Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Cooperative jamming can effectively combat eavesdropping in physical layer security communication without affecting the legal receiver and improve the security performance of the system. This paper introduces cooperative jamming to cognitive radio (CR) networks with non-orthogonal multiple access (NOMA) technology. The secure performance of the considered CR and NOMA (CR-NOMA) network is evaluated using two modes: non-cooperative jamming and cooperative jamming. In particular, the secrecy outage probabilities (SOPs) of the primary user (PU) in the two modes are derived under Rician fading channels, based on which, the influences of the transmission signal-to-noise ratio (SNR) of secondary users (SUs), the number of SUs, the secrecy rate, and the power allocation coefficient on the SOPs of PU are analyzed thereafter. Both analysis and simulation results show that cooperative jamming effectively prevents eavesdropping behaviour, which reduces the SOP of PU compared to non-cooperative jamming. We also show that the transmission SNR, the number of SUs, the secrecy rate, and the power distribution coefficients greatly influence performance improvement.
M. Li, G. Cao, F. El Bouanani, S. Huang, W. Chen, Z. Han, and S. Muhaidat, Error performance of NOMA system with outdated, imperfect CSI, and RHI over α − μ fading channels, IEEE Trans. Veh. Technol., pp. 1–12, 2023.
L. Bariah, L. Mohjazi, S. Muhaidat, P. C. Sofotasios, G. K. Kurt, H. Yanikomeroglu, and O. A. Dobre, A prospective look: Key enabling technologies, applications and open research topics in 6G networks, IEEE Access, vol. 8, pp. 174792–174820, 2020.
X. Li, J. Li, and L. Li, Performance analysis of impaired SWIPT NOMA relaying networks over imperfect Weibull channels, IEEE Syst. J., vol. 14, no. 1, pp. 669–672, 2020.
M. Li, H. Yuan, C. Maple, Y. Li, and O. Alluhaibi, Security outage probability analysis of cognitive networks with multiple eavesdroppers for industrial Internet of Things, IEEE Trans. Cogn. Commun. Netw., vol. 8, no. 3, pp. 1422–1433, 2022.
L. Lv, J. Chen, Q. Ni, and Z. Ding, Design of cooperative non-orthogonal multicast cognitive multiple access for 5G systems: User scheduling and performance analysis, IEEE Trans. Commun., vol. 65, no. 6, pp. 2641–2656, 2017.
S. Arzykulov, T. A. Tsiftsis, G. Nauryzbayev, and M. Abdallah, Outage performance of cooperative underlay CR-NOMA with imperfect CSI, IEEE Commun. Lett., vol. 23, no. 1, pp. 176–179, 2019.
X. Liu, Y. Wang, S. Liu, and J. Meng, Spectrum resource optimization for NOMA-based cognitive radio in 5G communications, IEEE Access, vol. 6, pp. 24904–24911, 2018.
A. Kumar and K. Kumar, Relay sharing with DF and AF techniques in NOMA assisted Cognitive Radio Networks, Phys. Commun., vol. 42, p. 101143, 2020.
L. Lv, J. Chen, Q. Ni, Z. Ding, and H. Jiang, Cognitive non-orthogonal multiple access with cooperative relaying: A new wireless frontier for 5G spectrum sharing, IEEE Commun. Mag., vol. 56, no. 4, pp. 188–195, 2018.
F. Zhou, Y. Wu, Y. C. Liang, Z. Li, Y. Wang, and K. K. Wong, State of the art, taxonomy, and open issues on cognitive radio networks with NOMA, IEEE Wirel. Commun., vol. 25, no. 2, pp. 100–108, 2018.
X. Sun, W. Yang, Y. Cai, R. Ma, and L. Tao, Physical layer security in millimeter wave SWIPT UAV-based relay networks, IEEE Access, vol. 7, pp. 35851–35862, 2019.
M. Li, H. Yuan, X. Yue, S. Muhaidat, C. Maple, and M. Dianati, Secrecy outage analysis for alamouti space–time block coded non-orthogonal multiple access, IEEE Commun. Lett., vol. 24, no. 7, pp. 1405–1409, 2020.
M. Li, X. Yang, F. Khan, M. Ahmad Jan, W. Chen, and Z. Han, Improving physical layer security in vehicles and pedestrians networks with ambient backscatter communication, IEEE Trans. Intell. Transp. Syst., vol. 23, no. 7, pp. 9380–9390, 2022.
X. Yue, Y. Liu, Y. Yao, X. Li, R. Liu, and A. Nallanathan, Secure communications in a unified non-orthogonal multiple access framework, IEEE Trans. Wireless Commun., vol. 19, no. 3, pp. 2163–2178, 2020.
Y. Zou, J. Zhu, X. Wang, and L. Hanzo, A survey on wireless security: Technical challenges, recent advances, and future trends, Proc. IEEE, vol. 104, no. 9, pp. 1727–1765, 2016.
Y. Zhang, H. M. Wang, Q. Yang, and Z. Ding, Secrecy sum rate maximization in non-orthogonal multiple access, IEEE Commun. Lett., vol. 20, no. 5, pp. 930–933, 2016.
M. Li, H. Yuan, C. Maple, W. Cheng, and G. Epiphaniou, Physical layer security analysis of cognitive NOMA Internet of Things networks, IEEE Syst. J., vol. 17, no. 1, pp. 1045–1055, 2023.
Y. Song, W. Yang, Z. Xiang, H. Wang, and F. Cao, Research on cognitive power allocation for secure millimeter-wave NOMA networks, IEEE Trans. Veh. Technol., vol. 69, no. 11, pp. 13424–13436, 2020.
Z. Xiang, W. Yang, G. Pan, Y. Cai, and Y. Song, Physical layer security in cognitive radio inspired NOMA network, IEEE J. Sel. Top. Signal Process., vol. 13, no. 3, pp. 700–714, 2019.
Z. Xiang, W. Yang, Y. Cai, Z. Ding, and Y. Song, Secure transmission design in HARQ assisted cognitive NOMA networks, IEEE Trans. Inform. Forensic Secur., vol. 15, pp. 2528–2541, 2020.
D. Wang and S. Men, Secure energy efficiency for NOMA based cognitive radio networks with nonlinear energy harvesting, IEEE Access, vol. 6, pp. 62707–62716, 2018.
B. Chen, Y. Chen, Y. Chen, Y. Cao, Z. Ding, N. Zhao, and X. Wang, Secure primary transmission assisted by a secondary full-duplex NOMA relay, IEEE Trans. Veh. Technol., vol. 68, no. 7, pp. 7214–7219, 2019.
Y. Chen, T. Zhang, Y. Liu, and X. Qiao, Physical layer security in NOMA-enabled cognitive radio networks with outdated channel state information, IEEE Access, vol. 8, pp. 159480–159492, 2020.
F. Zhou, Z. Chu, H. Sun, R. Q. Hu, and L. Hanzo, Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT, IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 918–931, 2018.
X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. H. Chen, A survey on multiple-antenna techniques for physical layer security, IEEE Commun. Surv. Tutorials, vol. 19, no. 2, pp. 1027–1053, 2017.
J. Huang and A. L. Swindlehurst, Cooperative jamming for secure communications in MIMO relay networks, IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871–4884, 2011.
H. M. Wang, M. Luo, X. G. Xia, and Q. Yin, Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and No eavesdropper’s CSI, IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39–42, 2013.
Y. Zou, B. Champagne, W. P. Zhu, and L. Hanzo, Relay-selection improves the security-reliability trade-off in cognitive radio systems, IEEE Trans. Commun., vol. 63, no. 1, pp. 215–228, 2015.
C. Deng, M. Liu, X. Li, and Y. Liu, Hardware impairments aware full-duplex NOMA networks over rician fading channels, IEEE Syst. J., vol. 15, no. 2, pp. 2515–2518, 2021.
H. A. Suraweera, G. K. Karagiannidis, and P. J. Smith, Performance analysis of the dual-hop asymmetric fading channel, IEEE Trans. Wirel. Commun., vol. 8, no. 6, pp. 2783–2788, 2009.
658
Views
220
Downloads
0
Crossref
0
Web of Science
0
Scopus
0
CSCD
Altmetrics
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).