scholarly journals Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access

2021 ◽  
Vol 10 (2) ◽  
pp. 848-855
Author(s):  
Chi-Bao Le ◽  
Dinh-Thuan Do

This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.

Sensors ◽  
2019 ◽  
Vol 19 (15) ◽  
pp. 3314 ◽  
Author(s):  
Dinh-Thuan Do ◽  
Anh-Tu Le ◽  
Chi-Bao Le ◽  
Byung Moo Lee

In this paper, we investigate the performance of a secondary network in a cognitive radio network employing a non-orthogonal multiple access (NOMA) scheme to form a CR-NOMA system serving many destination users. In the secondary network of our proposed system, a device-to-device (D2D) scheme is deployed to further provide the signal transmission at a close distance of NOMA users in downlink, and such performance is evaluated under the situation of interference reception from the primary network. An outage performance gap exists among these NOMA users since different power allocation factors are assigned to the different destinations. Unlike existing NOMA schemes that consider fixed power allocation factors, which are not optimal in terms of outage performance, our proposed paradigm exhibits optimal outage in the scenario of D2D transmission. In particular, the outage performances in two kinds of schemes in term of existence of D2D link are further achieved. Simulation results validate the analytical expressions, and show the advantage of each scheme in the proposed CR-NOMA system based on outage performance and throughput.


Electronics ◽  
2019 ◽  
Vol 8 (7) ◽  
pp. 819 ◽  
Author(s):  
Dinh-Thuan Do ◽  
Anh-Tu Le ◽  
and Byung Moo Lee

This study considers the outage and throughput performance of downlink in the secondary network of cognitive radio assisted non-orthogonal multiple access (NOMA) systems. Both orthogonal multiple access (OMA) mode and NOMA mode are investigated with respect to status of decoding operation of each user. Depending on the transmit signal-to-noise ratio (SNR) at the primary source and interference constraint from the primary network, the closed-form expressions of the outage probability for two users are obtained and compared in terms of performance. To obtain further insights, an asymptotic analysis of the outage probability in the high SNR regime is presented. Optimal throughput also provides insight in the computation of the power allocation factor. Furthermore, power allocation factor, target rates, and transmit SNR are evaluated to obtain reasonable outage performance. Monte Carlo simulations are conducted to confirm the analytical results.


2020 ◽  
Vol 10 (10) ◽  
pp. 3630 ◽  
Author(s):  
Carla E. Garcia ◽  
Mario R. Camana ◽  
Insoo Koo

Security is considered a critical issue in the deployment of 5G networks because of the vulnerability of information that can be intercepted by eavesdroppers in wireless transmission environments. Thus, physical layer security has emerged as an alternative for the secure enabling of 5G technologies and for tackling this security issue. In this paper, we study the secrecy energy efficiency (SEE) in a downlink underlying cognitive radio (CR)—non-orthogonal multiple access (NOMA) system with a cooperative relay. The system has an energy-harvesting (EH) user and an eavesdropper, where the transmitter provides direct communication with a close secondary user and a distant secondary user via the relay. Our objective is to maximize the SEE of the CR-NOMA system under the constraints of a minimum information rate for the secondary users, a minimum amount of energy harvested by the EH user, and maximum power availability at the transmitter and the relay that still prevents them from causing unacceptable interference with the primary user. The proposed solution to maximize the SEE is based on the low-computational—complexity particle swarm optimization (PSO) algorithm. For validation purposes, we compare the optimization outcomes obtained by the PSO algorithm with the optimal exhaustive search method. Furthermore, we compare the performance of our proposed CR-NOMA scheme with the conventional orthogonal multiple access (OMA) scheme.


2021 ◽  
Vol 10 (2) ◽  
pp. 828-836
Author(s):  
Chi-Bao Le ◽  
Dinh-Thuan Do

This paper studies the secondary network relying relay selection to transmit signal from the secondary source (base station) to two destinations. Especially, two destinations are required non-orthogonal multiple access (NOMA) scheme and it benefits to implementation of the Internet of Things (IoT) systems. However, eavesdropper over-hears signal related link from selected relay to destination. This paper measure secure performance via metric, namely secure outage probability (SOP). In particular, signal to noise ratio (SNR) criterion is used to evalute SOP to provide reliable transmission to the terminal node. Main results indicates that the considered scheme provides performance gap among two signals at destination. The exactness of derived expressions is confirmed via numerical simulation.


2018 ◽  
Vol 8 (12) ◽  
pp. 2486 ◽  
Author(s):  
Eylem Erdogan ◽  
Sultan Çolak ◽  
Hakan Alakoca ◽  
Mustafa Namdar ◽  
Arif Basgumus ◽  
...  

In this work, we examine the interference alignment (IA) performance of a multi-input multi-output (MIMO) multi-hop cognitive radio (CR) network in the presence of multiple primary users. In the proposed architecture, it is assumed that linear IA is adopted at the secondary network to alleviate the interference between primary and secondary networks. By doing so, the secondary source can communicate with the secondary destination via multiple relays without causing any interference to the primary network. Even though linear IA can suppress the interference in CR networks considerably, interference leakages may occur due to a fast fading channel. To this end, we focus on the performance of the secondary network for two different cases: (i) the interference is perfectly aligned; (ii) the impact of interference leakages. For both cases, closed-form expressions of outage probability and ergodic capacity are derived. The results, which are validated by Monte Carlo simulations, show that interference leakages can deteriorate both system performance and the diversity gains considerably.


2015 ◽  
Vol 2015 ◽  
pp. 1-6
Author(s):  
S. Chris Prema ◽  
Dara Sudha Rani

A rate request sequenced bit loading reallocation algorithm is proposed. The spectral holes detected by spectrum sensing (SS) in cognitive radio (CR) are used by secondary users. This algorithm is applicable to Discrete Multitone (DMT) systems for secondary user reallocation. DMT systems support different modulation on different subchannels according to Signal-to-Noise Ratio (SNR). The maximum bits and power that can be allocated to each subband is determined depending on the channel state information (CSI) and secondary user modulation scheme. The spectral holes or free subbands are allocated to secondary users depending on the user rate request and subchannel capacity. A comparison is done between random rate request and sequenced rate request of secondary user for subchannel allocation. Through simulations it is observed that with sequenced rate request higher spectral efficiency is achieved with reduced complexity.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Anh-Tu Le ◽  
Dinh-Thuan Do

There are high demands on both massive connections and high spectrum efficiency, and the cognitive radio-based nonorthogonal multiple access (CR-NOMA) system is developed to satisfy such demand. The unreal situation of CR-NOMA is considering the perfect channel state information (CSI) in receivers. This paper indicates impacts of imperfect CSI on outage and throughput performance. In particular, we focus on performance of the secondary network related to the imperfect CSI, and we derive closed-form expressions of outage probability and throughput for the downlink in such a CR-NOMA system. Particularly, a general form of Nakagami- m fading channel is adopted to examine the impact of fading on the performance of the CR-NOMA system. As the main achievement, we conduct extensive simulations and provide analyses to demonstrate the outage performance of the CR-NOMA system with CSI imperfections.


Sign in / Sign up

Export Citation Format

Share Document