TY - JOUR
T1 - Physical Layer Security in Cognitive Radio Inspired NOMA Network
AU - Xiang, Zhongwu
AU - Yang, Weiwei
AU - Pan, Gaofeng
AU - Cai, Yueming
AU - Song, Yi
N1 - Publisher Copyright:
© 2007-2012 IEEE.
PY - 2019/6
Y1 - 2019/6
N2 - This paper investigates physical layer security (PLS) in cognitive radio inspired non-orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary users. To manage the interferences among the users and guarantee the quality of services of primary users, a new secure NOMA transmission strategy is designed, where the primary and secondary users are paired according to their channel gains, respectively, and power-domain NOMA is employed to transmit the signal. Then, the closed-form expressions for connection outage probability, secrecy outage probability, and effective secrecy throughput are derived for the primary users over Nakagami-m fading channels when the secondary users are considered as eavesdroppers. Typically, the secrecy performance can be improved by pairing the primary users with best channel gains or reducing the number of secondary users. In addition, we also investigate the performances of secondary users by deriving the closed-form expressions for throughput of secondary network. Furthermore, simulations are conducted to verify our analysis results and provide insights into the impact of the parameters on system performance.
AB - This paper investigates physical layer security (PLS) in cognitive radio inspired non-orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary users. To manage the interferences among the users and guarantee the quality of services of primary users, a new secure NOMA transmission strategy is designed, where the primary and secondary users are paired according to their channel gains, respectively, and power-domain NOMA is employed to transmit the signal. Then, the closed-form expressions for connection outage probability, secrecy outage probability, and effective secrecy throughput are derived for the primary users over Nakagami-m fading channels when the secondary users are considered as eavesdroppers. Typically, the secrecy performance can be improved by pairing the primary users with best channel gains or reducing the number of secondary users. In addition, we also investigate the performances of secondary users by deriving the closed-form expressions for throughput of secondary network. Furthermore, simulations are conducted to verify our analysis results and provide insights into the impact of the parameters on system performance.
KW - CR-NOMA networks
KW - Physical layer security
KW - effective secrecy throughput
KW - user pairing
UR - http://www.scopus.com/inward/record.url?scp=85062384804&partnerID=8YFLogxK
U2 - 10.1109/JSTSP.2019.2902103
DO - 10.1109/JSTSP.2019.2902103
M3 - Article
AN - SCOPUS:85062384804
SN - 1932-4553
VL - 13
SP - 700
EP - 714
JO - IEEE Journal on Selected Topics in Signal Processing
JF - IEEE Journal on Selected Topics in Signal Processing
IS - 3
M1 - 8653906
ER -