Rate-Splitting Multiple Access-Enabled Security Analysis in Cognitive Satellite Terrestrial Networks

被引:16
作者
Li, Xudong [1 ]
Fan, Ye [1 ]
Yao, Rugui [1 ]
Wang, Peng [1 ]
Qi, Nan [2 ,3 ]
Miridakis, Nikolaos I. I. [4 ,5 ]
Tsiftsis, Theodoros A. A. [4 ,6 ]
机构
[1] Northwestern Polytech Univ, Sch Elect & Informat, Xian 710072, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Key Lab Dynam Cognit Syst Electromagnet Spectrum S, Minist Ind & Informat Technol, Nanjing 210016, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[4] Jinan Univ, Sch Intelligent Syst Sci & Engn, Zhuhai Campus, Zhuhai 519070, Peoples R China
[5] Univ West Attica, Dept Informat & Comp Engn, Aegaleo 12243, Greece
[6] Jinan Univ, Inst Phys Internet, Zhuhai 519070, Peoples R China
基金
中国国家自然科学基金;
关键词
Asymptotic analysis; beamforming (BF); cognitive satellite terrestrial networks (CSTNs); energy efficiency (EE); rate splitting multiple access (RSMA); secrecy outage probability (SOP); PHYSICAL LAYER SECURITY; NOMA; MULTICAST; STRATEGY;
D O I
10.1109/TVT.2022.3192042
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate security and energy efficiency of multicast communication in cognitive satellite terrestrial networks. To achieve high spectrum efficiency and low interference power transmissions in the cognitive terrestrial network, the rate splitting multiple access scheme (RSMA) is employed to prompt the massive access of the secondary users. In particular, we derive analytical and asymptotic closed-form expressions for secrecy outage probability of the satellite terrestrial network with eavesdropping, interfering, and imperfect channel state information. Hence, a beamforming (BF) scheme based on RSMA for secondary network is proposed to suppress eavesdropping, mitigate interference, and enhance energy efficiency of the proposed system model. Then, we transform non-convex optimization constraints into resoluble problems utilizing Taylor series expansion and successive convex approximation. Finally, simulation results corroborate the above theoretical analysis and highlight the superiority of the designed BF scheme on security and energy efficiency.
引用
收藏
页码:11756 / 11771
页数:16
相关论文
共 38 条
[1]  
Abramowitz M, 1972, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables
[2]   Physical Layer Security of Multiuser Multirelay Hybrid Satellite-Terrestrial Relay Networks [J].
Bankey, Vinay ;
Upadhyay, Prabhat K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (03) :2488-2501
[3]   Secrecy Outage Performance Analysis of UAV-Assisted Relay Communication Systems With Multiple Aerial and Ground Eavesdroppers [J].
Bao, Tingnan ;
Wang, Haiming ;
Wang, Wen-Jing ;
Yang, Hong-Chuan ;
Hasna, Mazen .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2022, 58 (03) :2592-2600
[4]   A PHY Layer Security of a Jamming-Based Underlay Cognitive Satellite-Terrestrial Network [J].
Bouabdellah, Mounia ;
El Bouanani, Faissal .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2021, 7 (04) :1266-1279
[5]   Artificial-Noise-Aided Energy-Efficient Secure Beamforming for Multi-Eavesdroppers in Cognitive Radio Networks [J].
Chen, Pu ;
Ouyang, Jian ;
Zhu, Wei-Ping ;
Lin, Min ;
El Shafie, Ahmed ;
Al-Dhahir, Naofal .
IEEE SYSTEMS JOURNAL, 2020, 14 (03) :3801-3812
[6]   Rate Splitting for MIMO Wireless Networks: A Promising PHY-Layer Strategy for LTE Evolution [J].
Clerckx, Bruno ;
Joudeh, Hamdi ;
Hao, Chenxi ;
Dai, Mingbo ;
Rassouli, Borzoo .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (05) :98-105
[7]   Secure Interference Exploitation Precoding in MISO Wiretap Channel: Destructive Region Redefinition With Efficient Solutions [J].
Fan, Ye ;
Li, Ang ;
Liao, Xuewen ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :402-417
[8]   A Secure Energy Efficient Scheme for Cooperative IoT Networks [J].
Gouissem, Ala ;
Abualsaud, Khalid ;
Yaacoub, Elias ;
Khattab, Tamer ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (06) :3962-3976
[9]  
Gradshteyn I. S., 2007, Table of Integrals, Series and Products
[10]   Performance of Adaptive Multi-User Underlay NOMA Transmission With Simple User Selection [J].
Jee, Anand ;
Janghel, Komal ;
Prakriya, Shankar .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (02) :871-887