Stackelberg Game for Secure CR-NOMA Networks Against Internal Eavesdropper

被引:8
作者
Abidrabbu, Shaima [1 ]
Abushattal, Abdelrahman [2 ]
Arslan, Huseyin [1 ]
机构
[1] Istanbul Medipol Univ, Sch Engn & Nat Sci, Beykoz, TR-34810 Istanbul, Turkiye
[2] Karadeniz Tech Univ, Dept Elekt Elekt, TR-61080 Trabzon, Turkiye
关键词
NOMA; Resource management; Games; Security; Quality of service; Downlink; Transmitters; Non-orthogonal multiple access; power allocation; physical layer security; successive interference cancellation; Stackelberg game; COGNITIVE RADIO NETWORKS; PHYSICAL LAYER SECURITY; RESOURCE-ALLOCATION; POWER ALLOCATION; TRANSMISSION; ALGORITHM; SYSTEMS; USER;
D O I
10.1109/TCCN.2023.3234274
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The combination of Cognitive Radio with Nonorthogonal Multiple Access (CR-NOMA) has enormous potential interest to improve spectral efficiency and increase system capacity in future wireless communication networks. Hence, according to the broadcast nature of the CR-NOMA wireless channel, handling the confidentiality of information is one of the most important requirements of the network. In this paper, Physical Layer Security (PLS) against internal Eavesdropper (Eve) is investigated by the CR-NOMA under the limitations of joint delay and confidentiality rate. First, initial power allocation for Secondary User (SU) based on the Primary User (PU) interference threshold is constructed. Then, a multi-objective problem based on different SUs demands is formulated based on Stackelberg game modeling. After that, the Stackelberg Equilibrium (SE) is studied and explored. At the final stage, an overall algorithm has been proposed whereby SE strategies are frequently updated to find the best parameters for the proposed system model. The simulation results show the superiority of the proposed scheme in achieving a higher average utility function, spectral efficiency, fairness index, up to 44%, 90%, and 54.7%, respectively, and reliability compared to the conventional scheme.
引用
收藏
页码:452 / 462
页数:11
相关论文
共 47 条
[1]   A Secure Downlink NOMA Scheme Against Unknown Internal Eavesdroppers [J].
Abushattal, Abdelrahman ;
Althunibat, Saud ;
Qaraqe, Marwa ;
Arslan, Huseyin .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (06) :1281-1285
[2]   Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game [J].
Al-Talabani, Ali ;
Deng, Yansha ;
Nallanathan, A. ;
Nguyen, Huan X. .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (06) :1112-1115
[3]   Fair power allocation in cooperative cognitive systems under NOMA transmission for future IoT networks [J].
Ali, Zain ;
Khan, Wali Ullah ;
Sidhu, Guftaar Ahmad Sardar ;
Nimmi, K. ;
Li, Xingwang ;
Kwak, Kyung Sup ;
Bilal, Muhammad .
ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (01) :575-583
[4]  
Almohamad A, 2020, I C INF COMM TECH CO, P116, DOI 10.1109/ICTC49870.2020.9289229
[5]   A Game-Theoretical Modelling Approach for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System [J].
Alsaba, Yamen ;
Leow, Chee Yen ;
Rahim, Sharul Kamal Abdul .
IEEE ACCESS, 2019, 7 :5896-5904
[6]   A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case [J].
Alsaba, Yamen ;
Leow, Chee Yen ;
Rahim, Sharul Kamal Abdul .
IEEE ACCESS, 2018, 6 :58764-58773
[7]   Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Li, Tengyao ;
Tian, Jiwei ;
Gong, Fengkui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :2930-2943
[8]   A Game-Theoretic Approach of Resource Allocation in NOMA-based Fog Radio Access Networks [J].
Cao, Xueyan ;
Peng, Mugen ;
Ding, Zhiguo .
2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
[9]   Secure Transmission via Power Allocation in NOMA-UAV Networks With Circular Trajectory [J].
Chen, Xinying ;
Yang, Zhutian ;
Zhao, Nan ;
Chen, Yunfei ;
Wang, Jingjing ;
Ding, Zhiguo ;
Yu, F. Richard .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) :10033-10045
[10]   Physical Layer Security for Weak User in MISO NOMA Using Directional Modulation (NOMAD) [J].
Christopher, Ryan M. ;
Borah, Deva K. .
IEEE COMMUNICATIONS LETTERS, 2020, 24 (05) :956-960