Physical layer security in cognitive NOMA sensor networks with full-duplex technique
This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user (PU) and secondary user (SU) sensor nodes in th...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2021-12-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1177/15501477211059097 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850164128302235648 |
|---|---|
| author | Zhihui Shang Tao Zhang Liwei Tao Zhongwu Xiang Weiwei Yang |
| author_facet | Zhihui Shang Tao Zhang Liwei Tao Zhongwu Xiang Weiwei Yang |
| author_sort | Zhihui Shang |
| collection | DOAJ |
| description | This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user (PU) and secondary user (SU) sensor nodes in the presence of an eavesdropper. The zero-forcing beamforming design problems of FD operation are investigated subject to the practical secrecy rate and the quality of services of PU. To characterize the security reliability trade-off of the FD-C-NOMA scheme, we first derive the closed-form expressions of connection outage probability (COP), the secrecy outage probability (SOP), and effective secrecy throughput (EST) of each SU in the NOMA networks. Then the impacts of the system parameters on the COP, SOP, and EST are investigated to evaluate the security and reliability in the FD-C-NOMA networks. Furthermore, in order to further verify the security and reliability of our considered network, an OMA scheme of FD operation is provided in the simulation for the purpose of comparison. Results demonstrate that the NOMA-based cognitive sensor networks of FD operation outperforms the OMA system in terms of EST. Finally, simulations are performed to validate the accuracy of our analysis results of the proposed scheme. |
| format | Article |
| id | doaj-art-efc4ac4917874badae4c39dc5fe563bf |
| institution | OA Journals |
| issn | 1550-1477 |
| language | English |
| publishDate | 2021-12-01 |
| publisher | Wiley |
| record_format | Article |
| series | International Journal of Distributed Sensor Networks |
| spelling | doaj-art-efc4ac4917874badae4c39dc5fe563bf2025-08-20T02:22:04ZengWileyInternational Journal of Distributed Sensor Networks1550-14772021-12-011710.1177/15501477211059097Physical layer security in cognitive NOMA sensor networks with full-duplex techniqueZhihui Shang0Tao Zhang1Liwei Tao2Zhongwu Xiang3Weiwei Yang4The College of Communication Engineering, Army Engineering University of PLA, Nanjing, ChinaThe Sixty-third Research Institute, National University of Defense Technology, Nanjing, ChinaThe College of Communication Engineering, Army Engineering University of PLA, Nanjing, ChinaThe National Key Laboratory of Science and Technology on Vessel Integrated Power System, Naval University of Engineering, Wuhan, ChinaThe College of Communication Engineering, Army Engineering University of PLA, Nanjing, ChinaThis article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user (PU) and secondary user (SU) sensor nodes in the presence of an eavesdropper. The zero-forcing beamforming design problems of FD operation are investigated subject to the practical secrecy rate and the quality of services of PU. To characterize the security reliability trade-off of the FD-C-NOMA scheme, we first derive the closed-form expressions of connection outage probability (COP), the secrecy outage probability (SOP), and effective secrecy throughput (EST) of each SU in the NOMA networks. Then the impacts of the system parameters on the COP, SOP, and EST are investigated to evaluate the security and reliability in the FD-C-NOMA networks. Furthermore, in order to further verify the security and reliability of our considered network, an OMA scheme of FD operation is provided in the simulation for the purpose of comparison. Results demonstrate that the NOMA-based cognitive sensor networks of FD operation outperforms the OMA system in terms of EST. Finally, simulations are performed to validate the accuracy of our analysis results of the proposed scheme.https://doi.org/10.1177/15501477211059097 |
| spellingShingle | Zhihui Shang Tao Zhang Liwei Tao Zhongwu Xiang Weiwei Yang Physical layer security in cognitive NOMA sensor networks with full-duplex technique International Journal of Distributed Sensor Networks |
| title | Physical layer security in cognitive NOMA sensor networks with full-duplex technique |
| title_full | Physical layer security in cognitive NOMA sensor networks with full-duplex technique |
| title_fullStr | Physical layer security in cognitive NOMA sensor networks with full-duplex technique |
| title_full_unstemmed | Physical layer security in cognitive NOMA sensor networks with full-duplex technique |
| title_short | Physical layer security in cognitive NOMA sensor networks with full-duplex technique |
| title_sort | physical layer security in cognitive noma sensor networks with full duplex technique |
| url | https://doi.org/10.1177/15501477211059097 |
| work_keys_str_mv | AT zhihuishang physicallayersecurityincognitivenomasensornetworkswithfullduplextechnique AT taozhang physicallayersecurityincognitivenomasensornetworkswithfullduplextechnique AT liweitao physicallayersecurityincognitivenomasensornetworkswithfullduplextechnique AT zhongwuxiang physicallayersecurityincognitivenomasensornetworkswithfullduplextechnique AT weiweiyang physicallayersecurityincognitivenomasensornetworkswithfullduplextechnique |