Abstract
In this article, we investigate physical layer security (PLS) in non-orthogonal multiple access-enabled (NOMA-enabled) underlay cognitive radio networks (CRNs) with outdated channel state information (CSI). Considering the influence of outdated CSI on the interference of secondary transmitter (Alice) to primary user (PU), the constraint for the power is adopted to guarantee the quality-of-service (QoS) of PU over Nakagami-m channels. To further analyze the NOMA-enabled underlay CRNs with outdated CSI in PLS perspective, the secrecy performance is evaluated by the closed-form expressions for connection outage probability (COP), the intercept probability (IP) and effective secrecy throughput (EST). In addition, Monte Carlo simulations are provided to verify the derived analytical results. From the analytical results and simulations, it is concluded that a) with the increment of the channel parameter m, the secrecy performance of the considered networks increases in the low SNR region and decreases in the high SNR region, b) the connection performance with the outdated CSI of the interference links only reduce in the high SNR region, because the power margin factor changes significantly in this region, c) considering the impact of the constraint for the power, the secrecy performance and EST performance of the considered networks with the outdated CSI of the interference links increase in the high SNR region, d) the considered networks with NOMA scheme can achieve higher EST than that with orthogonal multiple access (OMA) scheme.
Highlights
With the rapid development of communication technology, the Internet of Things (IoT) leads to a new research dimension in the future, which is a worldwide network that allows people and things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service [1]
We have investigated the performance of the considered networks, and our results demonstrate that: 1) the secrecy performance of the considered networks over Nakagami-m channels as channel parameter m = 2 is better than that over Rayleigh channels (m = 1) at low SNR, 2) the connection performance of the considered networks reduced with the outdated channel state information (CSI) of the secondary transmission channel links, 3) the constraint for the power can effectively prevent information leakage of secondary users and increase the effective secrecy throughput (EST) of the considered networks, 4) secondary users of the considered networks with Nonorthogonal multiple access (NOMA) scheme can achieve a higher EST than that with OMA scheme
PERFORMANCE ANALYSIS we investigate the performance of the dual-hop NOMA-enabled cognitive wiretap networks over Nakagamim fading channels with outdated CSI and derive a set of closed-form expressions for key performance metrics, i.e., connection outage probability (COP), intercept probability (IP) and EST
Summary
With the rapid development of communication technology, the Internet of Things (IoT) leads to a new research dimension in the future, which is a worldwide network that allows people and things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service [1]. In this work, a new NOMA-enabled transmission strategy is designed to improve secrecy performance in underlay CRNs. Significantly, considering the interference caused by secondary transmitter (Alice) to PU due to outdated CSI, the constraint for the power is adopted to guarantee the normal communication of PU. Considering the interference caused by secondary transmitter (Alice) to PU due to outdated CSI, the constraint for the power is adopted to guarantee the normal communication of PU This transmission strategy can effectively improve the spectrum utilization of the considered network, and ensure the security of the data.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.