Abstract

In this article, we investigate physical layer security (PLS) in non-orthogonal multiple access-enabled (NOMA-enabled) underlay cognitive radio networks (CRNs) with outdated channel state information (CSI). Considering the influence of outdated CSI on the interference of secondary transmitter (Alice) to primary user (PU), the constraint for the power is adopted to guarantee the quality-of-service (QoS) of PU over Nakagami-m channels. To further analyze the NOMA-enabled underlay CRNs with outdated CSI in PLS perspective, the secrecy performance is evaluated by the closed-form expressions for connection outage probability (COP), the intercept probability (IP) and effective secrecy throughput (EST). In addition, Monte Carlo simulations are provided to verify the derived analytical results. From the analytical results and simulations, it is concluded that a) with the increment of the channel parameter m, the secrecy performance of the considered networks increases in the low SNR region and decreases in the high SNR region, b) the connection performance with the outdated CSI of the interference links only reduce in the high SNR region, because the power margin factor changes significantly in this region, c) considering the impact of the constraint for the power, the secrecy performance and EST performance of the considered networks with the outdated CSI of the interference links increase in the high SNR region, d) the considered networks with NOMA scheme can achieve higher EST than that with orthogonal multiple access (OMA) scheme.

Highlights

  • With the rapid development of communication technology, the Internet of Things (IoT) leads to a new research dimension in the future, which is a worldwide network that allows people and things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service [1]

  • We have investigated the performance of the considered networks, and our results demonstrate that: 1) the secrecy performance of the considered networks over Nakagami-m channels as channel parameter m = 2 is better than that over Rayleigh channels (m = 1) at low SNR, 2) the connection performance of the considered networks reduced with the outdated channel state information (CSI) of the secondary transmission channel links, 3) the constraint for the power can effectively prevent information leakage of secondary users and increase the effective secrecy throughput (EST) of the considered networks, 4) secondary users of the considered networks with Nonorthogonal multiple access (NOMA) scheme can achieve a higher EST than that with OMA scheme

  • PERFORMANCE ANALYSIS we investigate the performance of the dual-hop NOMA-enabled cognitive wiretap networks over Nakagamim fading channels with outdated CSI and derive a set of closed-form expressions for key performance metrics, i.e., connection outage probability (COP), intercept probability (IP) and EST

Read more

Summary

INTRODUCTION

With the rapid development of communication technology, the Internet of Things (IoT) leads to a new research dimension in the future, which is a worldwide network that allows people and things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service [1]. In this work, a new NOMA-enabled transmission strategy is designed to improve secrecy performance in underlay CRNs. Significantly, considering the interference caused by secondary transmitter (Alice) to PU due to outdated CSI, the constraint for the power is adopted to guarantee the normal communication of PU. Considering the interference caused by secondary transmitter (Alice) to PU due to outdated CSI, the constraint for the power is adopted to guarantee the normal communication of PU This transmission strategy can effectively improve the spectrum utilization of the considered network, and ensure the security of the data.

SYSTEM MODEL
COP OF PROPOSED NETWORKS
NUMERICAL RESULTS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call