SlideShare a Scribd company logo
Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 2, April 2021, pp. 848∼855
ISSN: 2302-9285, DOI: 10.11591/eei.v10i2.2117 r 848
Studying strictly positive secure capacity in cognitive
radio-based non-orthogonal multiple access
Chi-Bao Le, Dinh-Thuan Do
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam
Article Info
Article history:
Received Oct 16, 2020
Revised Jan 7, 2021
Accepted Feb 16, 2021
Keywords:
Cognitive radio
NOMA
Strictly positive secure
capacity
ABSTRACT
This paper studies a downlink security-aware secure outage performance in the sec-
ondary network of cognitive radio-assisted non-orthogonal multiple access network
(CR-NOMA). The multiple relay is employed to assist transmission from the sec-
ondary source to destinations. The security-aware performance is subject to constraints
in fixed power allocation factor assigned to each secondary user. The security-aware
secure performance is based on channel state information (CSI) at the physical layer
in which an eavesdropper intends to steal information. According to the considered
system, exact expressions of Strictly positive secure capacity (SPSC) are proved to
analyze system in terms of secure performance. Finally, the secondary user secure
problem is evaluated via Monte-Carlo simulation method. The main results indicate
that the secure performance of proposed system can be improved significantly.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinh-Thuan Do
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City
12 Nguyen Van Bao Road, Go Vap District, Ho Chi Minh City, Vietnam
Email: dodinhthuan@iuh.edu.vn
1. INTRODUCTION
Both non-orthogonal multiple access (NOMA) and physical-layer security (PLS) have been introduced
as promising enabling technologies to implement some applications for Internet of Things (IoT) or future sys-
tems [1-4]. Recently, the coexistence of these two important communication techniques benefits from cognitive
ability and massive connections and these hybrid techniques have been considered to provide spectral efficient
improvement for wireless transmission such as recent work [6-8].
Furthermore, physical-layer security (PHY) has attracted great interests while wireless applications
are more popular. PHY based secure method does not require extra resources for the secret key [10-14]. In order
to achieve secure communication, one can exploit the physical layer characteristics of the wireless channels.
However, the secrecy rate of wireless communication systems is constrained by the channel state information
[15]. In order to improve the secrecy rate, many methods are introduced such as jamming, multiple antennas,
cooperative relaying and artificial noise (AN)-aided techniques have been studied [16]. Main results reported
in [17-24] that these techniques benefit to improve the secrecy rate.
Interestingly, most existing works have mainly focused on the performance and optimization of the
PLS in NOMA systems . However, there is still open problems to rigorously study the feasibility of achieving
the better secure performance by using best relay selection in secondary network of CR-NOMA systems.
Although the joint user scheduling and power allocation problems are investigated for NOMA-based wireless
network in [17], how cognitive radio technology affects the secure performance for NOMA-based wireless
network needs further studies. In this paper, we study the security-aware SPSC metric CR-NOMA network.
Journal homepage: http://beei.org
Bulletin of Electr Eng & Inf ISSN: 2302-9285 r 849
2. SYSTEM MODEL
In Figure 1, we consider the CR system containing the secondary network including base station (BS).
To enhance performance of distance users, we need N relay nodes. Regarding distance users, two destination
U1, U2, one eavesdropper E are considered their performance. Through the paper, hu is denoted as channel
for node u, and it follows Rayleigh fading model with channel gain λu. It is noted that PS is transmit power
at BS and it is limited under constraint with the primary network which contains primary destination PD. The
interference channel from BS to the primary network is hSP . hRn is the channel between BS and R. hRn is
denoted as the channel between relay and Ui.
U2
U1
BS
hR,n
1
U
h
2
U
h
hSP
PD
R1
RN
E
Interference Link
Main Link
Wiretap Link
Figure 1. Secure CR-NOMA system
In CR-NOMA, the transmit power at the BS is constrained by (1)
PS ≤ min
I
|hSP |
2 , P̄S
!
(1)
in which, we call P̄S and I as maximum average transmit power at the BS and interference temperature con-
straint (ITC) at primary destination PD, respectively. At the first hop transmission, the n-th node among N
relay node, the received signal can be formulated by (2)
yR = hRn
p
a1PSx1 +
p
a2PSx2

+ nRn
(2)
where the AWGN noise terms at R is nRn . Regarding the relay is used to forward signal, the criteria to select
relay with its index, i.e. n∗
is formulated related the best channel
n∗
= arg max
|{z}
1,2,...,N
|hRn
|
2
(3)
To decode signal x1 and x2 at R, the signal-to-interference-plus-noise ratio (SINR) is given by (4).
SNR1
R =
a1ρS|hRn |
2
a2ρS|hRn
|
2
+ 1
(4)
where ρS = PS
σ2 is the transmit signal to noise ratio (SNR) at the BS. At relay relying SIC, it is necessary to
examine the received SNR at R to detect message x2 as (5).
SNR2
R = a2ρS|hRn|
2
(5)
In the next phase, the link netween selected relay Rn and Ui, i = 1, 2 is required to proceed signal
√
a1PRx̄1 +
√
a2PRx̄2. PR is called as the transmit power at R. The received signal Ui is expressed by (6)
yUi
= hUi
√
a1PRx̄1 +
√
a2PRx̄2

+ nUi
, ∀i ∈ {1, 2} (6)
in which the AWGN noise terms is nUi measured at Ui. Further, principle of NOMA applied to Ui with higher
power factor, it can detect x̄1 by considering x̄2 as a background noise with (7)
Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple ... (Chi-Bao Le)
850 r ISSN: 2302-9285
SNRU1
=
a1ρR|hU1
|
2
a2ρR|hU1
|
2
+ 1
(7)
where ρR = PR
σ2 is the transmit SNR at R. To continue detecting procedure, U2 needs SIC to decode x̄1 while
considering its own data x̄2 as a noise. The SINR is written as (8).
SNRU2,x1
=
a1ρR|hU2
|
2
a2ρR|hU2
|
2
+ 1
(8)
In this regard, U2 detects its own signal and the corresponding SNR is given as (9).
SNRU2,x2
= a2ρR|hU2
|
2
(9)
Unfortunately, eavesdropper steals information from the selected relay, the received signal at E is
given as (10)
yE = hE
p
a1PEx̄1 +
p
a2PEx̄1

+ nE (10)
where nE is the AWGN noise terms at E. The channel between Relay and E is hE. Then, SNR at E is given as
SNREi = aiρE|hE|
2
, i ∈ {1, 2} (11)
where ρE = PE
σ2 is transmit SNR at E. The secrecy capacity for U1, U2 are computed respectively as
C1 =

1
2
log2
1 + min SNR1
R, SNRU1

1 + SNRE1
!#+
, (12)
C2 =

1
2
log2
1 + min SNR2
R, SNRU2,x2

1 + SNRE2
!#+
, (13)
where [x]
+
= max [x, 0].
3. SPSC ANALYSIS
3.1. SPSC computation at U1
We first using decode-and-forward scheme at relay node and consider SPSC performance of the first
user U1 as (14).
G1 = Pr (C1  0)
= Pr min SNR1
R, SNRU1

 SNRE1

=








Pr

|hRn∗ |
2

ρE|hE|
2
ρ̄S

1 − ρEa2|hE|
2
, ρ̄S 
ρI
|hSP |
2


| {z }
G1,1
+ Pr

|hRn∗ |
2

ρE|hE|
2
|hSP |
2
ρI

1 − a2ρE|hE|
2
, ρ̄S 
ρI
|hSP |
2


| {z }
G1,2








× Pr

|hU1
|
2

ρE|hE|
2
ρR

1 − a2ρE|hE|
2



| {z }
G1,3
(14)
Bulletin of Electr Eng  Inf, Vol. 10, No. 2, April 2021 : 848 – 855
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 851
We then compute each component G1,1, G1,2, G1,3 as (15).
G1,1 = Pr

|hRn∗ |
2

ρE|hE|
2
ρ̄S

1 − ρEa2|hE|
2
, |hE|
2
 η, ρ̄S 
ρI
|hSP |
2


=
ρI
ρ̄S
Z
0
f|hSP |2 (x)
η
Z
0
f|hE |2 (y)

1 − F|hRn∗ |
2

ρEy
ρ̄S (1 − ρEa2y)

dxdy
=

1 − e
−
ρI
ρ̄S λSP
 N
X
n=1

N
n

(−1)
n−1
λE
η
Z
0
e
−y

1
λE
+
nρE
ρ̄S λSR(1−a2ρE y)

dy
(15)
where η = 1
a2ρE
.
The closed-form expression for G1,1 is very difficult to achieve, then using the formula Gaussian-
Chebyshev quadrature, G1,1 is given as (16)
G1,1 ≈

1 − e
−
ρI
ρ̄S λSP
 N
X
n=1
P
X
p=1
 ηπ(−1)
n−1
q
1 − ς2
p
2PλE
× e
−
(ςp+1)η
2λE
−
(ηςp+η)nρE
ρ̄S λSR[2−a2ρE (ηςp+η)]
(16)
where ςp = cos 2p−1
2P π

.
Next, G1,2 is calculated as (17).
G1,2 = Pr

|hRn∗ |
2

ρE|hE|
2
|hSP |
2
ρI

1 − a2ρE|hE|
2
, |hE|
2
 η, ρ̄S 
ρI
|hSP |
2


=
η
Z
0
f|hE |2 (x)
∞
Z
ρI
ρ̄S
f|hSP |2 (y)

1 − F|hRn∗ |
2

ρExy
ρI (1 − a2ρEx)

dxdy
=
N
X
n=1

N
n

(−1)
n−1
λSP λE
η
Z
0
e
− x
λE
∞
Z
ρI
ρ̄S
e
−y

1
λSP
+
nρE x
ρI (1−a2ρE x)λSR

dxdy
=
N
X
n=1

N
n

(−1)
n−1
λSP λE
η
Z
0
e
− x
λE
−
ρI
ρ̄S

1
λSP
+
nρE x
ρI (1−a2ρE x)λSR

×

1
λSP
+
nρEx
ρI (1 − a2ρEx) λSR
−1
dx
(17)
Keep using the formula Gaussian-Chebyshev quadrature, G1,2 is given by (18)
G1,2 ≈
N
X
n=1
V
X
v=1
 ηπ(−1)
n−1p
1 − υ2
v
2V λSP λEΦ (w)
e
−
(υv+1)η
2λE
−
ρI Φ(υv)
ρ̄S (18)
where υv = cos 2v−1
2V π

and Φ (w) =

1
λSP
+ nρE (ηw+η)
[2−a2ρE (ηw+η)]ρI λSR

.
Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple ... (Chi-Bao Le)
852 r ISSN: 2302-9285
Next, G1,3 is calculated as (19)
G1,3 = Pr

|hU1
|
2

ρE|hE|
2
ρR

1 − a2ρE|hE|
2
, |hE|
2
 η


=
η
Z
0
f|hE |2 (x)

1 − F|hU1 |
2

ρEx
ρR (1 − a2ρEx)

dx
=
1
λE
η
Z
0
e
−x

1
λE
+
ρE
λU1
ρR(1−a2ρE x)

dx
(19)
Keep using the formula Gaussian-Chebyshev quadrature, G1,3 is given by (20)
G1,3 ≈
πη
2λEQ
Q
X
q=1
q
1 − ς2
q e
−
(ςq+1)η
2λE
−
(ςq+1)ρE η
λU1
ρR[2−(ςq+1)a2ρE η]
(20)
where ςq = cos

2q−1
2Q π

.
Substituting (20), (18) and (16) into (14), G1 is given by (21)
G1 =



1 − e
−
ρI
ρ̄S λSP
 N
X
n=1
P
X
p=1

N
n
 ηπ(−1)
n−1
q
1 − ς2
p
2PλE
× e
−
(ςp+1)η
2λE
−
(ηςp+η)nρE
ρ̄S λSR[2−a2ρE (ηςp+η)]
+
N
X
n=1
V
X
v=1

N
n

ηπ(−1)
n−1p
1 − υ2
v
2V λSP λEΦ (w)
e
−
(υv+1)η
2λE
−
ρI Φ(υv)
ρ̄S
#
×
πη
2λEQ
Q
X
q=1
q
1 − ς2
q e
−
(ςq+1)η
2λE
−
(ςq+1)ρE η
λU1
ρR[2−(ςq+1)a2ρE η]
(21)
3.2. SPSC computation at U2
In similar way, SPSC of user U2 is expressed by (22)
G2 = Pr (C2  0)
= Pr min SNR2
R, SNRU2,x2

 SNRE2

=





Pr

|hRn∗ |
2
 āa2ρE|hE|
2
, |hSP |
2

ρI
ρ̄S

| {z }
G2,1
+ Pr

|hRn∗ |
2
 ãa2ρE|hE|
2
|hSP |
2
, |hSP |
2

ρI
ρ̄S

| {z }
G2,2





× Pr |hU2
|
2

ρE|hE|
2
ρR
!
| {z }
G2,3
(22)
where ā = 1
a2ρ̄S
and ã = 1
a2ρI
. These terms G2,1, G2,2, G2,3 are respectively formulated by (23) and (24)
Bulletin of Electr Eng  Inf, Vol. 10, No. 2, April 2021 : 848 – 855
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 853
G2,1 = Pr

|hRn∗ |
2
 āa2ρE|hE|
2
, |hSP |
2

ρI
ρ̄S

=
ρI
ρ̄S
Z
0
f|hSP |2 (x)
∞
Z
0
f|hE |2 (y)
h
1 − F|hRn∗ |
2 (āa2ρEy)
i
dxdy
=

1 − e
−
ρI
ρ̄S λSP
 N
X
n=1

N
n

(−1)
n−1
λE
∞
Z
0
e
−y

1
λE
+
nāa2ρE
λSR

dy
=

1 − e
−
ρI
ρ̄S λSP
 N
X
n=1

N
n

(−1)
n−1
λSR
λSR + nλEāa2ρE
(23)
G2,2 = Pr

|hRn∗ |
2
 ãa2ρE|hE|
2
|hSP |
2
, |hSP |
2

ρI
ρ̄S

=
∞
Z
0
f|hE |2 (x)
∞
Z
ρI
ρ̄S
f|hSP |2 (y)
h
1 − F|hRn∗ |
2 (ãa2ρExy)
i
dxdy
=
N
X
n=1

N
n

λSR(−1)
n−1
e
−
ρI
ρ̄S λSP
na2ãρEλEλSP
∞
Z
0
e−`nx
$n + x
dx
(24)
where `n = 1
λE
+ nãa2ρE
λSR
and $n = λSR
λSP nãa2ρE
.
We are using [[25], 8.211.1], G2,2 is given by (25).
G2,2 =
N
X
n=1

N
n

λSR(−1)
n
e
−
ρI
ρ̄S λSP
+`n$n
na2ãρEλEλSP
Ei (−`n$n) (25)
Next, we are calculated G2,3 as (26).
G2,3 = Pr |hU2 |
2

ρE|hE|
2
ρR
!
=
∞
Z
0
f|hE |2 (x)

1 − F|hU2 |
2

ρEx
ρR

dx
=
1
λE
∞
Z
0
e
−x

1
λE
+
ρE
ρRλU2

dx
=
ρRλU2
ρRλU2
+ λEρE
(26)
Substituting (26), (25) and (23) into (22), G2 is given by (27).
G2 =
N
X
n=1

N
n

ρRλU2
λSR
ρRλU2 + λEρE


1 − e
−
ρI
ρ̄S λSP
 (−1)
n−1
λSR + nλEāa2ρE
+
(−1)
n
e
−
ρI
ρ̄S λSP
+`n$n
na2ãρEλEλSP
Ei (−`n$n)
#
(27)
Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple ... (Chi-Bao Le)
854 r ISSN: 2302-9285
4. NUMERICAL RESULTS
Our simulation parameters here are a1 = 0.7 and a2 = 0.3. N = 2, R1 = R2 = 1. ρI = 5 dB.ρE =
15 dB. λSP = 0.1, λSR = 1, λRD1 = 0.9, λRD2 = 0.6 and λRE = 0.1. Q = V = 1000.
Figure 2 depicts SPSC performance versus transmit SNR. We consider many cases related to CR-
NOMA for ρE = 5, 10, 15(dB). It is very high value of SPSC when increasing ρ to 20 (dB) and greater.
Signal x2 provides better SPSC performance compared with signal x2, and it can be explained that different
power allocated to each signal. Comparing the simulation results with the analytical results, there are tight
matching curves.
It can be seen how the number of the relay nodes make impacts on SPSC performance at Figure 3.
Similar trend of SPSC can be reported in Figure 3, it means SPSC will be worse as increasing ρ to 30 (dB).
Figure 3 depicts SPSC curves is highest at N = 15. When ρ is greater than 25 (dB), SPSC curves meet
saturation.
0 5 10 15 20 25 30
10
-4
10
-3
10
-2
10
-1
10
0
Strictly
Positive
Secrecy
Capacity
E
= 10 (dB)
E
= 15 (dB)
E
= 5 (dB)
Figure 2.
SPSC versus transmit SNR at BS
0 5 10 15 20 25 30
10
-4
10
-3
10
-2
10
-1
10
0
Strictly
Positive
Secrecy
Capacity
N = 15, 10, 5
N = 5, 10, 15
Figure 3. SPSC versus transmit SNR at BS with
different number of relay nodes
5. CONCLUSION
The paper studied SPSC in cognitive radio newtwork using NOMA and relay selection. Secure per-
formance is considered as existence of an eavesdropper and acceptable SPSC can be known. Moreover, the
approximate expressions in term of SPSC are derived to exhibit performance of two destinations. The deriva-
tions and analysis results showed that the proposed relay selection in CR-NOMA can effectively enhance the
secure performance.
REFERENCES
[1] Dinh-Thuan Do and M.-S. Van Nguyen, ”Device-to-device transmission modes in NOMA network with
and without Wireless Power Transfer,” Computer Communications, Vol. 139, pp. 67-77, May 2019.
[2] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, ”Enhancing the Physical Layer Security of Non-
Orthogonal Multiple Access in LargeScale Networks,” IEEE Trans. Wirel. Commun., vol. 16, no. 3, pp.
1656-1672, Mar. 2017.
[3] Y. Feng, Z. Yang, and S. Yan, ”Non-orthogonal multiple access and artificial-noise aided secure transmis-
sion in FD relay networks,” in Proc. IEEE GLOBECOM Wkshps, pp. 1-6, Dec. 2017.
[4] L. Lv, Z. Ding, Q. Ni, and J. Chen, ”Secure MISO-NOMA transmission with artificial noise,” IEEE Trans.
on Vehic. Tech., vol. 67, no. 7, pp. 6700-6705, Jul. 2018.
[5] D.-T. Do, M. Vaezi, and T.-L. Nguyen, ”Wireless Powered Cooperative Relaying using NOMA with
Imperfect CSI,” in Proc. of IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, UAE, pp. 1-6, 2018.
[6] D.-T. Do and A.-T. Le, ”NOMA based cognitive relaying: Transceiver hardware impairments, relay se-
lection policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154,
2019.
Bulletin of Electr Eng  Inf, Vol. 10, No. 2, April 2021 : 848 – 855
Bulletin of Electr Eng  Inf ISSN: 2302-9285 r 855
[7] D.-T. Do, A.-T. Le, and B.-M. Lee, ”On Performance Analysis of Underlay Cognitive Radio-Aware Hy-
brid OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, p. 819, 2019.
[8] D.-T. Do, A.-T. Le, C.-B. Le, and B. M. Lee ”On Exact Outage and Throughput Performance of Cognitive
Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link,” Sensors (Basel),
vol. 19, no. 15, p. 3314, 2019.
[9] T.-L. Nguyen and Dinh-Thuan Do, ”Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-
orthogonal Multiple Access ,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1-12,
2018.
[10] Dinh-Thuan Do, M.-S. Van Nguyen, T.-A. Hoang, and M. Voznak, ”NOMA-Assisted Multiple Access
Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement,” Sensors,
vol. 19, no. 3, p. 736, 2019.
[11] F. Zhou, et al., ”Robust AN-Aided beamforming and power splitting design for secure MISO cognitive
radio with SWIPT,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2450-2464, Apr. 2017.
[12] H. Wang and X. Xia, ”Enhancing wireless secrecy via cooperation: signal design and optmization,” IEEE
Commun. Magz., vol. 53, no. 12, pp. 47-53, 2015.
[13] E. Boshkovska, et al., ”Robust resource allocation for MIMO wireless powered communication networks
based on a non-linear EH model,” IEEE Trans. Commun., vol. 65, no. 5, pp. 1984-1999, May 2017.
[14] E. Boshkovska, et al., ”Secure SWIPT networks based on a non-linear energy harvesting model,” in Proc.
IEEE WCNC 2017, San Francisco, CA, USA, 2017.
[15] X. Chen, et al., ”A survey on multiple-antenna techniques for physical layer security,” IEEE Commun.
Surveys Tuts., vol. 19, no. 2, pp. 1027-1053, 2017.
[16] Y. Liu, et al., ”Phsical layer security for next generation wireless networks: Theories, tehcniques, and
challenges,” IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 347-376, 2017
[17] Y. Sun, D. W. K. Ng, Z. Ding, and R. Schober, ”Optimal joint power and subcarrier allocation for full-
duplex multicarrier non-orthogonal multiple access systems,” IEEE Trans. Commun., vol. 65, no. 3, pp.
1077-1091, 2017.
[18] H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. C. M. Leung, ”Secure resource allocation for
OFDMA two-way relay wireless sensor networks without and with cooperative jamming,” IEEE Trans.
Ind. Informat., vol. 12, no. 5, pp. 1714-1725, Oct. 2016.
[19] Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, ”A survey of physical layer security
techniques for 5g wireless networks and challenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4,
pp. 679-695, Apr. 2018.
[20] Y. Deng, L. Wang, M. Elkashlan, A. Nallanathan, and R. K. Mallik, ”Physical layer security in three-tier
wireless sensor networks: A stochastic geometry approach,” IEEE Trans. Inf. Forensics Security, vol. 11,
no. 6, pp. 1128-1138, Jun. 2016.
[21] F. Zhu and M. Yao, ”Improving physical-layer security for CRNs using SINR-based cooperative beam-
forming,” IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1835-1841, Mar. 2016.
[22] A. Al-Nahari, G. Geraci, M. Al-Jamali, M. H. Ahmed, and N. Yang, ”Beamforming with artificial noise
for secure MISOME cognitive radio transmissions,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 8,
pp. 1875-1889, Aug. 2018.
[23] P. Yan, Y. Zou, and J. Zhu, ”Energy-aware multiuser scheduling for physical-layer security in energy-
harvesting underlay cognitive radio systems,” IEEE Trans. Veh. Technol., vol. 67, no. 3, pp. 2084-2096,
Mar. 2018.
[24] H. Lei, M. Xu, I. S. Ansari, G. Pan, K. A. Qaraqe, and M.-S. Alouini, ”On secure underlay MIMO
cognitive radio networks with energy harvesting and transmit antenna selection,” IEEE Trans. Green
Commun. Netw., vol. 1, no. 2, pp. 192-203, Jun. 2017.
[25] I. S. Gradshteyn and I. M. Ryzhik, ”Table of Integrals, Series and Products,” 6th ed. New York, NY, USA:
Academic Press, 2000.
Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple ... (Chi-Bao Le)

More Related Content

What's hot

A clustering protocol using multiple chain
A clustering protocol using multiple chainA clustering protocol using multiple chain
A clustering protocol using multiple chain
ambitlick
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
TELKOMNIKA JOURNAL
 
Performance analysis of radar based on ds bpsk modulation technique
Performance analysis of radar based on ds bpsk modulation techniquePerformance analysis of radar based on ds bpsk modulation technique
Performance analysis of radar based on ds bpsk modulation technique
IAEME Publication
 
Optimization of Packet Length for Two Way Relaying with Energy Harvesting
Optimization of Packet Length for Two Way Relaying with Energy HarvestingOptimization of Packet Length for Two Way Relaying with Energy Harvesting
Optimization of Packet Length for Two Way Relaying with Energy Harvesting
IJCNCJournal
 
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
TELKOMNIKA JOURNAL
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precoding
adeelrazi
 
On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...
ijeei-iaes
 
On Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector PrecodingOn Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector Precoding
TSC University of Mondragon
 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
ambitlick
 
Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with ...
Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with ...Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with ...
Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with ...
TELKOMNIKA JOURNAL
 
WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission
ijwmn
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
Editor Jacotech
 
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
IJRST Journal
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channel
eSAT Publishing House
 
Ks3618311836
Ks3618311836Ks3618311836
Ks3618311836
IJERA Editor
 
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
IRJET Journal
 
IRJET- Rapid Spectrum Sensing Algorithm in Cooperative Spectrum Sensing for a...
IRJET- Rapid Spectrum Sensing Algorithm in Cooperative Spectrum Sensing for a...IRJET- Rapid Spectrum Sensing Algorithm in Cooperative Spectrum Sensing for a...
IRJET- Rapid Spectrum Sensing Algorithm in Cooperative Spectrum Sensing for a...
IRJET Journal
 
Paper id 312201516
Paper id 312201516Paper id 312201516
Paper id 312201516
IJRAT
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
TELKOMNIKA JOURNAL
 

What's hot (20)

A clustering protocol using multiple chain
A clustering protocol using multiple chainA clustering protocol using multiple chain
A clustering protocol using multiple chain
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
Performance analysis of radar based on ds bpsk modulation technique
Performance analysis of radar based on ds bpsk modulation techniquePerformance analysis of radar based on ds bpsk modulation technique
Performance analysis of radar based on ds bpsk modulation technique
 
Optimization of Packet Length for Two Way Relaying with Energy Harvesting
Optimization of Packet Length for Two Way Relaying with Energy HarvestingOptimization of Packet Length for Two Way Relaying with Energy Harvesting
Optimization of Packet Length for Two Way Relaying with Energy Harvesting
 
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precoding
 
On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...On limits of Wireless Communications in a Fading Environment: a General Param...
On limits of Wireless Communications in a Fading Environment: a General Param...
 
On Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector PrecodingOn Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector Precoding
 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
 
Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with ...
Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with ...Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with ...
Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with ...
 
WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
 
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
Performance Evaluation of Computationally Efficient Energy Detection Based Sp...
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channel
 
Ks3618311836
Ks3618311836Ks3618311836
Ks3618311836
 
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...
 
IRJET- Rapid Spectrum Sensing Algorithm in Cooperative Spectrum Sensing for a...
IRJET- Rapid Spectrum Sensing Algorithm in Cooperative Spectrum Sensing for a...IRJET- Rapid Spectrum Sensing Algorithm in Cooperative Spectrum Sensing for a...
IRJET- Rapid Spectrum Sensing Algorithm in Cooperative Spectrum Sensing for a...
 
Paper id 312201516
Paper id 312201516Paper id 312201516
Paper id 312201516
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
 

Similar to Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access

Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
nooriasukmaningtyas
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
journalBEEI
 
Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...
TELKOMNIKA JOURNAL
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
IJECEIAES
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
nooriasukmaningtyas
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
TELKOMNIKA JOURNAL
 
Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...
Pvrtechnologies Nellore
 
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
TELKOMNIKA JOURNAL
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
TELKOMNIKA JOURNAL
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systems
journalBEEI
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
TELKOMNIKA JOURNAL
 
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networksEmploying non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
journalBEEI
 
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
International Journal of Power Electronics and Drive Systems
 
Optimization of Packet Length for MIMO systems
Optimization of Packet Length for MIMO systemsOptimization of Packet Length for MIMO systems
Optimization of Packet Length for MIMO systems
IJCNCJournal
 
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
inventy
 
Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...
Polytechnique Montreal
 
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
IJECEIAES
 
An analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antennaAn analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antenna
marwaeng
 
40120140501016
4012014050101640120140501016
40120140501016
IAEME Publication
 
Performance of Spiked Population Models for Spectrum Sensing
Performance of Spiked Population Models for Spectrum SensingPerformance of Spiked Population Models for Spectrum Sensing
Performance of Spiked Population Models for Spectrum Sensing
Polytechnique Montreal
 

Similar to Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access (20)

Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
 
Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...Physical security with power beacon assisted in half-duplex relaying networks...
Physical security with power beacon assisted in half-duplex relaying networks...
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
 
1. 20934.pdf
1. 20934.pdf1. 20934.pdf
1. 20934.pdf
 
Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...
 
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
A new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systemsA new look on CSI imperfection in downlink NOMA systems
A new look on CSI imperfection in downlink NOMA systems
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
 
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networksEmploying non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
 
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
 
Optimization of Packet Length for MIMO systems
Optimization of Packet Length for MIMO systemsOptimization of Packet Length for MIMO systems
Optimization of Packet Length for MIMO systems
 
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
 
Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...Performance of cognitive radio networks with maximal ratio combining over cor...
Performance of cognitive radio networks with maximal ratio combining over cor...
 
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
 
An analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antennaAn analtical analysis of w cdma smart antenna
An analtical analysis of w cdma smart antenna
 
40120140501016
4012014050101640120140501016
40120140501016
 
Performance of Spiked Population Models for Spectrum Sensing
Performance of Spiked Population Models for Spectrum SensingPerformance of Spiked Population Models for Spectrum Sensing
Performance of Spiked Population Models for Spectrum Sensing
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
journalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
journalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
journalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
journalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
journalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
journalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
journalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
journalBEEI
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 

Recently uploaded

1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 

Recently uploaded (20)

1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 

Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 10, No. 2, April 2021, pp. 848∼855 ISSN: 2302-9285, DOI: 10.11591/eei.v10i2.2117 r 848 Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access Chi-Bao Le, Dinh-Thuan Do Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City, Vietnam Article Info Article history: Received Oct 16, 2020 Revised Jan 7, 2021 Accepted Feb 16, 2021 Keywords: Cognitive radio NOMA Strictly positive secure capacity ABSTRACT This paper studies a downlink security-aware secure outage performance in the sec- ondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the sec- ondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly. This is an open access article under the CC BY-SA license. Corresponding Author: Dinh-Thuan Do Faculty of Electronics Technology, Industrial University of Ho Chi Minh City 12 Nguyen Van Bao Road, Go Vap District, Ho Chi Minh City, Vietnam Email: dodinhthuan@iuh.edu.vn 1. INTRODUCTION Both non-orthogonal multiple access (NOMA) and physical-layer security (PLS) have been introduced as promising enabling technologies to implement some applications for Internet of Things (IoT) or future sys- tems [1-4]. Recently, the coexistence of these two important communication techniques benefits from cognitive ability and massive connections and these hybrid techniques have been considered to provide spectral efficient improvement for wireless transmission such as recent work [6-8]. Furthermore, physical-layer security (PHY) has attracted great interests while wireless applications are more popular. PHY based secure method does not require extra resources for the secret key [10-14]. In order to achieve secure communication, one can exploit the physical layer characteristics of the wireless channels. However, the secrecy rate of wireless communication systems is constrained by the channel state information [15]. In order to improve the secrecy rate, many methods are introduced such as jamming, multiple antennas, cooperative relaying and artificial noise (AN)-aided techniques have been studied [16]. Main results reported in [17-24] that these techniques benefit to improve the secrecy rate. Interestingly, most existing works have mainly focused on the performance and optimization of the PLS in NOMA systems . However, there is still open problems to rigorously study the feasibility of achieving the better secure performance by using best relay selection in secondary network of CR-NOMA systems. Although the joint user scheduling and power allocation problems are investigated for NOMA-based wireless network in [17], how cognitive radio technology affects the secure performance for NOMA-based wireless network needs further studies. In this paper, we study the security-aware SPSC metric CR-NOMA network. Journal homepage: http://beei.org
  • 2. Bulletin of Electr Eng & Inf ISSN: 2302-9285 r 849 2. SYSTEM MODEL In Figure 1, we consider the CR system containing the secondary network including base station (BS). To enhance performance of distance users, we need N relay nodes. Regarding distance users, two destination U1, U2, one eavesdropper E are considered their performance. Through the paper, hu is denoted as channel for node u, and it follows Rayleigh fading model with channel gain λu. It is noted that PS is transmit power at BS and it is limited under constraint with the primary network which contains primary destination PD. The interference channel from BS to the primary network is hSP . hRn is the channel between BS and R. hRn is denoted as the channel between relay and Ui. U2 U1 BS hR,n 1 U h 2 U h hSP PD R1 RN E Interference Link Main Link Wiretap Link Figure 1. Secure CR-NOMA system In CR-NOMA, the transmit power at the BS is constrained by (1) PS ≤ min I |hSP | 2 , P̄S ! (1) in which, we call P̄S and I as maximum average transmit power at the BS and interference temperature con- straint (ITC) at primary destination PD, respectively. At the first hop transmission, the n-th node among N relay node, the received signal can be formulated by (2) yR = hRn p a1PSx1 + p a2PSx2 + nRn (2) where the AWGN noise terms at R is nRn . Regarding the relay is used to forward signal, the criteria to select relay with its index, i.e. n∗ is formulated related the best channel n∗ = arg max |{z} 1,2,...,N |hRn | 2 (3) To decode signal x1 and x2 at R, the signal-to-interference-plus-noise ratio (SINR) is given by (4). SNR1 R = a1ρS|hRn | 2 a2ρS|hRn | 2 + 1 (4) where ρS = PS σ2 is the transmit signal to noise ratio (SNR) at the BS. At relay relying SIC, it is necessary to examine the received SNR at R to detect message x2 as (5). SNR2 R = a2ρS|hRn| 2 (5) In the next phase, the link netween selected relay Rn and Ui, i = 1, 2 is required to proceed signal √ a1PRx̄1 + √ a2PRx̄2. PR is called as the transmit power at R. The received signal Ui is expressed by (6) yUi = hUi √ a1PRx̄1 + √ a2PRx̄2 + nUi , ∀i ∈ {1, 2} (6) in which the AWGN noise terms is nUi measured at Ui. Further, principle of NOMA applied to Ui with higher power factor, it can detect x̄1 by considering x̄2 as a background noise with (7) Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple ... (Chi-Bao Le)
  • 3. 850 r ISSN: 2302-9285 SNRU1 = a1ρR|hU1 | 2 a2ρR|hU1 | 2 + 1 (7) where ρR = PR σ2 is the transmit SNR at R. To continue detecting procedure, U2 needs SIC to decode x̄1 while considering its own data x̄2 as a noise. The SINR is written as (8). SNRU2,x1 = a1ρR|hU2 | 2 a2ρR|hU2 | 2 + 1 (8) In this regard, U2 detects its own signal and the corresponding SNR is given as (9). SNRU2,x2 = a2ρR|hU2 | 2 (9) Unfortunately, eavesdropper steals information from the selected relay, the received signal at E is given as (10) yE = hE p a1PEx̄1 + p a2PEx̄1 + nE (10) where nE is the AWGN noise terms at E. The channel between Relay and E is hE. Then, SNR at E is given as SNREi = aiρE|hE| 2 , i ∈ {1, 2} (11) where ρE = PE σ2 is transmit SNR at E. The secrecy capacity for U1, U2 are computed respectively as C1 = 1 2 log2 1 + min SNR1 R, SNRU1 1 + SNRE1 !#+ , (12) C2 = 1 2 log2 1 + min SNR2 R, SNRU2,x2 1 + SNRE2 !#+ , (13) where [x] + = max [x, 0]. 3. SPSC ANALYSIS 3.1. SPSC computation at U1 We first using decode-and-forward scheme at relay node and consider SPSC performance of the first user U1 as (14). G1 = Pr (C1 0) = Pr min SNR1 R, SNRU1 SNRE1 =         Pr  |hRn∗ | 2 ρE|hE| 2 ρ̄S 1 − ρEa2|hE| 2 , ρ̄S ρI |hSP | 2   | {z } G1,1 + Pr  |hRn∗ | 2 ρE|hE| 2 |hSP | 2 ρI 1 − a2ρE|hE| 2 , ρ̄S ρI |hSP | 2   | {z } G1,2         × Pr  |hU1 | 2 ρE|hE| 2 ρR 1 − a2ρE|hE| 2   | {z } G1,3 (14) Bulletin of Electr Eng Inf, Vol. 10, No. 2, April 2021 : 848 – 855
  • 4. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 851 We then compute each component G1,1, G1,2, G1,3 as (15). G1,1 = Pr  |hRn∗ | 2 ρE|hE| 2 ρ̄S 1 − ρEa2|hE| 2 , |hE| 2 η, ρ̄S ρI |hSP | 2   = ρI ρ̄S Z 0 f|hSP |2 (x) η Z 0 f|hE |2 (y) 1 − F|hRn∗ | 2 ρEy ρ̄S (1 − ρEa2y) dxdy = 1 − e − ρI ρ̄S λSP N X n=1 N n (−1) n−1 λE η Z 0 e −y 1 λE + nρE ρ̄S λSR(1−a2ρE y) dy (15) where η = 1 a2ρE . The closed-form expression for G1,1 is very difficult to achieve, then using the formula Gaussian- Chebyshev quadrature, G1,1 is given as (16) G1,1 ≈ 1 − e − ρI ρ̄S λSP N X n=1 P X p=1 ηπ(−1) n−1 q 1 − ς2 p 2PλE × e − (ςp+1)η 2λE − (ηςp+η)nρE ρ̄S λSR[2−a2ρE (ηςp+η)] (16) where ςp = cos 2p−1 2P π . Next, G1,2 is calculated as (17). G1,2 = Pr  |hRn∗ | 2 ρE|hE| 2 |hSP | 2 ρI 1 − a2ρE|hE| 2 , |hE| 2 η, ρ̄S ρI |hSP | 2   = η Z 0 f|hE |2 (x) ∞ Z ρI ρ̄S f|hSP |2 (y) 1 − F|hRn∗ | 2 ρExy ρI (1 − a2ρEx) dxdy = N X n=1 N n (−1) n−1 λSP λE η Z 0 e − x λE ∞ Z ρI ρ̄S e −y 1 λSP + nρE x ρI (1−a2ρE x)λSR dxdy = N X n=1 N n (−1) n−1 λSP λE η Z 0 e − x λE − ρI ρ̄S 1 λSP + nρE x ρI (1−a2ρE x)λSR × 1 λSP + nρEx ρI (1 − a2ρEx) λSR −1 dx (17) Keep using the formula Gaussian-Chebyshev quadrature, G1,2 is given by (18) G1,2 ≈ N X n=1 V X v=1 ηπ(−1) n−1p 1 − υ2 v 2V λSP λEΦ (w) e − (υv+1)η 2λE − ρI Φ(υv) ρ̄S (18) where υv = cos 2v−1 2V π and Φ (w) = 1 λSP + nρE (ηw+η) [2−a2ρE (ηw+η)]ρI λSR . Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple ... (Chi-Bao Le)
  • 5. 852 r ISSN: 2302-9285 Next, G1,3 is calculated as (19) G1,3 = Pr  |hU1 | 2 ρE|hE| 2 ρR 1 − a2ρE|hE| 2 , |hE| 2 η   = η Z 0 f|hE |2 (x) 1 − F|hU1 | 2 ρEx ρR (1 − a2ρEx) dx = 1 λE η Z 0 e −x 1 λE + ρE λU1 ρR(1−a2ρE x) dx (19) Keep using the formula Gaussian-Chebyshev quadrature, G1,3 is given by (20) G1,3 ≈ πη 2λEQ Q X q=1 q 1 − ς2 q e − (ςq+1)η 2λE − (ςq+1)ρE η λU1 ρR[2−(ςq+1)a2ρE η] (20) where ςq = cos 2q−1 2Q π . Substituting (20), (18) and (16) into (14), G1 is given by (21) G1 =   1 − e − ρI ρ̄S λSP N X n=1 P X p=1 N n ηπ(−1) n−1 q 1 − ς2 p 2PλE × e − (ςp+1)η 2λE − (ηςp+η)nρE ρ̄S λSR[2−a2ρE (ηςp+η)] + N X n=1 V X v=1 N n ηπ(−1) n−1p 1 − υ2 v 2V λSP λEΦ (w) e − (υv+1)η 2λE − ρI Φ(υv) ρ̄S # × πη 2λEQ Q X q=1 q 1 − ς2 q e − (ςq+1)η 2λE − (ςq+1)ρE η λU1 ρR[2−(ςq+1)a2ρE η] (21) 3.2. SPSC computation at U2 In similar way, SPSC of user U2 is expressed by (22) G2 = Pr (C2 0) = Pr min SNR2 R, SNRU2,x2 SNRE2 =      Pr |hRn∗ | 2 āa2ρE|hE| 2 , |hSP | 2 ρI ρ̄S | {z } G2,1 + Pr |hRn∗ | 2 ãa2ρE|hE| 2 |hSP | 2 , |hSP | 2 ρI ρ̄S | {z } G2,2      × Pr |hU2 | 2 ρE|hE| 2 ρR ! | {z } G2,3 (22) where ā = 1 a2ρ̄S and ã = 1 a2ρI . These terms G2,1, G2,2, G2,3 are respectively formulated by (23) and (24) Bulletin of Electr Eng Inf, Vol. 10, No. 2, April 2021 : 848 – 855
  • 6. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 853 G2,1 = Pr |hRn∗ | 2 āa2ρE|hE| 2 , |hSP | 2 ρI ρ̄S = ρI ρ̄S Z 0 f|hSP |2 (x) ∞ Z 0 f|hE |2 (y) h 1 − F|hRn∗ | 2 (āa2ρEy) i dxdy = 1 − e − ρI ρ̄S λSP N X n=1 N n (−1) n−1 λE ∞ Z 0 e −y 1 λE + nāa2ρE λSR dy = 1 − e − ρI ρ̄S λSP N X n=1 N n (−1) n−1 λSR λSR + nλEāa2ρE (23) G2,2 = Pr |hRn∗ | 2 ãa2ρE|hE| 2 |hSP | 2 , |hSP | 2 ρI ρ̄S = ∞ Z 0 f|hE |2 (x) ∞ Z ρI ρ̄S f|hSP |2 (y) h 1 − F|hRn∗ | 2 (ãa2ρExy) i dxdy = N X n=1 N n λSR(−1) n−1 e − ρI ρ̄S λSP na2ãρEλEλSP ∞ Z 0 e−`nx $n + x dx (24) where `n = 1 λE + nãa2ρE λSR and $n = λSR λSP nãa2ρE . We are using [[25], 8.211.1], G2,2 is given by (25). G2,2 = N X n=1 N n λSR(−1) n e − ρI ρ̄S λSP +`n$n na2ãρEλEλSP Ei (−`n$n) (25) Next, we are calculated G2,3 as (26). G2,3 = Pr |hU2 | 2 ρE|hE| 2 ρR ! = ∞ Z 0 f|hE |2 (x) 1 − F|hU2 | 2 ρEx ρR dx = 1 λE ∞ Z 0 e −x 1 λE + ρE ρRλU2 dx = ρRλU2 ρRλU2 + λEρE (26) Substituting (26), (25) and (23) into (22), G2 is given by (27). G2 = N X n=1 N n ρRλU2 λSR ρRλU2 + λEρE 1 − e − ρI ρ̄S λSP (−1) n−1 λSR + nλEāa2ρE + (−1) n e − ρI ρ̄S λSP +`n$n na2ãρEλEλSP Ei (−`n$n) # (27) Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple ... (Chi-Bao Le)
  • 7. 854 r ISSN: 2302-9285 4. NUMERICAL RESULTS Our simulation parameters here are a1 = 0.7 and a2 = 0.3. N = 2, R1 = R2 = 1. ρI = 5 dB.ρE = 15 dB. λSP = 0.1, λSR = 1, λRD1 = 0.9, λRD2 = 0.6 and λRE = 0.1. Q = V = 1000. Figure 2 depicts SPSC performance versus transmit SNR. We consider many cases related to CR- NOMA for ρE = 5, 10, 15(dB). It is very high value of SPSC when increasing ρ to 20 (dB) and greater. Signal x2 provides better SPSC performance compared with signal x2, and it can be explained that different power allocated to each signal. Comparing the simulation results with the analytical results, there are tight matching curves. It can be seen how the number of the relay nodes make impacts on SPSC performance at Figure 3. Similar trend of SPSC can be reported in Figure 3, it means SPSC will be worse as increasing ρ to 30 (dB). Figure 3 depicts SPSC curves is highest at N = 15. When ρ is greater than 25 (dB), SPSC curves meet saturation. 0 5 10 15 20 25 30 10 -4 10 -3 10 -2 10 -1 10 0 Strictly Positive Secrecy Capacity E = 10 (dB) E = 15 (dB) E = 5 (dB) Figure 2. SPSC versus transmit SNR at BS 0 5 10 15 20 25 30 10 -4 10 -3 10 -2 10 -1 10 0 Strictly Positive Secrecy Capacity N = 15, 10, 5 N = 5, 10, 15 Figure 3. SPSC versus transmit SNR at BS with different number of relay nodes 5. CONCLUSION The paper studied SPSC in cognitive radio newtwork using NOMA and relay selection. Secure per- formance is considered as existence of an eavesdropper and acceptable SPSC can be known. Moreover, the approximate expressions in term of SPSC are derived to exhibit performance of two destinations. The deriva- tions and analysis results showed that the proposed relay selection in CR-NOMA can effectively enhance the secure performance. REFERENCES [1] Dinh-Thuan Do and M.-S. Van Nguyen, ”Device-to-device transmission modes in NOMA network with and without Wireless Power Transfer,” Computer Communications, Vol. 139, pp. 67-77, May 2019. [2] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, ”Enhancing the Physical Layer Security of Non- Orthogonal Multiple Access in LargeScale Networks,” IEEE Trans. Wirel. Commun., vol. 16, no. 3, pp. 1656-1672, Mar. 2017. [3] Y. Feng, Z. Yang, and S. Yan, ”Non-orthogonal multiple access and artificial-noise aided secure transmis- sion in FD relay networks,” in Proc. IEEE GLOBECOM Wkshps, pp. 1-6, Dec. 2017. [4] L. Lv, Z. Ding, Q. Ni, and J. Chen, ”Secure MISO-NOMA transmission with artificial noise,” IEEE Trans. on Vehic. Tech., vol. 67, no. 7, pp. 6700-6705, Jul. 2018. [5] D.-T. Do, M. Vaezi, and T.-L. Nguyen, ”Wireless Powered Cooperative Relaying using NOMA with Imperfect CSI,” in Proc. of IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, UAE, pp. 1-6, 2018. [6] D.-T. Do and A.-T. Le, ”NOMA based cognitive relaying: Transceiver hardware impairments, relay se- lection policies and outage performance comparison,” Computer Communications, vol. 146, pp. 144-154, 2019. Bulletin of Electr Eng Inf, Vol. 10, No. 2, April 2021 : 848 – 855
  • 8. Bulletin of Electr Eng Inf ISSN: 2302-9285 r 855 [7] D.-T. Do, A.-T. Le, and B.-M. Lee, ”On Performance Analysis of Underlay Cognitive Radio-Aware Hy- brid OMA/NOMA Networks with Imperfect CSI,” Electronics, vol. 8, no. 7, p. 819, 2019. [8] D.-T. Do, A.-T. Le, C.-B. Le, and B. M. Lee ”On Exact Outage and Throughput Performance of Cognitive Radio based Non-Orthogonal Multiple Access Networks With and Without D2D Link,” Sensors (Basel), vol. 19, no. 15, p. 3314, 2019. [9] T.-L. Nguyen and Dinh-Thuan Do, ”Exploiting Impacts of Intercell Interference on SWIPT-assisted Non- orthogonal Multiple Access ,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1-12, 2018. [10] Dinh-Thuan Do, M.-S. Van Nguyen, T.-A. Hoang, and M. Voznak, ”NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement,” Sensors, vol. 19, no. 3, p. 736, 2019. [11] F. Zhou, et al., ”Robust AN-Aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2450-2464, Apr. 2017. [12] H. Wang and X. Xia, ”Enhancing wireless secrecy via cooperation: signal design and optmization,” IEEE Commun. Magz., vol. 53, no. 12, pp. 47-53, 2015. [13] E. Boshkovska, et al., ”Robust resource allocation for MIMO wireless powered communication networks based on a non-linear EH model,” IEEE Trans. Commun., vol. 65, no. 5, pp. 1984-1999, May 2017. [14] E. Boshkovska, et al., ”Secure SWIPT networks based on a non-linear energy harvesting model,” in Proc. IEEE WCNC 2017, San Francisco, CA, USA, 2017. [15] X. Chen, et al., ”A survey on multiple-antenna techniques for physical layer security,” IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 1027-1053, 2017. [16] Y. Liu, et al., ”Phsical layer security for next generation wireless networks: Theories, tehcniques, and challenges,” IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 347-376, 2017 [17] Y. Sun, D. W. K. Ng, Z. Ding, and R. Schober, ”Optimal joint power and subcarrier allocation for full- duplex multicarrier non-orthogonal multiple access systems,” IEEE Trans. Commun., vol. 65, no. 3, pp. 1077-1091, 2017. [18] H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. C. M. Leung, ”Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming,” IEEE Trans. Ind. Informat., vol. 12, no. 5, pp. 1714-1725, Oct. 2016. [19] Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, ”A survey of physical layer security techniques for 5g wireless networks and challenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679-695, Apr. 2018. [20] Y. Deng, L. Wang, M. Elkashlan, A. Nallanathan, and R. K. Mallik, ”Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, pp. 1128-1138, Jun. 2016. [21] F. Zhu and M. Yao, ”Improving physical-layer security for CRNs using SINR-based cooperative beam- forming,” IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1835-1841, Mar. 2016. [22] A. Al-Nahari, G. Geraci, M. Al-Jamali, M. H. Ahmed, and N. Yang, ”Beamforming with artificial noise for secure MISOME cognitive radio transmissions,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 8, pp. 1875-1889, Aug. 2018. [23] P. Yan, Y. Zou, and J. Zhu, ”Energy-aware multiuser scheduling for physical-layer security in energy- harvesting underlay cognitive radio systems,” IEEE Trans. Veh. Technol., vol. 67, no. 3, pp. 2084-2096, Mar. 2018. [24] H. Lei, M. Xu, I. S. Ansari, G. Pan, K. A. Qaraqe, and M.-S. Alouini, ”On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection,” IEEE Trans. Green Commun. Netw., vol. 1, no. 2, pp. 192-203, Jun. 2017. [25] I. S. Gradshteyn and I. M. Ryzhik, ”Table of Integrals, Series and Products,” 6th ed. New York, NY, USA: Academic Press, 2000. Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple ... (Chi-Bao Le)