Performance Analysis of Physical Layer Security for Cognitive Radio Non-Orthogonal Multiple Access Random Network

被引:3
|
作者
Yu Baoquan [1 ]
Cai Yueming [1 ]
Hu Jianwei [1 ]
机构
[1] Army Engn Univ PLA, Nanjing 210007, Peoples R China
基金
中国国家自然科学基金;
关键词
Cognitive Radio (CR); Physical layer security; Heuristic Non-Orthogonal Multiple Access (NOMA); Random distribution; Power allocation; DESIGN;
D O I
10.11999/JEIT190049
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper analyzes the security communication performance of secondary user communication pairs in Cognitive Radio Non-Orthogonal Multiple Access (CR-NOMA) networks, where interference sources and eavesdropping nodes are randomly distributed. The stochastic geometry theory is used to model the eavesdropping nodes and the interfering nodes as a homogeneous Poisson Point Processes (PPP). Firstly, to ensure the reliability of the primary user communication pairs, the power allocation coefficient set of the sender is obtained, and the closed expressions of the connection outage probability and the secrecy outage probability of the secondary user are further obtained. Then, the variation of the power distribution coefficient with the constraint of the primary user's reliability is analyzed. Finally, the relationship between outage probability of secondary user communication pairs and the density of the eavesdropping nodes and the transmission power is studied. The research shows that the enhancement of interfering signal reduces the reliability of the system, but brings about a significant improvement of security performance. The simulation results verify the correctness of the theoretical analysis.
引用
收藏
页码:950 / 956
页数:7
相关论文
共 20 条
  • [1] Outage Performance of Cooperative Underlay CR-NOMA With Imperfect CSI
    Arzykulov, Sultangali
    Tsiftsis, Theodoros A.
    Nauryzbayev, Galymzhan
    Abdallah, Mohamed
    [J]. IEEE COMMUNICATIONS LETTERS, 2019, 23 (01) : 176 - 179
  • [2] Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise
    Cai, Yueming
    Xu, Xiaoming
    Yang, Weiwei
    [J]. IET COMMUNICATIONS, 2016, 10 (15) : 1904 - 1913
  • [3] Chandramoorthy N, 2015, INT S HIGH PERF COMP, P1, DOI 10.1109/HPCA.2015.7056017
  • [4] Chen H., 2017, Mobile Information Systems, V2017, DOI DOI 10.1155/2017/3906953
  • [5] Preparation of magnetic nanoparticles via chemically induced transition: Dependence of components and magnetization on the concentration of treating solution used
    Chen, Yanshuang
    Chen, Qin
    Mao, Hong
    Zhang, Ting
    Qiu, Xiaoyan
    Lin, Yueqiang
    Li, Jian
    [J]. NANOMATERIALS AND NANOTECHNOLOGY, 2017, 7
  • [6] Cicioglu M., 2018, 2018 26th Signal Processing and Communications Applications Conference (SIU), P25, DOI 10.1109/CEIT.2018.8751881
  • [7] Dai LL, 2015, IEEE COMMUN MAG, V53, P74, DOI 10.1109/MCOM.2015.7263349
  • [8] Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
    Deng, Yansha
    Wang, Lifeng
    Elkashlan, Maged
    Nallanathan, Arumugam
    Mallik, Ranjan K.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1128 - 1138
  • [9] Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions
    Ding, Zhiguo
    Fan, Pingzhi
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) : 6010 - 6023
  • [10] On the Design of Secure Non-Orthogonal Multiple Access Systems
    He, Biao
    Liu, An
    Yang, Nan
    Lau, Vincent K. N.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (10) : 2196 - 2206