Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User

被引:0
作者
Indraganti, Swathi Priya [1 ]
Vappangi, Suseela [1 ]
机构
[1] VIT AP Univ, Sch Elect Engn, Amaravati 522241, Andhra Pradesh, India
关键词
NOMA; Wireless communication; Throughput; Security; Probability; Jamming; 5G mobile communication; Relays; Power system reliability; Eavesdropping; Non-orthogonal multiple access; secrecy outage probability; ergodic capacity; effective secrecy throughput; intercept probability; optimal power allocation; PHYSICAL-LAYER SECURITY; NONORTHOGONAL MULTIPLE-ACCESS; WIRELESS NETWORKS; POWER ALLOCATION; UPLINK NOMA; SYSTEMS; SPECTRUM; OPTIMIZATION; ENHANCEMENT;
D O I
10.1109/ACCESS.2024.3520515
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the integration of physical layer security (PLS) and cognitive radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral efficiency (SE) and security in fifth generation (5G) and beyond wireless networks. We propose a novel downlink overlay CR inspired NOMA (CR-NOMA) system, where a secondary base station (SBS) relays data from a primary base station (PBS) to a primary destination (PD) while simultaneously transmitting its own data to a secondary destination (SD). Our analysis focuses on investigating the performance of this system in the presence of untrusted users, deriving novel closed-form solutions for various performance metrics such as ergodic capacity (EC), throughput, connection outage probability (COP), secrecy ergodic capacity (SEC), intercept probability (IP), effective secrecy throughput (EST), and secrecy outage probability (SOP) under different channel constraints. In addition, we present an optimal power allocation (OPA) strategy that enhances secrecy performance of the proposed system over Rayleigh fading channel. The simulation results of our work demonstrate the effectiveness of the proposed system in maintaining confidentiality and achieving high SE. Furthermore, for enhancing the performance of the overall system, we utilize maximal ratio combining (MRC) and selection combining (SC) diversity methods for analyzing the received signal at the PD. To this end, to enhance the performance of the proposed model for both single and multiple antenna systems, artificial noise (AN) jamming signals, asymptotic analysis, and diversity schemes are presented. We validate our analytical findings through MATLAB based simulations, showcasing the accuracy of our results. This paper contributes to the development of secure and efficient wireless communication systems, addressing the growing concerns of security in 5G and beyond networks.
引用
收藏
页码:194475 / 194491
页数:17
相关论文
共 50 条
[11]   Ergodic Secrecy Capacity of Cooperative NOMA System with Untrusted User [J].
Ahmad, Saif ;
Khan, Mohd Javed .
WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (01) :181-198
[12]   Performance Analysis of Overlay Cognitive NOMA Systems With Imperfect Successive Interference Cancellation [J].
Luo, Liping ;
Li, Quanzhong ;
Cheng, Julian .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (08) :4709-4722
[13]   Investigations on Secrecy Performance of Downlink Overlay CR-NOMA System With SIC Imperfections [J].
Godugu, Kiran Kumar ;
Vappangi, Suseela .
IEEE ACCESS, 2024, 12 :18051-18072
[14]   Cognitive Radio-Inspired NOMA in Short-Packet Communications [J].
Xiang, Zhongwu ;
Huang, Liyang ;
Meng, Jin ;
Xia, Chunli ;
Liu, Hongbo ;
Luo, Kang ;
Xie, Mingliang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) :14189-14199
[15]   Enhancing secrecy performance of energy harvesting NOMA systems using IoT user scheduling under untrusted users [J].
Largani, Noushin Khosravi ;
Akhbari, Bahareh .
IET COMMUNICATIONS, 2022, 16 (18) :2208-2218
[16]   Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User [J].
Li Mu ;
Li Mianquan ;
Huang Yuzhen ;
Yin Hao ;
Wang Yan ;
Ren Baoquan ;
Qu Xiaofei ;
Yu Rui .
2018 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2018,
[17]   User Clustering and Power Allocation for Massive MIMO With NOMA-Inspired Cognitive Radio [J].
Shili, Maroua ;
Hajjaj, Moufida ;
Ammari, Mohamed Lassaad .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (07) :7656-7664
[18]   Physical Layer Security in Cognitive Radio Inspired NOMA Network [J].
Xiang, Zhongwu ;
Yang, Weiwei ;
Pan, Gaofeng ;
Cai, Yueming ;
Song, Yi .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2019, 13 (03) :700-714
[19]   Secrecy performance of non-orthogonal multiple access cognitive untrusted relaying with friendly jamming [J].
Mobini, Zahra .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2020, 118
[20]   Secrecy Diversity Analysis with Multi-user Scheduling for Overlay Cognitive Radio Systems [J].
Yan, Peishun ;
Zou, Yulong ;
Zhu, Jia .
2016 19TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2016,