Advanced Search
Volume 42 Issue 4
Jun.  2020
Turn off MathJax
Article Contents
Baoquan YU, Yueming CAI, Jianwei HU. Performance Analysis of Physical Layer Security for Cognitive Radio Non-Orthogonal Multiple Access Random Network[J]. Journal of Electronics & Information Technology, 2020, 42(4): 950-956. doi: 10.11999/JEIT190049
Citation: Baoquan YU, Yueming CAI, Jianwei HU. Performance Analysis of Physical Layer Security for Cognitive Radio Non-Orthogonal Multiple Access Random Network[J]. Journal of Electronics & Information Technology, 2020, 42(4): 950-956. doi: 10.11999/JEIT190049

Performance Analysis of Physical Layer Security for Cognitive Radio Non-Orthogonal Multiple Access Random Network

doi: 10.11999/JEIT190049
Funds:  The National Natural Science Foundation of China(61771487, 61371122,61471393)
  • Received Date: 2019-01-17
  • Rev Recd Date: 2019-06-30
  • Available Online: 2020-01-11
  • Publish Date: 2020-06-04
  • This paper analyzes the security communication performance of secondary user communication pairs in Cognitive Radio Non-Orthogonal Multiple Access (CR-NOMA) networks, where interference sources and eavesdropping nodes are randomly distributed. The stochastic geometry theory is used to model the eavesdropping nodes and the interfering nodes as a homogeneous Poisson Point Processes (PPP). Firstly, to ensure the reliability of the primary user communication pairs, the power allocation coefficient set of the sender is obtained, and the closed expressions of the connection outage probability and the secrecy outage probability of the secondary user are further obtained. Then, the variation of the power distribution coefficient with the constraint of the primary user’s reliability is analyzed. Finally, the relationship between outage probability of secondary user communication pairs and the density of the eavesdropping nodes and the transmission power is studied. The research shows that the enhancement of interfering signal reduces the reliability of the system, but brings about a significant improvement of security performance. The simulation results verify the correctness of the theoretical analysis.

  • loading
  • YANG Nan, WANG Lifeng, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015, 53(4): 20–27. doi: 10.1109/MCOM.2015.7081071
    MARZBAN M F, KASHEF M, ABDALLAH M, et al. Beamforming and power allocation for physical-layer security in hybrid RF/VLC wireless networks[C]. The 13th International Wireless Communications and Mobile Computing Conference, Valencia, Spain, 2017: 258–263. doi: 10.1109/IWCMC.2017.7986296.
    WANG Huiming, WANG Chao, NG D W K, et al. Artificial noise assisted secure transmission for distributed antenna systems[J]. IEEE Transactions on Signal Processing, 2016, 64(15): 4050–4064. doi: 10.1109/TSP.2016.2558164
    DAI Linglong, WANG Bichai, YUAN Yifei, et al. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends[J]. IEEE Communications Magazine, 2105, 53(9): 74–81. doi: 10.1109/MCOM.2015.7263349
    HE Biao, LIU An, YANG Nan, et al. On the design of secure non-orthogonal multiple access systems[J]. IEEE Journal on Selected Areas in Communications, 2017, 35(10): 2196–2206. doi: 10.1109/JSAC.2017.2725698
    李钊, 戴晓琴, 陈柯宇, 等. 非正交多址接入下行链路用户匹配与功率优化算法[J]. 电子与信息学报, 2017, 39(8): 1804–1811. doi: 10.11999/JEIT161197

    LI Zhao, DAI Xiaoqin, CHEN Keyu, et al. User matching and power optimization algorithm for downlink NOMA[J]. Journal of Electronics &Information Technology, 2017, 39(8): 1804–1811. doi: 10.11999/JEIT161197
    CHANDWANI N, JAIN A, and VYAVAHARE P D. Throughput comparison for cognitive radio network under various conditions of primary user and channel noise signals[C]. 2015 Radio and Antenna Days of the Indian Ocean, Belle Mare, 2015: 1–2. doi: 10.1109/RADIO.2015.7323379.
    CICIOĞLU M, CICIOĞLU S, and ÇALHAN A. Performance analysis of software-defined network approach for wireless cognitive radio networks[C]. The 26th Signal Processing and Communications Applications Conference, Izmir, Turkey, 2018: 1–4. doi: 10.1109/SIU.2018.8404691.
    DING Zhiguo, FAN Pingzhi, and POOR H V. Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions[J]. IEEE Transactions on Vehicular Technology, 2016, 65(8): 6010–6023. doi: 10.1109/TVT.2015.2480766
    LIU Yuanwei, DING Zhiguo, ELKASHLAN M, et al. Nonorthogonal multiple access in large-scale underlay cognitive radio networks[J]. IEEE Transactions on Vehicular Technology, 2016, 65(12): 10152–10157. doi: 10.1109/TVT.2016.2524694
    LÜ Lu, CHEN Jian, and NI Qiang. Cooperative non-orthogonal multiple access in cognitive radio[J]. IEEE Communications Letters, 2016, 20(10): 2059–2062. doi: 10.1109/LCOMM.2016.2596763
    ARZYKULOV S, TSIFTSIS T A, NAURYZBAYEV G, et al. Outage performance of cooperative underlay CR-NOMA with imperfect CSI[J]. IEEE Communications Letters, 2019, 23(1): 176–179. doi: 10.1109/LCOMM.2018.2878730
    CHEN Yingyang, WANG Li, and JIAO Bingli. Cooperative multicast non-orthogonal multiple access in cognitive radio[C]. 2017 IEEE International Conference on Communications, Paris, France, 2017: 1–6.
    LÜ Lu, CHEN Jian, NI Qiang, et al. Design of cooperative non-orthogonal multicast cognitive multiple access for 5G systems: User scheduling and performance analysis[J]. IEEE Transactions on Communications, 2017, 65(6): 2641–2656. doi: 10.1109/TCOMM.2017.2677942
    WANG Huiming, WANG Chao, ZHENG Tongxing, et al. Impact of artificial noise on cellular networks: A stochastic geometry approach[J]. IEEE Transactions on Wireless Communications, 2016, 15(11): 7390–7404. doi: 10.1109/TWC.2016.2601903
    HU Xiang, ZHANG Xing, HUANG Haozhou, et al. Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers[C]. The 27th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, Valencia, Spain, 2016: 1–6. doi: 10.1109/PIMRC.2016.7794918.
    CHEN Hui, TAO Xiaofeng, LI Na, et al. Secrecy performance analysis of hybrid eavesdroppers system using stochastic geometry and random matrix theory[C]. 2017 IEEE International Conference on Communications, Paris, France, 2017: 1–6. doi: 10.1109/ICC.2017.7996465.
    DENG Yansha, WANG Lifeng, ELKASHLAN M, et al. Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1128–1138. doi: 10.1109/TIFS.2016.2516917
    CAI Yueming, XU Xiaoming, and YANG Weiwei. Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise[J]. IET Communications, 2016, 10(15): 1904–1913. doi: 10.1049/iet-com.2016.0117
    黄开枝, 王兵, 许晓明, 等. 基于安全保护域的增强型多点协作传输机制[J]. 电子与信息学报, 2018, 40(1): 108–115. doi: 10.11999/JEIT170478

    HUANG Kaizhi, WANG Bing, XU Xiaoming, et al. An enhanced coordinated multipoint transmission policy based on secrecy guard zone[J]. Journal of Electronics &Information Technology, 2018, 40(1): 108–115. doi: 10.11999/JEIT170478
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(4)

    Article Metrics

    Article views (2569) PDF downloads(96) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return