Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User

被引:0
作者
Indraganti, Swathi Priya [1 ]
Vappangi, Suseela [1 ]
机构
[1] VIT AP Univ, Sch Elect Engn, Amaravati 522241, Andhra Pradesh, India
关键词
NOMA; Wireless communication; Throughput; Security; Probability; Jamming; 5G mobile communication; Relays; Power system reliability; Eavesdropping; Non-orthogonal multiple access; secrecy outage probability; ergodic capacity; effective secrecy throughput; intercept probability; optimal power allocation; PHYSICAL-LAYER SECURITY; NONORTHOGONAL MULTIPLE-ACCESS; WIRELESS NETWORKS; POWER ALLOCATION; UPLINK NOMA; SYSTEMS; SPECTRUM; OPTIMIZATION; ENHANCEMENT;
D O I
10.1109/ACCESS.2024.3520515
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the integration of physical layer security (PLS) and cognitive radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral efficiency (SE) and security in fifth generation (5G) and beyond wireless networks. We propose a novel downlink overlay CR inspired NOMA (CR-NOMA) system, where a secondary base station (SBS) relays data from a primary base station (PBS) to a primary destination (PD) while simultaneously transmitting its own data to a secondary destination (SD). Our analysis focuses on investigating the performance of this system in the presence of untrusted users, deriving novel closed-form solutions for various performance metrics such as ergodic capacity (EC), throughput, connection outage probability (COP), secrecy ergodic capacity (SEC), intercept probability (IP), effective secrecy throughput (EST), and secrecy outage probability (SOP) under different channel constraints. In addition, we present an optimal power allocation (OPA) strategy that enhances secrecy performance of the proposed system over Rayleigh fading channel. The simulation results of our work demonstrate the effectiveness of the proposed system in maintaining confidentiality and achieving high SE. Furthermore, for enhancing the performance of the overall system, we utilize maximal ratio combining (MRC) and selection combining (SC) diversity methods for analyzing the received signal at the PD. To this end, to enhance the performance of the proposed model for both single and multiple antenna systems, artificial noise (AN) jamming signals, asymptotic analysis, and diversity schemes are presented. We validate our analytical findings through MATLAB based simulations, showcasing the accuracy of our results. This paper contributes to the development of secure and efficient wireless communication systems, addressing the growing concerns of security in 5G and beyond networks.
引用
收藏
页码:194475 / 194491
页数:17
相关论文
共 50 条
[41]   Outage Performance Improvement by Selected User in D2D Transmission and Implementation of Cognitive Radio-Assisted NOMA [J].
Dinh-Thuan Do ;
Minh-Sang Van Nguyen ;
Lee, Byung Moo .
SENSORS, 2019, 19 (22)
[42]   Performance Analysis of User Pairing for Active RIS-Enabled Cooperative NOMA in 6G Cognitive Radio Networks [J].
Tin, Phu Tran ;
Nguyen, Minh-Sang Van ;
Tran, Dinh-Hieu ;
Nguyen, Cong T. ;
Chatzinotas, Symeon ;
Ding, Zhiguo ;
Voznak, Miroslav .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23) :37675-37692
[43]   Spectrum Sharing in Cognitive-Radio-Inspired NOMA Systems Under Imperfect SIC and Cochannel Interference [J].
ElHalawany, Basem M. ;
El-Banna, Ahmad A. Aziz ;
Quoc-Viet Pham ;
Wu, Kaishun ;
Mohamed, Ehab Mahmoud .
IEEE SYSTEMS JOURNAL, 2022, 16 (01) :1540-1547
[44]   Secrecy capacity results for a secure NOMA-based cognitive radio network with an external eavesdropper [J].
Mehr, K. Adli ;
Niya, J. Musevi ;
Seyedarabi, H. ;
Nobar, S. Khoshabi .
PHYSICAL COMMUNICATION, 2020, 43
[45]   On Secrecy Performance of the Strong User in MISO-NOMA Visible Light Communication System [J].
Zhao, Xiang ;
Sun, Jinyong .
ELECTRONICS, 2019, 8 (04)
[46]   Outage Performance of Overlay Cognitive Satellite-Terrestrial Networks With Cooperative NOMA [J].
Chen, Bailing ;
Xu, Ding .
IEEE SYSTEMS JOURNAL, 2024, 18 (01) :146-149
[47]   Underlay Cognitive Radio With Instantaneous Interference Constraint: A Secrecy Performance [J].
Thakur, Shilpa ;
Singh, Ajay .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (08) :7839-7844
[48]   Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks [J].
Hema, P. P. ;
Babu, A. V. .
SECURITY AND PRIVACY, 2024, 7 (03)
[49]   ON OUTAGE PROBABILITY AND THROUGHPUT PERFORMANCE OF COGNITIVE RADIO INSPIRED NOMA RELAY SYSTEM [J].
Thanh-Nam Tran ;
Dinh-Thuan Do ;
Voznak, Miroslav .
ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2018, 16 (04) :501-512
[50]   Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints [J].
Vo, Van Nhan ;
Dang, Viet-Hung ;
Tran, Hung ;
Ha, Dac-Binh ;
Le, Cong ;
Ho, Tu Dac ;
So-In, Chakchai .
IEEE ACCESS, 2023, 11 :33826-33838