Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User

被引:0
|
作者
Indraganti, Swathi Priya [1 ]
Vappangi, Suseela [1 ]
机构
[1] VIT AP Univ, Sch Elect Engn, Amaravati 522241, Andhra Pradesh, India
来源
IEEE ACCESS | 2024年 / 12卷
关键词
NOMA; Wireless communication; Throughput; Security; Probability; Jamming; 5G mobile communication; Relays; Power system reliability; Eavesdropping; Non-orthogonal multiple access; secrecy outage probability; ergodic capacity; effective secrecy throughput; intercept probability; optimal power allocation; PHYSICAL-LAYER SECURITY; NONORTHOGONAL MULTIPLE-ACCESS; WIRELESS NETWORKS; POWER ALLOCATION; UPLINK NOMA; SYSTEMS; SPECTRUM; OPTIMIZATION; ENHANCEMENT;
D O I
10.1109/ACCESS.2024.3520515
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the integration of physical layer security (PLS) and cognitive radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral efficiency (SE) and security in fifth generation (5G) and beyond wireless networks. We propose a novel downlink overlay CR inspired NOMA (CR-NOMA) system, where a secondary base station (SBS) relays data from a primary base station (PBS) to a primary destination (PD) while simultaneously transmitting its own data to a secondary destination (SD). Our analysis focuses on investigating the performance of this system in the presence of untrusted users, deriving novel closed-form solutions for various performance metrics such as ergodic capacity (EC), throughput, connection outage probability (COP), secrecy ergodic capacity (SEC), intercept probability (IP), effective secrecy throughput (EST), and secrecy outage probability (SOP) under different channel constraints. In addition, we present an optimal power allocation (OPA) strategy that enhances secrecy performance of the proposed system over Rayleigh fading channel. The simulation results of our work demonstrate the effectiveness of the proposed system in maintaining confidentiality and achieving high SE. Furthermore, for enhancing the performance of the overall system, we utilize maximal ratio combining (MRC) and selection combining (SC) diversity methods for analyzing the received signal at the PD. To this end, to enhance the performance of the proposed model for both single and multiple antenna systems, artificial noise (AN) jamming signals, asymptotic analysis, and diversity schemes are presented. We validate our analytical findings through MATLAB based simulations, showcasing the accuracy of our results. This paper contributes to the development of secure and efficient wireless communication systems, addressing the growing concerns of security in 5G and beyond networks.
引用
收藏
页码:194475 / 194491
页数:17
相关论文
共 50 条
  • [1] Enhancing Secrecy for NOMA Untrusted Relay Networks With User Scheduling and Jamming
    He, Bingtao
    Lv, Lu
    Yang, Long
    Chen, Jian
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (12) : 2682 - 2686
  • [2] Overlay Cognitive ABCom-NOMA-Based ITS: An In-Depth Secrecy Analysis
    Zheng, Yike
    Li, Xingwang
    Zhang, Hui
    Alshehri, Mohammad Dahman
    Dang, Shuping
    Huang, Gaojian
    Zhang, Changsen
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2217 - 2228
  • [3] Physical Layer Secrecy Performance Analysis of Jamming-Assisted Overlay Cognitive NOMA Networks With Hardware Impairments and Multiple Non-Colluding Eavesdroppers
    Hema, P. P.
    Babu, A. V.
    IEEE ACCESS, 2024, 12 (19459-19481) : 19459 - 19481
  • [4] Performance Analysis of NOMA-Based Underlay Cognitive Radio Networks With Partial Relay Selection
    Aswathi, V
    Babu, A., V
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (05) : 4615 - 4630
  • [5] Outage and Error-Rate Analysis of NOMA-Inspired Multicarrier Underlay Cognitive Radio System
    Shachi, P.
    Sanjana, T.
    Sudhindra, K. R.
    Suma, M. N.
    IEEE ACCESS, 2022, 10 : 113956 - 113968
  • [6] Secrecy Rate Maximization at Near User in Untrusted NOMA with Trusted DF Relay
    Amin, Insha
    Mishra, Deepak
    Saini, Ravikant
    Singh, Virendra
    2021 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2021,
  • [7] Secrecy Energy Efficiency in Cognitive Radio Networks With Untrusted Secondary Users
    Wang, Wei-Bang
    Lu, Yang
    Chi, Chong-Yung
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2021, 5 (01): : 216 - 230
  • [8] NOMA inspired multicasting in cognitive radio networks
    Bhattacharjee, Sangeeta
    Acharya, Tamaghna
    Bhattacharya, Uma
    IET COMMUNICATIONS, 2018, 12 (15) : 1845 - 1853
  • [9] On the Secrecy Performance of NOMA-Based Cognitive Radio Networks with STBC
    Li M.-L.
    Tian L.-L.
    Yang X.-X.
    Li Y.
    Wang A.-H.
    Dong Z.-S.
    Muhaidat S.
    Dianati M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (03): : 463 - 469
  • [10] Ergodic Secrecy Capacity of Cooperative NOMA System with Untrusted User
    Ahmad, Saif
    Khan, Mohd Javed
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (01) : 181 - 198