SlideShare a Scribd company logo
Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 3, June 2020, pp. 1046~1054
ISSN: 2302-9285, DOI: 10.11591/eei.v9i3.1639  1046
Journal homepage: http://beei.org
Security performance analysis for power domain NOMA
employing in cognitive radio networks
Thi-Anh Hoang, Chi-Bao Le, Dinh-Thuan Do
Industrial University of Ho Chi Minh City, Vietnam
Article Info ABSTRACT
Article history:
Received May 16, 2019
Revised Sep 26, 2019
Accepted Feb 1, 2020
The power domain non-orthogonal multiple access (NOMA) technique
introduces one of the fundamental characteristics and it exhibits
the possibility of users to decode the messages of the other paired users on
the same resources. In cognitive radio inspired NOMA (CR-NOMA),
the base station (BS) has to serve untrusted users or users with different
security clearance. This phenomenon raises a security threat particularly in
such CR-NOMA. This paper develops a tractable analysis framework to
evaluate the security performance of cooperative non-orthogonal multiple
access (NOMA) in cognitive networks, where relay is able to serve two far
NOMA users in the presence of external eavesdropper. In particular,
we study the secrecy outage probability in a two-user NOMA system.
This situation happens in practical the BS is pairing a legitimate user with
another untrusted user. Main reason is that the non-uniform distribution in
terms of trusted and untrusted users in the cell. By performing numerical
results demonstrate the performance improvements of the proposed NOMA
scheme in comparison to that of several situations in terms of different
parameters. Furthermore, the security performance of NOMA is shown to
verify thederived expressions.
Keywords:
Cognitive radio
Non-orthogonal multiple access
(NOMA)
Physical-layer security
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do,
Industrial University of Ho Chi Minh City,
12 Nguyen Van Bao, Go Vap, Ho Chi Minh City, Vietnam.
Email: dodinhthuan@iuh.edu.vn
1. INTRODUCTION
As a promising multiple access (MA) technique, Non-orthogonal multiple access (NOMA) has been
proposed to adapt the challenging requirements of the future mobile communication networks. Several strict
requirements in 5G wireless communication can be achieved such as high data speed, spectral efficiency,
massive connectivity and low latency [1-10]. In [11, 12] the NOMA can be integrated with green
communication to enable ability of wireless power transfer in cooperative NOMA network. Other application
of device-to-device (D2D) to NOMA is introduced as in [13]. Different with the conventional MA
techniques, the power domain is used to serve a multiple user in NOMA at different power levels and such
paradigm exhibits a high spectral efficiency [14]. To permit the unlicensed users operating on the spectrum
allocated for the licensed users, cognitive radio networks (CRNs) have been recommended to achieve full
advantage of radio resource. In these situations, the quality of service of the primary user networks
is maintained [15, 16]. In general, power domain multiple access scheme and spectrum efficiency
are advantages are able to achieved. Hence, by introducing NOMA to PUNs, the system performance
of cognitive radio can be further increased.
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang)
1047
In the other trend, dedicated relays [17-19] are also deployed to reform cooperative NOMA
transmission [20]. To enhance the reliability of the NOMA-weak users, [21] adopted a dedicated
relay network. Also, with the help of a relay (both AF and DF protocols) [22] presented a secrecy analysis
of a NOMA system. The other works reported in [23-25], in which the CR networks are studied with
an underlay paradigm. From raised analytical results according to the previous analysis, the improved system
performance benefits from combining system between overlay CR and NOMA. Unfortunately, overlay
CR can enhance system performance and also produce the risk of infection of illegal information
simultaneously. On the contrary, NOMA can achieve better secrecy performance than OMA [22].
The physical layer security performance in overlay CR-NOMA networks is still a challenging issue and it
motivates this study. This paper determines physical layer security (PLS) in cognitive radio inspired
non-orthogonal multiple access (CRNOMA) networks with secondary source and multiple secondary users
under impact of primary destination.
To manage the interference among the users and guarantee the quality of services (QoS) of primary
users, a new secure NOMA transmission strategy is designed, where the primary and secondary users
are paired according to their channel gains, respectively, and power-domain NOMA is employed to transmit
the signal. This paper studies a downlink cooperative CR-NOMA model with interference temperature
constraint (ITC) at the primary receiver. Exact closed-form expressions for the OP of the far NOMA users
are derived. These expressions are verified by Monte-Carlo simulations.
2. SYSTEM MODEL
A downlink cooperative underlay CR-NOMA is considered in this study. In this model, secondary
network (SN) consists of a secondary base station (S), a relay (R) and two far NOMA users (D1; D2) can
operate together with primary network containing primary destination (PD) who make impact on system
performance at secondary network, as shown in Figure 1. Regarding secure performance, existence
of eavesdropper E need be concerned. The links are assigned channel as in Figure 1 and these channels
follow flat Rayleigh fading model. SR
h is the channel between BS and relay, SR
h is the channel between Relay
and two users. S
P is transmit power at the BS. We denote the superimposed signal to transmit from the BS
to secondary destinations 1 1 2 2
S S
a P x a P x
 . While 1 2
,
a a are power allocation factors in NOMA satisfying
 
1 2 1 2
1,
a a a a
   .
BS Relay
PD
D1
D2
E
hRD1
hRD2
hRE
hSR
hSP
Figure 1. Systemmodel of secure CR-NOMA
The transmit power constraint is determined at the BS:
_
2
min ,
S S
SP
I
P P
h
 
 

 
 
(1)
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054
1048
where
_
S
P and I stand for maximum average transmit power available at the BS and ITC at D
P . In the first
time, R received the following signal:
 
1 1 2 2
R SR S S R
y h a P x a P x n
   (2)
in which R
n stand for the AWGN noise terms at R.
Then, we compute signal-to-interference-plus-noise ratio (SINR) and signal-to-noise ratio (SNR)
of decoding 1
x and 2
x at R and they can be respectively written as:
2
1
1
2
2 1
S SR
R
S SR
a h
a h





(3)
and
2
2
2
R S SR
a h
 
 (4)
where 2
S
S
P


 is the transmit SNR at the BS.
In the second phase, the detected superimposed signal 1 1 2 2
R R
P x P x
 
 will be forwarded to
destinations.It is noted that R
P is the transmit power at R . The received signal at i
D can be given as:
   
1 1 2 2 , 1,2
Di RDi R R Di
y h P x P x n i
 
     (5)
where Di
n is the AWGN noise terms at i
D . Further, due to the fact that 1
D is allocated with higher power
factor, it can detect 1
x by treating 2
x as a background noise and it can be achieved following SINR.
2
1 1
1 2
1 2 1
RD R
D
RD R
h
h
 

 


(6)
Furthermore, 2
D with SIC is required to detect 1
x while 2
x is considered as a noise. The SINR in
this case can be expressed:
2
2 1
2 1 2
2 2 1
RD R
D
RD R
h
h
 

 
 

(7)
where 2
R
R
P


 is the transmit SNR at R . the following SNR can be obtained to 2
D detects its own signal.
2
2 2 2
D RD R
h
  
 (8)
The signal received at E
 
1 1 2 1
E RE E E E
y h P x P x n
 
   (9)
where E
n indicates the AWGN noise terms at E . RE
h is the channel between Relay and E .
The signal-to-noise ratio (SNR) at E :
2
Ei i E RE
h
  
 (10)
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang)
1049
where 2
E
E
P


 is transmit SNR at E . The achievable rates of 1
x and 2
x are derived respectively:
 
 
1
1 2 2 1 1
1
log 1 min , ,
2 R D D
K   

  (11)
 
 
2
2 2 2
1
log 1 min ,
2 R D
K  
  (12)
and the achievable rates of eavesdropper’s signalis given by:
 
2
1
log 1
2
Ei Ei
K 
  (13)
the secrecy capacity for 1
D is obtained as:
 
1
2 1 1
1 2
1
1 min , ,
1
log
2 1
R D D
E
C
  



 
 

 
 

 

 
 
 
(14)
the secrecy capacity for 2
D is obtained as:
 
2
2
2 2
2
1 min ,
1
log
2 1
R D
E
C
 


 
 

 
 

 

 
 
 
(15)
where    
max ,0
x x

 .
3. SECRECY PERFORMANCE ANALYSIS
In NOMA systems, with the help of a relay two signals are transmitted from the source to 1
D
and 2
D respectively. As a result, outage happens when either 1
C or 2
C falls below their own target rates.
Be exploiting this definition, the secure outage probability (SOP) can be formulated as following sections:
3.1. SOP at D1
 
1 1 1
2 2
2 2
1 2 1
1 1
2 2
2 2 2
2
2
1 1
1
2
1 2
Pr
1 Pr Pr
1 1
Pr
1
SOP
S SR RD R
RE RE
S SR RD R
A B
RD R
RE
RD R
C
P C R
a h h
h h
a h h
h
h
h
  
   
  
 
 
 
 
   
   
     
   
 
   
 
 
  
 

 
(16)
where 1 1
2 2
1 1
2 , 2 1
R R
E
   
   .
Firstly, A can be written by:
 
 
 
 
 
1 2
2 2 2
1 1
2 2
2 2
2 2
1 1 2 1 1 2
Pr , Pr ,
RE RE SP
I I
SR S SR S
SP SP
S RE S RE I
A A
h h h
A h h
h h
a h a a h a
   
 
 
      
 
 
 
 
 
     
 
 
 
   
 
   
we have 1
A as:
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054
1050
 
2
2 2
1
1 2
1 1 2
Pr ,
RE I
SR SP
S
S RE S
h
A h h
a h a
  

   
 

 
  
 
 
 
 
provided that
2 1 2 1
2
RE
a a
h
a



 , then 1
A can be calculated as:
   
 
 
 
1 2 1
2
2 2 2
1
1 1 2
1
1 1 2
1 1 2 2
2
1 0 0
0
1
1
I
S
RE
SP SR
S S
I
S SR
S SP RE
a a
a
y
h
h h
a y a
y
y
a a
a a a y
a
RE
A f x f y f z dxdydz
e e e dy
 
 
 
   
 
 
   
  





 

 
 
 

 
   
 
 
  

where 1 1 2 2
,
u a a v a
 
   , we have:
 
1
1 0
1
1
I
S SR
S SP RE
y
y
u
u vy
v
RE
A e e e dy
 

 
  



 

 
   
 
 

let
u q dq
u vy q y dy
v v

     

. We have:
1 1
1
I RE S SR
S SP
u
v v
RE
e
A e
v

   
 


 

 
   
 
 
(17)
where
1
1 0
RE S SR
u v
q
u v vq
e dq
 
  



  .
Similar 1
A , we can calculated 2
A as:
2 2
1 I I
S SP RE I S SR
u
v v
RE
A e
v
 
     


  
 (18)
where
 
 
1
2 0
1
I
RE I S SR
u v
q
u v vq
I SR
I SR SP
qv
e dq
qv u q v
  
   
 

     



  
 .
From (17) and (18) we find A by:
1 2
1
1
I I I
RE S SR
S SP S SP RE I S SR
u
u
v v
v v
RE RE
e
A e e
v v

  
  
       
 
 
 
   
 
    
 
 
(19)
the secondly,B can be written as:
 
2
2 1
2 2
1 1 2 2
Pr RE
RD
RE R
h
B h
h
 
     
 

 
 
 
 
 
 
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang)
1051
provided that
2 1 1 2
2
RE
h
  


 , B calculated as:
   
 
 
1
1 1 2 1 1 2
1 1 2 2 2
2 2
2 2
1
2
1 1 2 2
0 0
1 R RD
RE
RE RD
R
x
x
x
x
h h
x RE
B f x f y dxdy e e dx
 
     
      

 
 
      

  

  

 
 
  
where 1 1 2 2
,
n m
  
   , we have:
 
1
2
0
1 R RD
RE
x
x
n
n mx
m
RE
B e e dx
 
 






 
let
n t dt
t n mx x dx
m m

     

. We have:
2
1
RE R RD
n
m m
RE
e
B
m

  


 
 (20)
where
1
2
1 0
RE R RD
n m
t
n m mt
e e dt
 
  



  .
Similar (20), we can calculated C as:
1
2
RE R RD
n
m m
RE
e
C
m

  


 
 (21)
where
1
1
1 0
RE R RD
n m
t
n m mt
e dt
 
  



  .
From (19), (20) and (21) we calculated 1
SOP
P as:
2 1
1 1 2
2 1
1
1 1
I I I
RE S SR
S SP S SP RE I S SR
RE R RD RE R RD
u
u
v v
v v
SOP
RE RE
n n
m m m m
RE RE
e
P e e
v v
e e
m m

  
  
       
 
     
 
 
 
 
 
   
   
 
 
 
     
 
 
 
 
 
  
  
  
  
  
(22)
3.2. SOP at D2
By definition, we have SOP as:
 
   
2 2
2 2 2 2
2 2 2 2 2
Pr
1 Pr Pr
SOP
S SR RE R RD RE
D E
P C R
a h h h h
      
 
      (23)
where 2 2
2 2
2 2
2 , 2 1
R R
E
   
   . Firstly, D can be rewritten as:
1
2
2
2 2 2 2 2
2
2 2 2
2
Pr , Pr ,
I SR
I I
S SR RE SP RE SP
S S
SP
D D
a h
D a h h h h h
h

 
    
 
 
 
 
       
   
   
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054
1052
let
2
1
S
a
a 
 , 1
D can be computed as:
2
1
2 2 2
1 2
Pr , 1 1
I
SP S SR
a
I RE
SR RE SP
S SR
a
D h a h a h e e
 
  
  
 
 

 
 
   
        
   
 
   
 
(24)
next, let
2
1
I
a
a 
 , 2
D can calculated as:
2
2 2 2 2 2
2 2
1
0 2
Pr ,
I
I I RE SR S
SP S SR S
I
SR SP RE SP SP
S
a
x
a
SR
RE SP SR SP
SP
D h a h h a h h
e
e dx
a a
x
a
 
     
   

 


    

 
 
 
 
  
 
 
   
 
 

 


 
 

Let 2 1
,
SR SP I
SP RE SR S
a a
a
   
 
   
 

  
 
 
, we have 2
D
 
 
2 2
2 1
0
I I I I
SP S SR S SP S SR S
a a
x
SR SR
RE SP RE SP
e
D e dx e e E
a x a
     

        
 

    
 
   
 

 (25)
from (22) and (23) D can be as:
 
2 2
1
1
1 1
I I I
SP S SR SP S SR S
a a
SR
RE
SR RE SP
a
D e e e e E
a
    
       

 

  

   
   
     
 
   
 
(26)
next, with
2
1
R
b
 
 E can be calculated as:
   
2
2
2 2
2
2
2
0
2
RD
RE RD
b
RD
h h
bx b
RE RD
E f x f y dxdy e
b


 

  

 

 

  (27)
from (24) and (25) it can be calculated 2
SOP
P as:
 
 
2 2
2
2 2
2
1
2
2
2
2
1
2
1 1 1
I
SR RD SP S
I I
SP S SR S RD
a b
RD RE
SOP
SR
RE RD
a b
SR RD
RE SP RE RD
a
P e e
b
e e E
a b
  
   
   
     
  

  
 

    

  
  
  
     
 
 
  
 


(28)
4. NUMBER RESULTS
This section of this study represents numerical and simulation results for the SOP over related
Rayleigh fading channels. The adopted system parameters are given in each figure. We evaluate the impact
of target rates on the secrecy outage performance for NOMA-based cognitive radio as in Figure 2. Higher
target rates result in worse SOP performance. It can be seen performance gap among two signals is large at
1 2 0.5
R R
  . The reason is that different power allocation factors for each signal leads to different SOP
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang)
1053
performance. In other observation, impact of interference 10,15, 20( )
I dB
  to secure performance of two
signals can be seen as Figure 3. It can be confirmed lower interference provides better secure performance.
Such performance gap will be reduced at 1 2 1
R R
  . The analytical values of the OP for 1 2
,
x x with various
target rates and SNR threshold values are shown in Figure 4. It is observed that curves of the OP improve
by increasing the transmit SNR. It is worth noting that no ICT case exhibits better secure performance.
Figure 2. 1 1 0.9
a 
  , 2 2 0.1
a 
  , 15
I dB
  ,
5
E dB
  , 0.1
SP
  , 1
SR
  , 1 0.9
RD
  , 2 0.6
RD
 
and 0.1
RE
 
Figure 3. SOP versus transmit SNR with different
I
 ( 1 1 0.9
a 
  , 2 2 0.1
a 
  ,, 5
E dB
  ,
0.1
SP
  , 1
SR
  , 1 0.9
RD
  , 2 0.6
RD
 
and 0.1
RE
  )
Figure 4. SOP versus transmit SNR as ITC consideration ( 1 1 0.9
a 
  , 2 2 0.1
a 
  , 15
I dB
  ,
5
E dB
  , 0.1
SP
  , 1
SR
  , 1 0.9
RD
  , 2 0.6
RD
  and 0.1
RE
  )
5. CONCLUSION
In this paper, in order to evaluate security performance of CR-NOMA systems, SOP performance in
condition of fixed power allocation scheme is examined. A limitation of transmit power at the secondary in
CR-NOMA results in varying secure performance. The threshold data rates and impact of interference from
the primary network are main factors affecting to systemperformance.
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054
1054
REFERENCES
[1] Z. Ding, X. Lei, G. K. Karagiannidis, “A survey on non-orthogonal multiple access for 5G networks: Research
challenges and future trends IEEE,” J. Sel. Areas Commun, vol. 35, no. 10, pp. 2181-2195, 2017.
[2] Y. Liu, Z. Qin, M., “Elkashlan. Nonorthogonal multiple access for 5G and beyond,” Proceedings of the IEEE,
vol. 105, no. 12, pp. 2347-2381, 2017.
[3] Z. Zhang, H. Sun, and R. Q. Hu, “Downlink and uplink non-orthogonal multiple access in a dense wireless
network,” IEEE J. Sel. AreasCommun, vol. 35, no. 12, pp. 2771-2784, 2017.
[4] Tan N. Nguyen, Minh Tran, Van-Duc Phan, H.-N. Nguyen and T.-L. Nguyen,"Half-duplex power beacon-assisted
energy harvesting relaying networks: system performance analysis," International Journal of Electrical and
Computer Engineering, vol. 9, no. 5, pp. 3399-3406, Oct. 2019.
[5] Tan N. Nguyen, Van-Duc Phan, H.-N. Nguyen, Minh Tran and T.-T. Tran,"Performance Analysis for Power-
Splitting Energy Harvesting Based Two-Way Full-Duplex Relaying Network over Nakagami-m Fading Channel,"
Telecommunication, Computing, Electronics and Control TELKOMNIKA, vol. 17, no. 4, pp.1595-1603, Aug. 2019.
[6] Phu Tran Tin, Minh Tran, Tan N.Nguyen and Tran Thanh Trang,"Energy Harvesting Half-Duplex AF Power
Splitting Protocol Relay Network over Rician Channel in Case of Maximizing Capacity", Telecommunication,
Computing, Electronics and Control TELKOMNIKA, vol. 17, no. 4, pp. 1615-1624, Aug. 2019.
[7] Phu Tran Tin, Minh Tran, Tan N. Nguyen, Thanh-Long Nguyen,"System performance analysis of hybrid time-
power switching protocol of EH bidirectional relaying network in amplify-and-forward mode", Indonesian Journal
of Electrical Engineering and Computer Science, vol. 14, no. 1, pp. 118-126, Apr. 2019.
[8] Dinh-Thuan Do and M. S., Van Nguyen, "Device-to-device transmission modes in NOMA network with and
without Wireless Power Transfer," Computer Communications, vol. 139, pp. 67-77, May 2019.
[9] D.-T. Do and A.-T. Le, “NOMA based cognitive relaying: Transceiver hardware impairments, relay selection
policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, 2019.
[10] D.-T. Do, M. Vaezi and T.-L. Nguyen, “Wireless Powered Cooperative Relaying using NOMA with Imperfect
CSI,” in Proc. of IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, UAE, pp. 1-6, 2018.
[11] T.-L. Nguyen and Dinh-Thuan Do, "Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-
orthogonal MultipleAccess," Wireless Communications and Mobile Computing, vol. 2018, pp. 1-12, 2018
[12] D.-T. Do, A.-T. Le, C.-B. Le and B. M. Lee “On Exact Outage and Throughput Performance of Cognitive Radio
based Non-Orthogonal Multiple Access Networks with and Without D2D Link,” Sensors (Basel), vol. 19, no. 15,
pp. 1-17, 2019.
[13] H. Zhang, B. Wang, C. Jiang, “Energy efficient dynamic resource optimization in NOMA sy stem,” IEEE Trans.
Wireless Commun, vol. 17, no. 9, pp. 5671-5683, 2018.
[14] Y. Deng, L. Wang, S. A. R. Zaidi, “Artificial-noise aided secure transmission in large scale spectrum sharing
networks,”IEEE Trans. Wireless Commun, vol. 64, no. 5, pp. 2116-2129, 2016.
[15] Y. Liu, Z. Ding, M. Elkashlan, “Non-orthogonal multiple access in large-scale underlay cognitive radio networks,”
IEEE Trans. Veh.Technol, vol. 65, no. 12, pp. 152-157, 2016.
[16] Phu Tran Tin, Le Anh Vu, Tan N. Nguyen, Thanh-Long Nguyen, "User selection protocol in DF cooperative
networks with hybrid TSR-PSR protocol based full-duplex energy harvesting over Rayleigh fading channel: system
performance analysis," Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 2,
pp. 534-542, Feb. 2019.
[17] Tan N. Nguyen, Minh Tran, D.-H. Ha, T. Tran and M. Voznak,"Multi-Source in DF Cooperative Networks With
PSR protocol Based Full-Duplex Energy Harvesting Over Rayleigh Fading Channel: Performance Analysis,"
Proceedings of the Estonian Academy of Sciences, vol. 68, no. 3, pp. 264-275, May. 2019. (SCIE, IF 0.51-2018.
[18] Tan N. Nguyen, T. H. Q.M inh, T.-L. Nguyen, D.-H. Ha and M. Voznak, "Performance Analysis of a User
Selection Protocol in Cooperative Networks with Power Splitting Protocol Based Energy Harvesting Over
Nakagami-m/Rayleigh Channel", Electronics, vol. 8, no. 4, art. no. 448, Apr. 2019.
[19] T. N. Nguyen, M. Tran, T. Nguyen and M. Voznak, "Adaptive relaying protocol for decode and forward
full-duplex system over Rician fading channel: System performance analysis," in China Communications, vol. 16,
no. 3, pp. 92-102, March 2019.
[20] Tan N. Nguyen, T. H. Q. Minh, T.-L. Nguyen, D.-H. Ha and M. Voznak," Multi-Source Power Splitting Energy
Harvesting Relaying Network In Half-Duplex System Over Block Rayleigh Fading Channel: System Performance
Analysis", Electronics, vol. 8, no. 1, Art. no. 67, Jan 2019.
[21] Tan N. Nguyen, M. Tran, P. T. Tran, T. Phu, T.-L. Nguyen, D.-H. Ha and M. Voznak, "On the Performance of
Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar
Channels," Security and Communication Networks, Vol.2018, 11 pages, Art.no.6036087, Jan. 2019.
[22] J. Chen, L. Yang, and M.-S. Alouini, “Physical layer security for cooperative NOMA systems,” IEEE Trans. Veh.
Technol, vol. 67, no. 5, pp. 4645-4649, 2018.
[23] F. Zhou, Z. Chu, H. Sun, R. Q. Hu, and L. Hanzo, “Artificial Noise Aided Secure Cognitive Beamforming for
Cooperative MISO-NOMAUsingSWIPT,” IEEE J. Sel. Areas Commun, vol. 36, no. 4, pp. 918-931, 2018.
[24] Z. Yang, J. A. Hussein, P. Xu, Z. Ding, and Y. Wu, “Power Allocation Study for Non-Orthogonal Multiple Access
Networks with Multicast Unicast Transmission,” IEEE Trans. Wirel. Commun, vol. 17, no. 6, pp. 3588-3599, 2018.
[25] L. Xu, A. Nallanathan, X. Pan, J. Yang, and W. Liao, “Security-Aware Resource Allocation with Delay Constraint
for NOMA-Based Cognitive Radio Network,” IEEE Trans. Inf. Forensics Secure, vol. 13, no. 2, pp. 366-376, 2018.

More Related Content

What's hot

SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
ijfcstjournal
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
Debesh Sadhukhan
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions www.ijeijournal.com
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
eSAT Journals
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
IJERA Editor
 
47 50
47 5047 50
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
IDES Editor
 
Network coding
Network codingNetwork coding
Network coding
Hạt Giống Nhập
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
eSAT Journals
 
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
IDES Editor
 
Iv2415471554
Iv2415471554Iv2415471554
Iv2415471554
IJERA Editor
 
internetworking operation
internetworking operationinternetworking operation
internetworking operation
Srinivasa Rao
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
szhb
 
Sinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrqSinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrq
ijwmn
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
Iaetsd Iaetsd
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
International Journal of Science and Research (IJSR)
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
IRJET Journal
 
Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...
Raja' Masa'deh
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 

What's hot (20)

SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 
47 50
47 5047 50
47 50
 
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
 
Network coding
Network codingNetwork coding
Network coding
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
 
Iv2415471554
Iv2415471554Iv2415471554
Iv2415471554
 
internetworking operation
internetworking operationinternetworking operation
internetworking operation
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
 
Sinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrqSinr, rsrp, rssi and rsrq
Sinr, rsrp, rssi and rsrq
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

Similar to Security performance analysis for power domain NOMA employing in cognitive radio networks

Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
TELKOMNIKA JOURNAL
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
TELKOMNIKA JOURNAL
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
TELKOMNIKA JOURNAL
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
journalBEEI
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
TELKOMNIKA JOURNAL
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
journalBEEI
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
TELKOMNIKA JOURNAL
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
nooriasukmaningtyas
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
journalBEEI
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
TELKOMNIKA JOURNAL
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
journalBEEI
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
nooriasukmaningtyas
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...
TELKOMNIKA JOURNAL
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
TELKOMNIKA JOURNAL
 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
journalBEEI
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
TELKOMNIKA JOURNAL
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
journalBEEI
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
TELKOMNIKA JOURNAL
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
TELKOMNIKA JOURNAL
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
journalBEEI
 

Similar to Security performance analysis for power domain NOMA employing in cognitive radio networks (20)

Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
journalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
journalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
journalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
journalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
journalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
journalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
journalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
journalBEEI
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 

Recently uploaded

Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
Yasser Mahgoub
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 

Recently uploaded (20)

Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 

Security performance analysis for power domain NOMA employing in cognitive radio networks

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 9, No. 3, June 2020, pp. 1046~1054 ISSN: 2302-9285, DOI: 10.11591/eei.v9i3.1639  1046 Journal homepage: http://beei.org Security performance analysis for power domain NOMA employing in cognitive radio networks Thi-Anh Hoang, Chi-Bao Le, Dinh-Thuan Do Industrial University of Ho Chi Minh City, Vietnam Article Info ABSTRACT Article history: Received May 16, 2019 Revised Sep 26, 2019 Accepted Feb 1, 2020 The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify thederived expressions. Keywords: Cognitive radio Non-orthogonal multiple access (NOMA) Physical-layer security This is an open access article under the CC BY-SA license. Corresponding Author: Dinh-Thuan Do, Industrial University of Ho Chi Minh City, 12 Nguyen Van Bao, Go Vap, Ho Chi Minh City, Vietnam. Email: dodinhthuan@iuh.edu.vn 1. INTRODUCTION As a promising multiple access (MA) technique, Non-orthogonal multiple access (NOMA) has been proposed to adapt the challenging requirements of the future mobile communication networks. Several strict requirements in 5G wireless communication can be achieved such as high data speed, spectral efficiency, massive connectivity and low latency [1-10]. In [11, 12] the NOMA can be integrated with green communication to enable ability of wireless power transfer in cooperative NOMA network. Other application of device-to-device (D2D) to NOMA is introduced as in [13]. Different with the conventional MA techniques, the power domain is used to serve a multiple user in NOMA at different power levels and such paradigm exhibits a high spectral efficiency [14]. To permit the unlicensed users operating on the spectrum allocated for the licensed users, cognitive radio networks (CRNs) have been recommended to achieve full advantage of radio resource. In these situations, the quality of service of the primary user networks is maintained [15, 16]. In general, power domain multiple access scheme and spectrum efficiency are advantages are able to achieved. Hence, by introducing NOMA to PUNs, the system performance of cognitive radio can be further increased.
  • 2. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang) 1047 In the other trend, dedicated relays [17-19] are also deployed to reform cooperative NOMA transmission [20]. To enhance the reliability of the NOMA-weak users, [21] adopted a dedicated relay network. Also, with the help of a relay (both AF and DF protocols) [22] presented a secrecy analysis of a NOMA system. The other works reported in [23-25], in which the CR networks are studied with an underlay paradigm. From raised analytical results according to the previous analysis, the improved system performance benefits from combining system between overlay CR and NOMA. Unfortunately, overlay CR can enhance system performance and also produce the risk of infection of illegal information simultaneously. On the contrary, NOMA can achieve better secrecy performance than OMA [22]. The physical layer security performance in overlay CR-NOMA networks is still a challenging issue and it motivates this study. This paper determines physical layer security (PLS) in cognitive radio inspired non-orthogonal multiple access (CRNOMA) networks with secondary source and multiple secondary users under impact of primary destination. To manage the interference among the users and guarantee the quality of services (QoS) of primary users, a new secure NOMA transmission strategy is designed, where the primary and secondary users are paired according to their channel gains, respectively, and power-domain NOMA is employed to transmit the signal. This paper studies a downlink cooperative CR-NOMA model with interference temperature constraint (ITC) at the primary receiver. Exact closed-form expressions for the OP of the far NOMA users are derived. These expressions are verified by Monte-Carlo simulations. 2. SYSTEM MODEL A downlink cooperative underlay CR-NOMA is considered in this study. In this model, secondary network (SN) consists of a secondary base station (S), a relay (R) and two far NOMA users (D1; D2) can operate together with primary network containing primary destination (PD) who make impact on system performance at secondary network, as shown in Figure 1. Regarding secure performance, existence of eavesdropper E need be concerned. The links are assigned channel as in Figure 1 and these channels follow flat Rayleigh fading model. SR h is the channel between BS and relay, SR h is the channel between Relay and two users. S P is transmit power at the BS. We denote the superimposed signal to transmit from the BS to secondary destinations 1 1 2 2 S S a P x a P x  . While 1 2 , a a are power allocation factors in NOMA satisfying   1 2 1 2 1, a a a a    . BS Relay PD D1 D2 E hRD1 hRD2 hRE hSR hSP Figure 1. Systemmodel of secure CR-NOMA The transmit power constraint is determined at the BS: _ 2 min , S S SP I P P h          (1)
  • 3.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054 1048 where _ S P and I stand for maximum average transmit power available at the BS and ITC at D P . In the first time, R received the following signal:   1 1 2 2 R SR S S R y h a P x a P x n    (2) in which R n stand for the AWGN noise terms at R. Then, we compute signal-to-interference-plus-noise ratio (SINR) and signal-to-noise ratio (SNR) of decoding 1 x and 2 x at R and they can be respectively written as: 2 1 1 2 2 1 S SR R S SR a h a h      (3) and 2 2 2 R S SR a h    (4) where 2 S S P    is the transmit SNR at the BS. In the second phase, the detected superimposed signal 1 1 2 2 R R P x P x    will be forwarded to destinations.It is noted that R P is the transmit power at R . The received signal at i D can be given as:     1 1 2 2 , 1,2 Di RDi R R Di y h P x P x n i        (5) where Di n is the AWGN noise terms at i D . Further, due to the fact that 1 D is allocated with higher power factor, it can detect 1 x by treating 2 x as a background noise and it can be achieved following SINR. 2 1 1 1 2 1 2 1 RD R D RD R h h        (6) Furthermore, 2 D with SIC is required to detect 1 x while 2 x is considered as a noise. The SINR in this case can be expressed: 2 2 1 2 1 2 2 2 1 RD R D RD R h h         (7) where 2 R R P    is the transmit SNR at R . the following SNR can be obtained to 2 D detects its own signal. 2 2 2 2 D RD R h     (8) The signal received at E   1 1 2 1 E RE E E E y h P x P x n      (9) where E n indicates the AWGN noise terms at E . RE h is the channel between Relay and E . The signal-to-noise ratio (SNR) at E : 2 Ei i E RE h     (10)
  • 4. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang) 1049 where 2 E E P    is transmit SNR at E . The achievable rates of 1 x and 2 x are derived respectively:     1 1 2 2 1 1 1 log 1 min , , 2 R D D K       (11)     2 2 2 2 1 log 1 min , 2 R D K     (12) and the achievable rates of eavesdropper’s signalis given by:   2 1 log 1 2 Ei Ei K    (13) the secrecy capacity for 1 D is obtained as:   1 2 1 1 1 2 1 1 min , , 1 log 2 1 R D D E C                          (14) the secrecy capacity for 2 D is obtained as:   2 2 2 2 2 1 min , 1 log 2 1 R D E C                        (15) where     max ,0 x x   . 3. SECRECY PERFORMANCE ANALYSIS In NOMA systems, with the help of a relay two signals are transmitted from the source to 1 D and 2 D respectively. As a result, outage happens when either 1 C or 2 C falls below their own target rates. Be exploiting this definition, the secure outage probability (SOP) can be formulated as following sections: 3.1. SOP at D1   1 1 1 2 2 2 2 1 2 1 1 1 2 2 2 2 2 2 2 1 1 1 2 1 2 Pr 1 Pr Pr 1 1 Pr 1 SOP S SR RD R RE RE S SR RD R A B RD R RE RD R C P C R a h h h h a h h h h h                                                       (16) where 1 1 2 2 1 1 2 , 2 1 R R E        . Firstly, A can be written by:           1 2 2 2 2 1 1 2 2 2 2 2 2 1 1 2 1 1 2 Pr , Pr , RE RE SP I I SR S SR S SP SP S RE S RE I A A h h h A h h h h a h a a h a                                                we have 1 A as:
  • 5.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054 1050   2 2 2 1 1 2 1 1 2 Pr , RE I SR SP S S RE S h A h h a h a                         provided that 2 1 2 1 2 RE a a h a     , then 1 A can be calculated as:           1 2 1 2 2 2 2 1 1 1 2 1 1 1 2 1 1 2 2 2 1 0 0 0 1 1 I S RE SP SR S S I S SR S SP RE a a a y h h h a y a y y a a a a a y a RE A f x f y f z dxdydz e e e dy                                                   where 1 1 2 2 , u a a v a      , we have:   1 1 0 1 1 I S SR S SP RE y y u u vy v RE A e e e dy                          let u q dq u vy q y dy v v         . We have: 1 1 1 I RE S SR S SP u v v RE e A e v                       (17) where 1 1 0 RE S SR u v q u v vq e dq           . Similar 1 A , we can calculated 2 A as: 2 2 1 I I S SP RE I S SR u v v RE A e v               (18) where     1 2 0 1 I RE I S SR u v q u v vq I SR I SR SP qv e dq qv u q v                        . From (17) and (18) we find A by: 1 2 1 1 I I I RE S SR S SP S SP RE I S SR u u v v v v RE RE e A e e v v                                     (19) the secondly,B can be written as:   2 2 1 2 2 1 1 2 2 Pr RE RD RE R h B h h                       
  • 6. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang) 1051 provided that 2 1 1 2 2 RE h       , B calculated as:         1 1 1 2 1 1 2 1 1 2 2 2 2 2 2 2 1 2 1 1 2 2 0 0 1 R RD RE RE RD R x x x x h h x RE B f x f y dxdy e e dx                                            where 1 1 2 2 , n m       , we have:   1 2 0 1 R RD RE x x n n mx m RE B e e dx             let n t dt t n mx x dx m m         . We have: 2 1 RE R RD n m m RE e B m          (20) where 1 2 1 0 RE R RD n m t n m mt e e dt           . Similar (20), we can calculated C as: 1 2 RE R RD n m m RE e C m          (21) where 1 1 1 0 RE R RD n m t n m mt e dt           . From (19), (20) and (21) we calculated 1 SOP P as: 2 1 1 1 2 2 1 1 1 1 I I I RE S SR S SP S SP RE I S SR RE R RD RE R RD u u v v v v SOP RE RE n n m m m m RE RE e P e e v v e e m m                                                                               (22) 3.2. SOP at D2 By definition, we have SOP as:       2 2 2 2 2 2 2 2 2 2 2 Pr 1 Pr Pr SOP S SR RE R RD RE D E P C R a h h h h                (23) where 2 2 2 2 2 2 2 , 2 1 R R E        . Firstly, D can be rewritten as: 1 2 2 2 2 2 2 2 2 2 2 2 2 Pr , Pr , I SR I I S SR RE SP RE SP S S SP D D a h D a h h h h h h                                
  • 7.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054 1052 let 2 1 S a a   , 1 D can be computed as: 2 1 2 2 2 1 2 Pr , 1 1 I SP S SR a I RE SR RE SP S SR a D h a h a h e e                                           (24) next, let 2 1 I a a   , 2 D can calculated as: 2 2 2 2 2 2 2 2 1 0 2 Pr , I I I RE SR S SP S SR S I SR SP RE SP SP S a x a SR RE SP SR SP SP D h a h h a h h e e dx a a x a                                                         Let 2 1 , SR SP I SP RE SR S a a a                     , we have 2 D     2 2 2 1 0 I I I I SP S SR S SP S SR S a a x SR SR RE SP RE SP e D e dx e e E a x a                                   (25) from (22) and (23) D can be as:   2 2 1 1 1 1 I I I SP S SR SP S SR S a a SR RE SR RE SP a D e e e e E a                                            (26) next, with 2 1 R b    E can be calculated as:     2 2 2 2 2 2 2 0 2 RD RE RD b RD h h bx b RE RD E f x f y dxdy e b                  (27) from (24) and (25) it can be calculated 2 SOP P as:     2 2 2 2 2 2 1 2 2 2 2 1 2 1 1 1 I SR RD SP S I I SP S SR S RD a b RD RE SOP SR RE RD a b SR RD RE SP RE RD a P e e b e e E a b                                                            (28) 4. NUMBER RESULTS This section of this study represents numerical and simulation results for the SOP over related Rayleigh fading channels. The adopted system parameters are given in each figure. We evaluate the impact of target rates on the secrecy outage performance for NOMA-based cognitive radio as in Figure 2. Higher target rates result in worse SOP performance. It can be seen performance gap among two signals is large at 1 2 0.5 R R   . The reason is that different power allocation factors for each signal leads to different SOP
  • 8. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Security performance analysis for power domain NOMA employing in... (Thi-Anh Hoang) 1053 performance. In other observation, impact of interference 10,15, 20( ) I dB   to secure performance of two signals can be seen as Figure 3. It can be confirmed lower interference provides better secure performance. Such performance gap will be reduced at 1 2 1 R R   . The analytical values of the OP for 1 2 , x x with various target rates and SNR threshold values are shown in Figure 4. It is observed that curves of the OP improve by increasing the transmit SNR. It is worth noting that no ICT case exhibits better secure performance. Figure 2. 1 1 0.9 a    , 2 2 0.1 a    , 15 I dB   , 5 E dB   , 0.1 SP   , 1 SR   , 1 0.9 RD   , 2 0.6 RD   and 0.1 RE   Figure 3. SOP versus transmit SNR with different I  ( 1 1 0.9 a    , 2 2 0.1 a    ,, 5 E dB   , 0.1 SP   , 1 SR   , 1 0.9 RD   , 2 0.6 RD   and 0.1 RE   ) Figure 4. SOP versus transmit SNR as ITC consideration ( 1 1 0.9 a    , 2 2 0.1 a    , 15 I dB   , 5 E dB   , 0.1 SP   , 1 SR   , 1 0.9 RD   , 2 0.6 RD   and 0.1 RE   ) 5. CONCLUSION In this paper, in order to evaluate security performance of CR-NOMA systems, SOP performance in condition of fixed power allocation scheme is examined. A limitation of transmit power at the secondary in CR-NOMA results in varying secure performance. The threshold data rates and impact of interference from the primary network are main factors affecting to systemperformance.
  • 9.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 3, June 2020 : 1046 – 1054 1054 REFERENCES [1] Z. Ding, X. Lei, G. K. Karagiannidis, “A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends IEEE,” J. Sel. Areas Commun, vol. 35, no. 10, pp. 2181-2195, 2017. [2] Y. Liu, Z. Qin, M., “Elkashlan. Nonorthogonal multiple access for 5G and beyond,” Proceedings of the IEEE, vol. 105, no. 12, pp. 2347-2381, 2017. [3] Z. Zhang, H. Sun, and R. Q. Hu, “Downlink and uplink non-orthogonal multiple access in a dense wireless network,” IEEE J. Sel. AreasCommun, vol. 35, no. 12, pp. 2771-2784, 2017. [4] Tan N. Nguyen, Minh Tran, Van-Duc Phan, H.-N. Nguyen and T.-L. Nguyen,"Half-duplex power beacon-assisted energy harvesting relaying networks: system performance analysis," International Journal of Electrical and Computer Engineering, vol. 9, no. 5, pp. 3399-3406, Oct. 2019. [5] Tan N. Nguyen, Van-Duc Phan, H.-N. Nguyen, Minh Tran and T.-T. Tran,"Performance Analysis for Power- Splitting Energy Harvesting Based Two-Way Full-Duplex Relaying Network over Nakagami-m Fading Channel," Telecommunication, Computing, Electronics and Control TELKOMNIKA, vol. 17, no. 4, pp.1595-1603, Aug. 2019. [6] Phu Tran Tin, Minh Tran, Tan N.Nguyen and Tran Thanh Trang,"Energy Harvesting Half-Duplex AF Power Splitting Protocol Relay Network over Rician Channel in Case of Maximizing Capacity", Telecommunication, Computing, Electronics and Control TELKOMNIKA, vol. 17, no. 4, pp. 1615-1624, Aug. 2019. [7] Phu Tran Tin, Minh Tran, Tan N. Nguyen, Thanh-Long Nguyen,"System performance analysis of hybrid time- power switching protocol of EH bidirectional relaying network in amplify-and-forward mode", Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, no. 1, pp. 118-126, Apr. 2019. [8] Dinh-Thuan Do and M. S., Van Nguyen, "Device-to-device transmission modes in NOMA network with and without Wireless Power Transfer," Computer Communications, vol. 139, pp. 67-77, May 2019. [9] D.-T. Do and A.-T. Le, “NOMA based cognitive relaying: Transceiver hardware impairments, relay selection policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, 2019. [10] D.-T. Do, M. Vaezi and T.-L. Nguyen, “Wireless Powered Cooperative Relaying using NOMA with Imperfect CSI,” in Proc. of IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, UAE, pp. 1-6, 2018. [11] T.-L. Nguyen and Dinh-Thuan Do, "Exploiting Impacts of Intercell Interference on SWIPT-assisted Non- orthogonal MultipleAccess," Wireless Communications and Mobile Computing, vol. 2018, pp. 1-12, 2018 [12] D.-T. Do, A.-T. Le, C.-B. Le and B. M. Lee “On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks with and Without D2D Link,” Sensors (Basel), vol. 19, no. 15, pp. 1-17, 2019. [13] H. Zhang, B. Wang, C. Jiang, “Energy efficient dynamic resource optimization in NOMA sy stem,” IEEE Trans. Wireless Commun, vol. 17, no. 9, pp. 5671-5683, 2018. [14] Y. Deng, L. Wang, S. A. R. Zaidi, “Artificial-noise aided secure transmission in large scale spectrum sharing networks,”IEEE Trans. Wireless Commun, vol. 64, no. 5, pp. 2116-2129, 2016. [15] Y. Liu, Z. Ding, M. Elkashlan, “Non-orthogonal multiple access in large-scale underlay cognitive radio networks,” IEEE Trans. Veh.Technol, vol. 65, no. 12, pp. 152-157, 2016. [16] Phu Tran Tin, Le Anh Vu, Tan N. Nguyen, Thanh-Long Nguyen, "User selection protocol in DF cooperative networks with hybrid TSR-PSR protocol based full-duplex energy harvesting over Rayleigh fading channel: system performance analysis," Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 2, pp. 534-542, Feb. 2019. [17] Tan N. Nguyen, Minh Tran, D.-H. Ha, T. Tran and M. Voznak,"Multi-Source in DF Cooperative Networks With PSR protocol Based Full-Duplex Energy Harvesting Over Rayleigh Fading Channel: Performance Analysis," Proceedings of the Estonian Academy of Sciences, vol. 68, no. 3, pp. 264-275, May. 2019. (SCIE, IF 0.51-2018. [18] Tan N. Nguyen, T. H. Q.M inh, T.-L. Nguyen, D.-H. Ha and M. Voznak, "Performance Analysis of a User Selection Protocol in Cooperative Networks with Power Splitting Protocol Based Energy Harvesting Over Nakagami-m/Rayleigh Channel", Electronics, vol. 8, no. 4, art. no. 448, Apr. 2019. [19] T. N. Nguyen, M. Tran, T. Nguyen and M. Voznak, "Adaptive relaying protocol for decode and forward full-duplex system over Rician fading channel: System performance analysis," in China Communications, vol. 16, no. 3, pp. 92-102, March 2019. [20] Tan N. Nguyen, T. H. Q. Minh, T.-L. Nguyen, D.-H. Ha and M. Voznak," Multi-Source Power Splitting Energy Harvesting Relaying Network In Half-Duplex System Over Block Rayleigh Fading Channel: System Performance Analysis", Electronics, vol. 8, no. 1, Art. no. 67, Jan 2019. [21] Tan N. Nguyen, M. Tran, P. T. Tran, T. Phu, T.-L. Nguyen, D.-H. Ha and M. Voznak, "On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels," Security and Communication Networks, Vol.2018, 11 pages, Art.no.6036087, Jan. 2019. [22] J. Chen, L. Yang, and M.-S. Alouini, “Physical layer security for cooperative NOMA systems,” IEEE Trans. Veh. Technol, vol. 67, no. 5, pp. 4645-4649, 2018. [23] F. Zhou, Z. Chu, H. Sun, R. Q. Hu, and L. Hanzo, “Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMAUsingSWIPT,” IEEE J. Sel. Areas Commun, vol. 36, no. 4, pp. 918-931, 2018. [24] Z. Yang, J. A. Hussein, P. Xu, Z. Ding, and Y. Wu, “Power Allocation Study for Non-Orthogonal Multiple Access Networks with Multicast Unicast Transmission,” IEEE Trans. Wirel. Commun, vol. 17, no. 6, pp. 3588-3599, 2018. [25] L. Xu, A. Nallanathan, X. Pan, J. Yang, and W. Liao, “Security-Aware Resource Allocation with Delay Constraint for NOMA-Based Cognitive Radio Network,” IEEE Trans. Inf. Forensics Secure, vol. 13, no. 2, pp. 366-376, 2018.