Secure Transmission for NOMA-Based Cognitive Radio Networks With Imperfect CSI

被引:17
|
作者
Shang, Zhihui [1 ,2 ]
Zhang, Tao [3 ]
Hu, Guojie [4 ]
Cai, Yueming [1 ]
Yang, Weiwei [1 ]
机构
[1] Army Engn Univ PLA, Coll Commun Engn, Nanjing 210007, Peoples R China
[2] Zunyi Med Univ, Coll Med Informat Engn, Zunyi 563006, Guizhou, Peoples R China
[3] Natl Univ Def Technol, Res Inst 63, Nanjing, Peoples R China
[4] Rocket Force Univ Engn, Dept Commun Engn, Xian 710025, Peoples R China
关键词
Non-orthogonal multiple access; zero forcing beamforming; cognitive radio; physical-layer security; full-duplex; imperfect CSI; NONORTHOGONAL MULTIPLE-ACCESS; SYSTEMS;
D O I
10.1109/LCOMM.2021.3069854
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This letter studies the secure transmission issue of non-orthogonal multiple access (NOMA) based cognitive radio networks (CRNs) with imperfect channel state information (CSI), where the secondary user (SU) transmitter aims to transmit the normalized messages to two receivers U-a and U-b, and concurrently U-b with full-duplex (FD) ability implements jamming to confuse the eavesdropping of the illegal user while causing zero interference to the primary user and U-a. Under this setup, the novel exact closed-form expressions of connection outage probability (COP), secrecy outage probability (SOP) and effective secrecy throughput (EST) for each SU receiver under Rayleigh fading channels are derived. Simulation results are presented to demonstrate that: 1) the proposed scheme can achieve pretty good security and reliability performance, but there exist trade-off between such two indicators; 2) the FD-NOMA operation performs better than the half-duplex (HD) NOMA and HD orthogonal multiple access (OMA) in term of EST.
引用
收藏
页码:2517 / 2521
页数:5
相关论文
共 50 条
  • [41] Energy Efficiency Optimization for NOMA-Based Cognitive Radio With Energy Harvesting
    Wang, Xin
    Na, Zhenyu
    Lam, Kwok-Yan
    Liu, Xin
    Gao, Zihe
    Li, Feng
    Wang, Li
    [J]. IEEE ACCESS, 2019, 7 : 139172 - 139180
  • [42] Secure Transmission for NOMA Systems with Imperfect SIC
    Xiang, Zhongwu
    Tong, Xiaobing
    Cai, Yueming
    [J]. CHINA COMMUNICATIONS, 2020, 17 (11) : 67 - 78
  • [43] Secure Transmission for NOMA Systems with Imperfect SIC
    Zhongwu Xiang
    Xiaobing Tong
    Yueming Cai
    [J]. China Communications, 2020, 17 (11) : 67 - 78
  • [44] NOMA in Cooperative Underlay Cognitive Radio Networks Under Imperfect SIC
    Dinh-Thuan Do
    Anh-Tu Le
    Lee, Byung Moo
    [J]. IEEE ACCESS, 2020, 8 : 86180 - 86195
  • [45] Robust Resource Optimization for Cooperative Cognitive Radio Networks with Imperfect CSI
    Mallick, Shankhanaad
    Devarajan, Rajiv
    Loodaricheh, Roya Arab
    Bhargava, Vijay K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (02) : 907 - 920
  • [46] Max-Min Resource Allocation for Video Transmission in NOMA-Based Cognitive Wireless Networks
    Xu, Lei
    Zhou, Yong
    Wang, Ping
    Liu, Wanli
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (11) : 5804 - 5813
  • [47] NOMA-Based Integrated Satellite Terrestrial Networks With Relay Selection and Imperfect SIC
    Shuai, Haifeng
    Guo, Kefeng
    An, Kang
    Zhu, Shibing
    [J]. IEEE ACCESS, 2021, 9 (09): : 111346 - 111357
  • [48] Error Performance of NOMA-Based Cognitive Radio Networks With Partial Relay Selection and Interference Power Constraints
    Bariah, Lina
    Muhaidat, Sami
    Al-Dweik, Arafat
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (02) : 765 - 777
  • [49] Secure Transmission in mmWave NOMA Networks With Cognitive Power Allocation
    Song, Yi
    Yang, Weiwei
    Xiang, Zhongwu
    Wang, Biao
    Cai, Yueming
    [J]. IEEE ACCESS, 2019, 7 : 76104 - 76119
  • [50] Secure Transmission Design in HARQ Assisted Cognitive NOMA Networks
    Xiang, Zhongwu
    Yang, Weiwei
    Cai, Yueming
    Ding, Zhiguo
    Song, Yi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 2528 - 2541