. Energy-Efficient Transmission Range and Duration for Cognitive Radio Sensor Networks. IEEE Trans. Cognitive Commun. and Networking 8, 2 (2022), 907–918.Google ScholarGoogle ScholarCross RefCross Ref
  13. P.R. Patel and J.M. Holtzman. 1993. Analysis of a DS/CDMA successive interference cancellation scheme using correlations. In Proceedings of GLOBECOM ’93. IEEE Global Telecommunications Conference. 76–80 vol.1. https://doi.org/10.1109/GLOCOM.1993.318102Google ScholarGoogle ScholarCross RefCross Ref
  14. Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, Georges Kaddoum, and Quang Anh Tran. 2019. Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks. Wireless Networks 255 (2019). https://doi.org/10.1007/s11276-017-1605-zGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  15. Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, and Mai Tran Truc. 2020. Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints. IEEE Access 8 (2020), 18442–18455. https://doi.org/10.1109/ACCESS.2020.2968325Google ScholarGoogle ScholarCross RefCross Ref
  16. Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura. 2013. System-level performance evaluation of downlink non-orthogonal multiple access (NOMA). In IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). 611–615. https://doi.org/10.1109/PIMRC.2013.6666209Google ScholarGoogle ScholarCross RefCross Ref
  17. Y. Song, W. Yang, Z. Xiang, H. Wang, and F. Cao. 2020. Research on Cognitive Power Allocation for Secure Millimeter-Wave NOMA Networks. IEEE Trans. Veh. Tech. 69, 11 (2020), 13424–13436.Google ScholarGoogle ScholarCross RefCross Ref
  18. V. N. Vo, T. G. Nguyen, and H. Tran C. So-In. 2020. Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers. Mobile Netw. Appl. 2020 (Feb. 2020), 193–210.Google ScholarGoogle Scholar
  19. Peng Wang, Jun Xiao, and Li Ping. 2006. Comparison of orthogonal and non-orthogonal approaches to future wireless cellular systems. IEEE Vehicular Technology Magazine 1, 3 (2006), 4–11. https://doi.org/10.1109/MVT.2006.307294Google ScholarGoogle ScholarCross RefCross Ref
  20. Zhongwu Xiang, Weiwei Yang, Gaofeng Pan, Yueming Cai, and Yi Song. 2019. Physical Layer Security in Cognitive Radio Inspired NOMA Network. IEEE Journal of Selected Topics in Signal Processing 13, 3 (2019), 700–714. https://doi.org/10.1109/JSTSP.2019.2902103Google ScholarGoogle ScholarCross RefCross Ref
  21. Z. Yuan, G. Yu, W. Li, Y. Yuan, X. Wang, and J. Xu. 2016. Multi-User Shared Access for Internet of Things. In IEEE 83rd Vehicular Technology Conference (VTC Spring). 1–5. https://doi.org/10.1109/VTCSpring.2016.7504361Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Security and Reliability Performance Analysis of Cognitive NOMA Network Under Outage Constraint of Multiple Primary Users

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SOICT '23: Proceedings of the 12th International Symposium on Information and Communication Technology
      December 2023
      1058 pages
      ISBN:9798400708916
      DOI:10.1145/3628797

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 December 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate147of318submissions,46%
    • Article Metrics

      • Downloads (Last 12 months)14
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format