Abstract

The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.

Highlights

  • As a promising multiple access (MA) technique, Non -orthogonal multiple access (NOMA) has been proposed to adapt the challenging requirements of the future mobile communication networks

  • Different with the conventional MA techniques, the power domain is used to serve a multiple user in NOMA at different power levels and such paradigm exhibits a high spectral efficiency [14]

  • This paper studies a downlink cooperative CR-NOMA model with interference temperature constraint (ITC) at the primary receiver

Read more

Summary

INTRODUCTION

As a promising multiple access (MA) technique, Non -orthogonal multiple access (NOMA) has been proposed to adapt the challenging requirements of the future mobile communication networks. This paper determines physical layer security (PLS) in cognitive radio inspired non-orthogonal multiple access (CRNOMA) networks with secondary source and multiple secondary users under impact of primary destination. To manage the interference among the users and guarantee the quality of services (QoS) of primary users, a new secure NOMA transmission strategy is designed, where the primary and secondary users are paired according to their channel gains, respectively, and power-domain NOMA is employed to transmit the signal. SYSTEM MODEL A downlink cooperative underlay CR-NOMA is considered in this study In this model, secondary network (SN) consists of a secondary base station (S), a relay (R) and two far NOMA users (D1; D2) can operate together with primary network containing primary destination (PD) who make impact on system performance at secondary network, as shown in Fig ure 1. Of decoding x1 and x2 at R and they can be respectively written as :

R a1 S hSR a2 S hSR 2
SECRECY PERFORMANCE ANALYSIS
NUMB ER RESULTS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.