AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1.6 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Physical Layer Security for CR-NOMA Network with Cooperative Jamming

School of Electronics Information Engineering, Taiyuan University of Science and Technology, Taiyuan 030024, China
School of Computer Science and Mathematics, Kingston University, London, KT1 2EE, UK
Shenzhen International Graduate School, Tsinghua University, Shenzhen 518055, China
Show Author Information

Abstract

Cooperative jamming can effectively combat eavesdropping in physical layer security communication without affecting the legal receiver and improve the security performance of the system. This paper introduces cooperative jamming to cognitive radio (CR) networks with non-orthogonal multiple access (NOMA) technology. The secure performance of the considered CR and NOMA (CR-NOMA) network is evaluated using two modes: non-cooperative jamming and cooperative jamming. In particular, the secrecy outage probabilities (SOPs) of the primary user (PU) in the two modes are derived under Rician fading channels, based on which, the influences of the transmission signal-to-noise ratio (SNR) of secondary users (SUs), the number of SUs, the secrecy rate, and the power allocation coefficient on the SOPs of PU are analyzed thereafter. Both analysis and simulation results show that cooperative jamming effectively prevents eavesdropping behaviour, which reduces the SOP of PU compared to non-cooperative jamming. We also show that the transmission SNR, the number of SUs, the secrecy rate, and the power distribution coefficients greatly influence performance improvement.

References

[1]

M. Li, G. Cao, F. El Bouanani, S. Huang, W. Chen, Z. Han, and S. Muhaidat, Error performance of NOMA system with outdated, imperfect CSI, and RHI over α μ fading channels, IEEE Trans. Veh. Technol., pp. 1–12, 2023.

[2]

L. Bariah, L. Mohjazi, S. Muhaidat, P. C. Sofotasios, G. K. Kurt, H. Yanikomeroglu, and O. A. Dobre, A prospective look: Key enabling technologies, applications and open research topics in 6G networks, IEEE Access, vol. 8, pp. 174792–174820, 2020.

[3]

X. Li, J. Li, and L. Li, Performance analysis of impaired SWIPT NOMA relaying networks over imperfect Weibull channels, IEEE Syst. J., vol. 14, no. 1, pp. 669–672, 2020.

[4]

M. Li, H. Yuan, C. Maple, Y. Li, and O. Alluhaibi, Security outage probability analysis of cognitive networks with multiple eavesdroppers for industrial Internet of Things, IEEE Trans. Cogn. Commun. Netw., vol. 8, no. 3, pp. 1422–1433, 2022.

[5]

L. Lv, J. Chen, Q. Ni, and Z. Ding, Design of cooperative non-orthogonal multicast cognitive multiple access for 5G systems: User scheduling and performance analysis, IEEE Trans. Commun., vol. 65, no. 6, pp. 2641–2656, 2017.

[6]

S. Arzykulov, T. A. Tsiftsis, G. Nauryzbayev, and M. Abdallah, Outage performance of cooperative underlay CR-NOMA with imperfect CSI, IEEE Commun. Lett., vol. 23, no. 1, pp. 176–179, 2019.

[7]

X. Liu, Y. Wang, S. Liu, and J. Meng, Spectrum resource optimization for NOMA-based cognitive radio in 5G communications, IEEE Access, vol. 6, pp. 24904–24911, 2018.

[8]

A. Kumar and K. Kumar, Relay sharing with DF and AF techniques in NOMA assisted Cognitive Radio Networks, Phys. Commun., vol. 42, p. 101143, 2020.

[9]

L. Lv, J. Chen, Q. Ni, Z. Ding, and H. Jiang, Cognitive non-orthogonal multiple access with cooperative relaying: A new wireless frontier for 5G spectrum sharing, IEEE Commun. Mag., vol. 56, no. 4, pp. 188–195, 2018.

[10]

F. Zhou, Y. Wu, Y. C. Liang, Z. Li, Y. Wang, and K. K. Wong, State of the art, taxonomy, and open issues on cognitive radio networks with NOMA, IEEE Wirel. Commun., vol. 25, no. 2, pp. 100–108, 2018.

[11]

X. Sun, W. Yang, Y. Cai, R. Ma, and L. Tao, Physical layer security in millimeter wave SWIPT UAV-based relay networks, IEEE Access, vol. 7, pp. 35851–35862, 2019.

[12]

M. Li, H. Yuan, X. Yue, S. Muhaidat, C. Maple, and M. Dianati, Secrecy outage analysis for alamouti space–time block coded non-orthogonal multiple access, IEEE Commun. Lett., vol. 24, no. 7, pp. 1405–1409, 2020.

[13]

M. Li, X. Yang, F. Khan, M. Ahmad Jan, W. Chen, and Z. Han, Improving physical layer security in vehicles and pedestrians networks with ambient backscatter communication, IEEE Trans. Intell. Transp. Syst., vol. 23, no. 7, pp. 9380–9390, 2022.

[14]
Z. Qin, Y. Liu, Z. Ding, Y. Gao, and M. Elkashlan, Physical layer security for 5G non-orthogonal multiple access in large-scale networks, in Proc. 2016 IEEE Int. Conf. Communications (ICC), Kuala Lumpur, Malaysia, 2016, pp. 1–17.
[15]

X. Yue, Y. Liu, Y. Yao, X. Li, R. Liu, and A. Nallanathan, Secure communications in a unified non-orthogonal multiple access framework, IEEE Trans. Wireless Commun., vol. 19, no. 3, pp. 2163–2178, 2020.

[16]

Y. Zou, J. Zhu, X. Wang, and L. Hanzo, A survey on wireless security: Technical challenges, recent advances, and future trends, Proc. IEEE, vol. 104, no. 9, pp. 1727–1765, 2016.

[17]

Y. Zhang, H. M. Wang, Q. Yang, and Z. Ding, Secrecy sum rate maximization in non-orthogonal multiple access, IEEE Commun. Lett., vol. 20, no. 5, pp. 930–933, 2016.

[18]

M. Li, H. Yuan, C. Maple, W. Cheng, and G. Epiphaniou, Physical layer security analysis of cognitive NOMA Internet of Things networks, IEEE Syst. J., vol. 17, no. 1, pp. 1045–1055, 2023.

[19]

Y. Song, W. Yang, Z. Xiang, H. Wang, and F. Cao, Research on cognitive power allocation for secure millimeter-wave NOMA networks, IEEE Trans. Veh. Technol., vol. 69, no. 11, pp. 13424–13436, 2020.

[20]

Z. Xiang, W. Yang, G. Pan, Y. Cai, and Y. Song, Physical layer security in cognitive radio inspired NOMA network, IEEE J. Sel. Top. Signal Process., vol. 13, no. 3, pp. 700–714, 2019.

[21]

Z. Xiang, W. Yang, Y. Cai, Z. Ding, and Y. Song, Secure transmission design in HARQ assisted cognitive NOMA networks, IEEE Trans. Inform. Forensic Secur., vol. 15, pp. 2528–2541, 2020.

[22]

D. Wang and S. Men, Secure energy efficiency for NOMA based cognitive radio networks with nonlinear energy harvesting, IEEE Access, vol. 6, pp. 62707–62716, 2018.

[23]
Z. Zhang, J. Chen, L. Lv, and Q. Ye, Utilizing cooperative jamming to secure cognitive radio NOMA networks, in Proc. 2020 IEEE Global Communications Conference, Taipei, China, 2020.
[24]

B. Chen, Y. Chen, Y. Chen, Y. Cao, Z. Ding, N. Zhao, and X. Wang, Secure primary transmission assisted by a secondary full-duplex NOMA relay, IEEE Trans. Veh. Technol., vol. 68, no. 7, pp. 7214–7219, 2019.

[25]

Y. Chen, T. Zhang, Y. Liu, and X. Qiao, Physical layer security in NOMA-enabled cognitive radio networks with outdated channel state information, IEEE Access, vol. 8, pp. 159480–159492, 2020.

[26]

F. Zhou, Z. Chu, H. Sun, R. Q. Hu, and L. Hanzo, Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT, IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 918–931, 2018.

[27]

X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. H. Chen, A survey on multiple-antenna techniques for physical layer security, IEEE Commun. Surv. Tutorials, vol. 19, no. 2, pp. 1027–1053, 2017.

[28]
S. Bhattacharjee, Friendly jamming assisted secure cooperative multicasting in cognitive radio-NOMA networks, in Proc. 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 2019.
[29]

J. Huang and A. L. Swindlehurst, Cooperative jamming for secure communications in MIMO relay networks, IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871–4884, 2011.

[30]

H. M. Wang, M. Luo, X. G. Xia, and Q. Yin, Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and No eavesdropper’s CSI, IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39–42, 2013.

[31]

Y. Zou, B. Champagne, W. P. Zhu, and L. Hanzo, Relay-selection improves the security-reliability trade-off in cognitive radio systems, IEEE Trans. Commun., vol. 63, no. 1, pp. 215–228, 2015.

[32]

C. Deng, M. Liu, X. Li, and Y. Liu, Hardware impairments aware full-duplex NOMA networks over rician fading channels, IEEE Syst. J., vol. 15, no. 2, pp. 2515–2518, 2021.

[33]

H. A. Suraweera, G. K. Karagiannidis, and P. J. Smith, Performance analysis of the dual-hop asymmetric fading channel, IEEE Trans. Wirel. Commun., vol. 8, no. 6, pp. 2783–2788, 2009.

[34]
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products. New York, NY, USA: Academic Press, 2014.
[35]
F. B. Hildebrand, Methods of Applied Mathematics. Englewood Cliffs, NJ, USA: Prentice-hall Inc., 2012.
Tsinghua Science and Technology
Pages 708-720
Cite this article:
Li M, Xue P, Yuan H, et al. Physical Layer Security for CR-NOMA Network with Cooperative Jamming. Tsinghua Science and Technology, 2025, 30(2): 708-720. https://doi.org/10.26599/TST.2023.9010128

658

Views

220

Downloads

0

Crossref

0

Web of Science

0

Scopus

0

CSCD

Altmetrics

Received: 18 July 2023
Revised: 27 October 2023
Accepted: 29 October 2023
Published: 09 December 2024
© The Author(s) 2025.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return