Next Article in Journal
Anonymous Methods Based on Multi-Attribute Clustering and Generalization Constraints
Previous Article in Journal
Grapharizer: A Graph-Based Technique for Extractive Multi-Document Summarization
Previous Article in Special Issue
Reliable Resource Allocation and Management for IoT Transportation Using Fog Computing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Outage Performance and Power Allocation for Three Secondary Users CR-NOMA Networks with Transmit Antenna Selection

1
School of Electronic Engineering and Automation, Guilin University of Electronic Technology, Guilin 541004, China
2
School of Electronic Information and Automation, Guilin University of Aerospace Technology, Guilin 541004, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(8), 1896; https://doi.org/10.3390/electronics12081896
Submission received: 20 March 2023 / Revised: 11 April 2023 / Accepted: 12 April 2023 / Published: 17 April 2023
(This article belongs to the Special Issue Advances in Wireless Networks and Mobile Systems)

Abstract

:
Cognitive radio inspired non-orthogonal multiple access (CR-NOMA) networks are a research focus in the wireless communication field. The secure communication of wireless networks has become a pressing issue due to the openness of the wireless channel. Multiple-antenna technology can enhance the secrecy performance in CR-NOMA networks, thus we propose a multiple-input-single-output (MISO) CR-NOMA network where the base station (BS) is equipped with multiple antennas, while others have a single antenna in the paper. The BS serves three secondary users in the presence of an eavesdropper and a primary user. We propose two transmit antenna selection (TAS) schemes, namely the space-time transmission (ST) scheme and the maximum channel capacity (MCC) scheme, respectively. Firstly, we obtain an exact closed-form expression for the secrecy outage probability (SOP) of three secondary users and the overall SOP of the networks with the two schemes, respectively. To gain further insights, the present study analyzes the asymptotic SOP performance to analyze the relationship between the network parameters and secrecy outage performance. Based on this, we propose a power allocation algorithm to further improve the secrecy outage performance of the networks. Finally, we verify the analyses with Monte Carlo simulations. The numerical and simulation results demonstrate that: (1) The MCC scheme outperforms the ST scheme on the secrecy outage performance. (2) The proposed power allocation algorithm optimizes the secrecy outage performance of the networks. (3) There exists a sole respective optimal power allocation factor for a BS different transmission power.

1. Introduction

The future communication network is poised to revolutionize the capabilities of smart cities and the Internet of Things by leveraging global coverage, 10 GB communication capacities, and real-time communication. Nevertheless, the proliferation of access devices has compounded the need for more spectrum resources. To address the problem of spectrum shortage, non-orthogonal multiple access (NOMA) and cognitive radio (CR) technologies have emerged as promising solutions to enhance the efficiency of spectrum utilization in future wireless networks [1,2,3,4,5]. These technologies offer unique advantages for mitigating the problem of spectrum resources, and their significance in the field is widely recognized.

1.1. Related Works

By integrating the benefits of NOMA and CR technologies, researchers have proposed a CR-NOMA network based on spectrum sharing mode in their works [6,7]. The study has focused on the connection outage performance of secondary users, revealing that the connection reliability of the CR-NOMA network surpasses that of the orthogonal multiple access (OMA) based on a CR network. These findings underscore the potential of CR-NOMA as a promising approach to improve the performance of future wireless networks in terms of connectivity and reliability.
The issue of wireless network security has become a prominent research focus, as users’ confidential information is vulnerable to eavesdropping in wireless network channels. Based on information security theory, physical layer security (PLS) technology has emerged as a practical solution [8,9]. In recent studies [10,11], the security communication concerns in CR-NOMA networks have been investigated from the PLS perspective. Specifically, the authors investigated the secrecy performance of the CR-NOMA network in the presence of multiple primary users under the PLS scenario, where secondary users were considered potential eavesdroppers [10]. Moreover, [11] investigated the secrecy outage probability (SOP) of one secondary user in CR-NOMA networks under the quality-of-service (QoS) and security constraints of the primary user.
Nonetheless, a notable limitation of the aforementioned studies is that the base station (BS) is equipped with only a single antenna, thus prompting researchers to shift their focus towards multi-antenna networks and investigate various transmit antenna selection (TAS) schemes to enhance secrecy outage performance [12,13,14,15,16,17,18]. For example, in [12], Nandan et al. proposed a zero-forcing-beamforming (ZFBF) technique to enhance the secrecy performance in multiple-antenna CR-NOMA networks. In [13,14], the SOP of secondary users in cooperative multiple-input-single-output (MISO) CR-NOMA networks were examined, with consideration given to the absence of a direct link between the secondary transmitting BS and secondary users, and the provision of a relay for cooperative signal transmission. Moreover, Zhu et al. proposed a space-time transmission (ST) scheme and a maximum channel capacity (MCC) scheme [15], which served as the basis for LEI et al.’s study on the SOP of two secondary users in the MISO-NOMA network with STT and MCC schemes. Simulation results shown that the secrecy performance with STT and MCC schemes were substantially better than that of a single-antenna NOMA system [16]. In [17,18], artificial noise and relay-assisted cooperative technology were applied to NOMA networks with ST and MCC schemes, further enhancing the secrecy outage performance of the system. However, it is worth noting that [15,16,17,18] were conducted solely in non-cognitive scenarios.
In order to further improve the spectrum efficiency and secrecy outage performance of next-generation wireless networks, researchers have turned their attention to the power allocation (PA) problem. For instance, the authors proposed a power allocation algorithm for single-input-single-output (SISO) NOMA systems to enhance the secrecy sum rate of the secondary networks [19]. In [20], the authors examined the optimization problem of secrecy outage probability (SOP) for both primary users and random secondary users in a CR-NOMA network. In [21], a machine-learning algorithm was proposed to minimize the SOP of the secondary networks in cooperative CR-NOMA systems. Simulation results indicated the superiority of the proposed PA algorithm in terms of achievable SOP.
The primary limitation of the aforementioned studies pertains to the analysis of secrecy performance in two-user networks implementing either NOMA or CR-NOMA schemes. Notably, the primary objective of NOMA technology is to ensure optimal performance while serving a maximum number of users, thereby not being recommended for use in two-user scenarios. However, the derivation of the mathematical model becomes increasingly complex as the number of users grows, which poses a significant challenge. Presently, investigations into the performance of three-user CR-NOMA networks remain in their nascent stages [22,23]. The authors of the studies have demonstrated superior performance in connection outage probability and achievable capacity for such networks [23].

1.2. Motivation and Contribution

In view of the inspiration mentioned earlier and to the best of our knowledge, the evaluation of secrecy outage performance in CR-NOMA networks employing MCC and ST schemes is an outstanding issue. Consequently, we propose a novel multiple-antenna CR-NOMA network architecture, wherein the secondary base station (BS) transmits signals to three secondary users while accounting for the presence of an eavesdropper over Rayleigh fading channels. The transmission strategy considers interference caused by the secondary network to the primary user (PD) and adopts a power constraint to ensure QoS of PD. This approach not only enhances the spectrum utilization of the network, but also ensures the security of the transmitted data. The article’s primary contributions can be condensed as follows:
  • We investigate the secrecy outage performance for MISO-CR-NOMA networks with MCC and ST schemes. The exact closed-form expressions for the SOP of secondary users are derived. To obtain further insights, we conduct the asymptotic analysis of SOP for MCC and ST schemes when the transmitted power of BS reaches the QoS constraint;
  • Based on the secrecy outage performance with MCC and ST schemes, we study the problem of optimal power allocation and minimum SOP, and design a simulated-annealing (SA) algorithm based on the QoS constraint to solve the problem;
  • Through theoretical analysis and Monte Carlo simulation verification, we compare the secrecy outage performance of the overall secondary network and every secondary user with the ST scheme and the MCC scheme, verifying the accuracy of the optimal power allocation algorithm. It is shown that: (1) The MCC scheme outperforms the ST scheme in secrecy outage performance; (2) the proposed power allocation algorithm optimizes the secrecy outage performance of the secondary user network; and (3) the optimal power allocation factor changes when the BS transmission power changes.

1.3. Structure

The subsequent sections of this paper are structured as follows. Section 2 describes the system model. The investigation of the secrecy outage performance for single-antenna BS is presented in Section 3. Section 4 and Section 5 detail the TAS schemes and provide the exact and asymptotic closed-form expressions for the SOP of secondary networks. Section 6 proposes the SA algorithm. In Section 7, we showcase representative numerical results based on the analytical findings and SA optimization models. Finally, Section 8 concludes this article.

2. System Model

Based on Figure 1, we contemplate a downlink CR-NOMA network including a secondary base station (BS), a primary user (PD), a set of secondary users: U 1 (the farthest user), U 2 (the remote user) and U 3 (the near user), a passive eavesdropper (E). Because BS has strong computing power and volume, we assume that BS is equipped with M-antennas; instead, PD, U 1 , U 2 , U 3 and E are equipped with a single antenna because of their limited spatial and power consumption. The model is founded on the following assumptions, which are without loss of generality:
(1)
Considering the channel from BS to the D, where D PD , U 1 , U 2 , U 3 , E , let h ¯ S D and L S D represent the small-scale fading and large-scale path-loss of the BS→D, channel. It is assumed that all channels are independent of each other and exhibit Rayleigh block flat fading. Therefore, the channel gain of small-scale fading ( h ¯ D 2 ) follows independent exponential distribution with the mean of λ ¯ D . The model of large-scale fading is L D = L d D / d 0 κ , where L means the path-loss constant, d D represents the distance between BS and D, d 0 means the reference distance, and κ means the path-loss exponent. To simplify symbols, we refer to the modeling of [24], let h D = Δ h ¯ D L D , h ¯ D 2 follows an exponential distribution with unit mean. Consequently, the channel coefficient h D 2 follows an independent exponential distribution with the mean of λ D = L d D / d 0 κ .
(2)
All channels are subjected to an additive white Gaussian noise (AWGN) characterized by a zero mean and a variance of σ 1 2 . In line with [25], we consider the absence of channel state information (CSI) of the primary base station (PBS) at the secondary users. Consequently, owing to the Central Limit Theorem, we can regard the interference resulting from PBS as AWGN having a zero mean and a variance of σ p 2 . To simplify symbols, let σ 2 = Δ σ 1 2 + σ p 2 .
In this network, the superimposed signal sent by BS in NOMA mode is
x B S = α 1 x 1 + α 2 x 2 + α 3 x 3
where x 1 , x 2 and x 3 represents the signals sent by BS to secondary users U 1 , U 2 and U 3 , respectively. α 1 , α 2 and α 3 are power distribution coefficients ( α 1 + α 2 + α 3 = 1 ). According to the NOMA transmission principle, since the distance from U 3 to BS is closer than U 2 to BS, U 2 is also closer than U 1 , and it is assumed that α 1 > α 2 > α 3 .
When BS sends signals to secondary users, the signal received by secondary users U j j = 1 , 2 , 3 can be expressed as
y U j = h U j P s ( α 1 x 1 + α 2 x 2 + α 3 x 3 ) + z U j
where h U j is the channel coefficient from BS to U j link, P s is BS transmit power, and z U j is AWGN with the variance of σ 2 .
In order to ensure the QoS of the primary user, we consider the transmit power P s of the BS to be constrained by both BS peak transmission power and peak interference power, which is expressed as
P s = P t , h P D 2 Q P t Q h P D 2 , h P D 2 > Q P t
where P t is BS peak transmission power, Q is interference temperature, and h P D 2 indicates the interference channel gain between BS to PD.
Firstly, we describe the signal-to-interference-plus-noise ratio (SINR) and signal-to-noise ratio (SNR) at U j and E according to successive interference cancellation (SIC) technology.
(1)
At U 1 : U 1 directly decodes its own signal x 1 , and the signal x 2 and x 3 are regarded as interference, the SINR of U 1 can be given as
γ U 1 = α 1 P s h U 1 2 α 2 + α 3 P s h U 1 2 + σ 2
(2)
At U 2 : In order to decode x 2 , U 2 first needs to decode x 1 , then eliminate the interference caused by x 1 with the help of SIC technology, and finally decode x 2 with x 3 as the interference signal. To facilitate the analysis of secrecy outage performance, we posit that U 2 exhibits effective decoding x 1 , thus the SINR of U 2 can be given as
γ U 2 = α 2 P s h U 2 2 α 3 P s h U 2 2 + σ 2
(3)
At U 3 : Similar to the decoding process of U 2 , U 3 needs to decode x 1 and x 2 successfully eliminate interference before decoding x 3 , we assume that U 3 can successfully decode x 1 and x 2 , and the SNR of U 3 can be given as
γ U 3 = α 3 P s h U 3 2 σ 2
(4)
At E: We assume that E has SIC capabilities similar to U 2 and U 3 to detect multi-user data. x 2 and x 3 are considered as interference noise when they eavesdrop on U 1 . x 1 is successfully eliminated through SIC, and x 3 is regarded as interference noise when it eavesdrops on U 2 . x 1 and x 2 are successfully eliminated when they eavesdrop on U 3 . Thus, we have
γ E j = α 1 P s h E 2 α 2 + α 3 P s h E 2 + σ 2 , j = 1 α 2 P s h E 2 α 3 P s h E 2 + σ 2 , j = 2 α 3 P s h E 2 σ 2 , j = 3

3. Secrecy Outage Performance of SISO-CR-NOMA Network

In this section, we consider the circumstance of the SISO-CR-NOMA network, i.e., M = 1 , the BS is equipped with one antenna. The SOP results obtained in this section can replace many complex expressions in the MISO network, which is easier to understand more intuitively, and it can be used as a benchmark for comparison, making it easier to understand the secrecy outage performance improvement brought by TAS schemes. First, we explain the secrecy capacity and SOP, then derive the exact closed-form of the secondary user’s SOP in the SISO-CR-NOMA network.
Secrecy capacity can be defined as the disparity between the channel capacity of the BS-User transmission link and the BS-E eavesdropping link [14]. Therefore, the secrecy capacity of U j is
C s j = C j C E j +
where t + = max t , 0 , C j = log 2 1 + γ U j , C E j = log 2 1 + γ E j .
SOP is defined as the probability that secrecy capacity is less than the secrecy communication rate [16]. The SOP of U j can be expressed as
P U j _ s o p = Pr C s j R j s
where R j s is the secrecy communication rate of U j .
In order to derive the SOP of U j , we first need to obtain the cumulative distribution function (CDF) of γ U j , γ E j , and BS-PD interference channel gain h P D 2 , the CDF of γ G j ( G U , E , j = 1 , 2 , 3 ) and h P D 2 expressed as
F γ G 1 x = 1 e σ 2 x λ G 1 P s a 1 a 2 + a 3 x , x < a 1 a 2 + a 3 1 , x a 1 a 2 + a 3
F γ G 2 x = 1 e σ 2 x λ G 2 P s a 2 a 3 x , x < a 2 a 3 1 , x a 2 a 3
F γ G 3 x = 1 e σ 2 x λ G 3 a 3 P s
F h P D 2 x = 1 e x λ P D
By deriving the CDF above (10)–(13), the probability density function (PDF) of the variable γ G j and h P D 2 can be obtained, respectively.
f γ G 1 x = a 1 σ 2 λ G 1 P s a 1 a 2 + a 3 x 2 e σ 2 x λ G 1 P s a 1 a 2 + a 3 x , x < a 1 a 2 + a 3 0 , x a 1 a 2 + a 3
f γ G 2 x = a 2 σ 2 λ G 2 P s a 2 a 3 x 2 e σ 2 x λ G 2 P s a 2 a 3 x , x < a 2 a 3 0 , x a 2 a 3
f γ G 3 x = σ 2 λ G 3 a 3 P s e σ 2 x λ G 3 a 3 P s
f h P D 2 x = 1 λ P D e x λ P D
Substituting the above CDF and PDF into Equations (8) and (9), the following conclusions can be obtained:
Theorem 1.
The SOP of secondary users U 1 , U 2 and U 3 in the SISO-CR-NOMA network are expressed as
P U 1 _ s o p = 1 n = 1 N σ 2 α 1 ω 1 π 1 τ n 2 λ E 2 N α 1 α 2 + α 3 ν n 1 2 e A 1 P t 1 e Q λ P D P t Γ 2 , Q P t A 2 + 1 λ P D λ P D Q A 2 + 1 λ P D 2
P U 2 _ s o p = 1 n = 1 N σ 2 α 2 ω 2 π 1 τ n 2 λ E 2 N α 2 α 3 ν n 2 2 e A 3 P t 1 e Q λ P D P t + Γ 2 , Q P t A 4 + 1 λ P D λ P D Q A 4 + 1 λ P D 2
P U 3 _ s o p = 1 λ U 3 λ E θ 3 + λ U 3 1 e Q λ P D P t e σ 2 θ 3 1 λ U 3 α 3 P t λ U 3 α 3 Q e σ 2 θ 3 1 λ U 3 α 3 Q + 1 λ P D Q P t λ P D σ 2 θ 3 1 + λ U 3 α 3 Q
where ω 1 = 1 α 2 + α 3 θ 1 1 < α 1 α 2 + α 3 , θ 1 = 2 R 1 s , τ n = cos 2 n 1 2 N π , ν n 1 = ω 1 τ n + 1 2 , ω 2 = α 2 + α 3 α 3 θ 2 1 < α 2 α 3 , θ 2 = 2 R 2 s , ν n 2 = ω 2 τ n + 1 2 , θ 3 = 2 R 3 s , A 1 = σ 2 ν n 1 λ E P t α 1 α 2 + α 3 ν n 1 + σ 2 θ 1 ν n 1 + θ 1 1 λ U 1 P t α 1 α 2 + α 3 θ 1 ν n 1 + θ 1 1 , A 2 = σ 2 ν n 1 λ E Q α 1 α 2 + α 3 ν n 1 + σ 2 θ 1 ν n 1 + θ 1 1 λ U 1 Q α 1 α 2 + α 3 θ 1 ν n 1 + θ 1 1 , A 3 = σ 2 ν n 2 λ E P t α 2 α 3 ν n 2 + σ 2 θ 2 ν n 2 + θ 2 1 λ U 1 P t α 2 α 3 θ 2 ν n 2 + θ 2 1 , A 4 = σ 2 ν n 2 λ E Q α 2 α 3 ν n 2 + σ 2 θ 2 ν n 2 + θ 2 1 λ U 1 Q α 2 α 3 θ 2 ν n 2 + θ 2 1 .
Proof. 
Please see Appendix A.    □
According to [26,27], given the assumption that E’s interest lies solely in the information of a particular user within the system, the probability of selecting said user is equal among all users, i.e., P = 1 / 3 . However, BS lacks knowledge regarding which user E intends to eavesdrop on. Therefore, the overall SOP of three secondary users in the CR-NOMA network can be expressed as
P o v e r a l l _ s o p = 1 3 P U 1 _ s o p + P U 2 _ s o p + P U 3 _ s o p
Proof. 
Please see Appendix B.    □

4. Secrecy Outage Performance of MISO-CR-NOMA Network

This section analyzes the secrecy outage performance of the secondary users with MCC and ST schemes.

4.1. The Maximum Channel Capacity Scheme

In general, the CSI of the links between the BS and secondary users can be relayed to the former through a combination of signaling and channel feedback mechanisms [24]. In contrast, E remains in a passive operational state, such that no exchange of information exists between it and the BS. Thus, it is considered that the CSI of BS and secondary user links are available at BS, while the CSI of the BS to E link is not available. To this end, the MCC scheme is proposed to maximize the SNR, or alternatively, SINR of the secondary users while concurrently ensuring that the QoS requirements of PD are upheld. Specifically, the optimal transmit antenna for the signal of BS transmitted to the secondary is identified as the one that maximizes the channel capacity. Assuming no loss of generality, we contemplate that the i-th ( 1 i M ) transmit antenna of BS is selected as the best antenna to transmit signal with power P s . Next, we analyze three situations, called max- U 1 , max- U 2 and max- U 3 , respectively.

4.1.1. max- U 1

In this one, the i-th transmit antenna at the BS is selected such that the channel capacity of the BS– U 1 is maximized, which means γ U 1 M 1 = max 1 i M γ S i U 1 , γ S i U 1 is the received instantaneous SINR at U 1 from the i-th antenna at S, and the symbol “M1” represents max- U 1 . The CDF and PDF of γ S i U 1 correspond identically to Equations (10) and (14). Then, the CDF and PDF of γ U 1 M 1 can be obtained as
F γ U 1 M 1 x = F γ U 1 x M = 1 + k = 1 M M k 1 k e k σ 2 x λ U 1 P s a 1 a 2 + a 3 x , x < a 1 a 2 + a 3 1 , x a 1 a 2 + a 3
f γ U 1 M 1 x = k = 1 M M k 1 k + 1 k σ 2 x λ U 1 P s a 1 a 2 + a 3 x 2 e k σ 2 x λ U 1 P s a 1 a 2 + a 3 x , x < a 1 a 2 + a 3 1 , x a 1 a 2 + a 3
It is noteworthy that the selection of the i-th transmits antenna for U 1 entails the random selection of a transmit antenna for U 2 , U 3 , PD, and E. As a result, the CDF and PDF of γ U 2 M 1 , γ U 3 M 1 and h P D M 1 2 in this scenario are identical to those of the SISO-CR-NOMA network, i.e., (11)–(13) and (15)–(17), respectively. Similar to the derivation of the single-antenna case, we can obtain Theorem 2.
Theorem 2.
The SOP of secondary users U 1 , U 2 and U 3 with max- U 1 of MCC scheme in the MISO-CR-NOMA network are expressed as
P U 1 _ s o p M 1 = 1 + k = 1 M n = 1 N M k 1 k σ 2 α 1 ω 1 π 1 τ n 2 λ E 2 N α 1 α 2 + α 3 ν n 1 2 e B 1 P t 1 e Q λ P D P t + Γ 2 , Q P t B 2 + 1 λ P D λ P D Q B 2 + 1 λ P D 2
P U 2 _ s o p M 1 = P U 2 _ s o p
P U 3 _ s o p M 1 = P U 3 _ s o p
P o v e r a l l _ s o p M 1 = 1 3 P U 1 _ s o p M 1 + P U 2 _ s o p M 1 + P U 3 _ s o p M 1
where B 1 = σ 2 ν n 1 λ E P t α 1 α 2 + α 3 ν n 1 + k σ 2 θ 1 ν n 1 + θ 1 1 λ U 1 P t α 1 α 2 + α 3 θ 1 ν n 1 + θ 1 1 , B 2 = σ 2 ν n 1 λ E Q α 1 α 2 + α 3 ν n 1 + k σ 2 θ 1 ν n 1 + θ 1 1 λ U 1 Q α 1 α 2 + α 3 θ 1 ν n 1 + θ 1 1 .

4.1.2. max- U 2

Similarly, in order to maximize the channel capacity of the communication link of the BS– U 2 , the i-th transmit antenna at the BS is deliberately selected. To simplify the layout, the SOP of secondary users with max- U 2 circumstances are given as
P U 1 _ s o p M 2 = P U 1 _ s o p
P U 2 _ s o p M 2 = 1 + k = 1 M n = 1 N M k 1 k σ 2 α 2 ω 2 π 1 τ n 2 λ E 2 N α 2 α 3 ν n 2 2 e B 3 P t 1 e Q λ P D P t + Γ 2 , Q P t B 4 + 1 λ P D λ P D Q B 4 + 1 λ P D 2
P U 3 _ s o p M 2 = P U 3 _ s o p
P o v e r a l l _ s o p M 2 = 1 3 P U 1 _ s o p M 2 + P U 2 _ s o p M 2 + P U 3 _ s o p M 2
where B 3 = σ 2 ν n 2 λ E P t α 2 α 3 ν n 2 + k σ 2 θ 2 ν n 2 + θ 2 1 λ U 1 P t α 2 α 3 θ 2 ν n 2 + θ 2 1 , B 4 = σ 2 ν n 2 λ E Q α 2 α 3 ν n 2 + k σ 2 θ 2 ν n 2 + θ 2 1 λ U 1 Q α 2 α 3 θ 2 ν n 2 + θ 2 1 .  
The proof is omitted since the deductions follow similar steps to max- U 1 .

4.1.3. max- U 3

Similar to max- U 1 and max- U 2 , the SOP of secondary users with max- U 3 circumstances can be obtained as:
P U 1 _ s o p M 3 = P U 1 _ s o p
P U 2 _ s o p M 3 = P U 2 _ s o p
P U 3 _ s o p M 3 = 1 + k = 1 M M k 1 k λ U 3 λ E k θ 3 + λ U 3 1 e Q λ P D P t e k σ 2 θ 3 1 λ U 3 α 3 P t λ U 3 α 3 Q e k σ 2 θ 3 1 λ U 3 α 3 Q + 1 λ P D Q P t λ P D k σ 2 θ 3 1 + λ U 3 α 3 Q
P o v e r a l l _ s o p M 3 = 1 3 P U 1 _ s o p M 3 + P U 2 _ s o p M 3 + P U 3 _ s o p M 3

4.2. The Space-Time Transmission Scheme

First, BS uses space-time coding [15] technology to encode the secondary user signal. All antennas of BS participate in signal coding and send the signal to the secondary users receiving node. To ensure the QoS of PD, the total transmit power of all antennas are limited to P s . To simplify the calculation, consider the equal power distribution method, and assume that the transmitting power of each antenna of BS is P s / M [16]. The CDF of γ G j S T ( G U , E , j = 1 , 2 , 3 ) and h P D S T 2 are expressed as
F γ G 1 ST x = 1 + k = 1 M M k 1 k e k M σ 2 x λ G 1 P s a 1 a 2 + a 3 x , x < a 1 a 2 + a 3 1 , x a 1 a 2 + a 3
F γ G 2 ST x = 1 + k = 1 M 1 k M k e k M σ 2 x λ G 2 P s a 2 a 3 x , x < a 2 a 3 1 , x a 2 a 3
F γ G 3 ST x = 1 + k = 1 M 1 k M k e k σ 2 x λ G 3 a 3 P s
F h P D 2 ST x = 1 + k = 1 M 1 k M k e k x λ P D
f γ G 1 ST x = k = 1 M 1 k M k k M 2 a 1 σ 2 λ G 1 P s a 1 a 2 + a 3 x 2 e k M σ 2 x λ G 1 P s a 1 a 2 + a 3 x , x < a 1 a 2 + a 3 0 , x a 1 a 2 + a 3
f γ G 2 ST x = k = 1 M M k 1 k + 1 k M 2 a 2 σ 2 λ G 2 P s a 2 a 3 x 2 e k M σ 2 x λ G 2 P s a 2 a 3 x , x < a 2 a 3 0 , x a 2 a 3
f γ G 3 ST x = k = 1 M 1 k M k k M 2 σ 2 λ G 3 a 3 P s e k M σ 2 x λ G 3 a 3 P s
f h P D 2 ST x = k = 1 M 1 k + 1 M k k λ P D e k x λ P D
Similar to the derivation of the SOP with MCC scheme, we can obtain Theorem 3.
Theorem 3.
The SOP of secondary users U 1 , U 2 and U 3 with ST scheme in the MISO-CR-NOMA network are expressed as
P U 1 _ s o p ST = 1 + k = 1 M s = 1 M l = 1 M n = 1 N M k M s M l 1 k + s + l × s σ 2 α 1 ω 1 π M 1 τ n 2 λ E 2 N α 1 α 2 + α 3 ν n 1 2 e C 1 P t 1 e l Q λ P D P t + Γ 2 , Q P t C 2 + l λ P D λ P D Q C 2 + l λ P D 2
P U 2 _ s o p ST = 1 + k = 1 M s = 1 M l = 1 M n = 1 N M k M s M l 1 k + s + l × s σ 2 α 2 ω 2 π M 1 τ n 2 λ E 2 N α 2 α 3 ν n 2 2 e C 3 P t 1 e l Q λ P D P t + Γ 2 , Q P t C 4 + l λ P D λ P D Q C 4 + l λ P D 2
P U 3 _ s o p ST = 1 + k = 1 M s = 1 M l = 1 M n = 1 N M k M s M l 1 k + s + l × s λ U 3 λ E k θ 3 + s λ U 3 1 e l Q λ P D P t e k σ 2 M θ 3 1 λ U 3 α 3 P t + l λ U 3 α 3 Q e k σ 2 M θ 3 1 λ U 3 α 3 Q + l λ P D Q P t λ P D k σ 2 M θ 3 1 + l λ U 3 α 3 Q
P o v e r a l l _ s o p ST = 1 3 P U 1 _ s o p ST + P U 2 _ s o p ST + P U 3 _ s o p ST
where C 1 = s σ 2 ν n 1 M λ E P t α 1 α 2 + α 3 ν n 1 + k σ 2 M θ 1 ν n 1 + θ 1 1 λ U 1 P t α 1 α 2 + α 3 θ 1 ν n 1 + θ 1 1 , C 2 = s σ 2 ν n 1 M λ E Q α 1 α 2 + α 3 ν n 1 + k σ 2 M θ 1 ν n 1 + θ 1 1 λ U 1 Q α 1 α 2 + α 3 θ 1 ν n 1 + θ 1 1 , C 3 = s σ 2 ν n 2 M λ E P t α 2 α 3 ν n 2 + k σ 2 M θ 2 ν n 2 + θ 2 1 λ U 1 P t α 2 α 3 θ 2 ν n 2 + θ 2 1 , C 4 = s σ 2 ν n 2 M λ E Q α 2 α 3 ν n 2 + k σ 2 M θ 2 ν n 2 + θ 2 1 λ U 1 Q α 2 α 3 θ 2 ν n 2 + θ 2 1 .

5. Asymptotic Secrecy Outage Performance Analysis

Due to the complexity of the aforementioned secondary user’s SOP expression, it is difficult to find the relationship between SOP and system parameters intuitively. Next, we analyze the asymptotic SOP performance of secondary users and discuss the relationship between SOP and system parameters.
We assume P t Q , hence the transmit power of the BS depends on the QoS constraints of the PD. With some simple algebraic manipulations and observation, we can easily obtain the exact asymptotic SOP expression of the secondary users.

5.1. SISO-CR-NOMA Network

The asymptotic SOP of secondary users with the single-antenna network are as follows:
P U 1 _ s o p ASYM = 1 σ 2 α 1 ω 1 π λ E 2 N λ P D Q n = 1 N 1 τ n 2 α 1 α 2 + α 3 ν n 1 2 A 2 + 1 λ P D 2
P U 2 _ s o p ASYM = 1 σ 2 α 2 ω 2 π λ E 2 N λ P D Q n = 1 N 1 τ n 2 α 2 α 3 ν n 2 2 A 4 + 1 λ P D 2
P U 3 _ s o p ASYM = 1 λ U 3 2 α 3 Q λ E θ 3 + λ U 3 λ P D σ 2 θ 3 1 + λ U 3 α 3 Q
Proof. 
Please see Appendix C.    □

5.2. MISO-CR-NOMA Network

Similar to the derivation process of SOP in the SISO-CR-NOMA network, we can easily obtain the SOP for multiple-antenna networks.

5.2.1. MCC Scheme

The asymptotic SOP of secondary users with max- U 1 are as follows:
P U 1 _ s o p M 1 _ ASYM = 1 + σ 2 α 1 ω 1 π λ E 2 N λ P D Q k = 1 M n = 1 N M k 1 k 1 τ n 2 α 1 α 2 + α 3 ν n 1 2 B 2 + 1 λ P D 2
P U 2 _ s o p M 1 _ ASYM = P U 2 _ s o p ASYM
P U 3 _ s o p M 1 _ ASYM = P U 3 _ s o p ASYM
The asymptotic SOP of secondary users with max- U 2 are as follows:
P U 1 _ s o p M 2 _ ASYM = P U 1 _ s o p ASYM
P U 2 _ s o p M 2 _ ASYM = 1 + σ 2 α 2 ω 2 π λ E 2 N λ P D Q k = 1 M n = 1 N M k 1 k 1 τ n 2 α 2 α 3 ν n 2 2 B 4 + 1 λ P D 2
P U 3 _ s o p M 2 _ ASYM = P U 3 _ s o p ASYM
The asymptotic SOP of secondary users with max- U 3 are as follows:
P U 1 _ s o p M 3 _ ASYM = P U 1 _ s o p ASYM
P U 2 _ s o p M 3 _ ASYM = P U 2 _ s o p ASYM
P U 3 _ s o p M 3 _ ASYM = 1 + k = 1 M M k 1 k λ U 3 2 α 3 Q λ E k θ 3 + λ U 3 λ P D k σ 2 θ 3 1 + λ U 3 α 3 Q

5.2.2. ST Scheme

The asymptotic SOP of secondary users with the ST scheme are as follows:
P U 1 _ s o p ST _ ASYM = 1 + σ 2 α 1 M ω 1 π λ E 2 N λ P D Q k = 1 M s = 1 M l = 1 M n = 1 N M k M s M l 1 k + s + l s 1 τ n 2 α 1 α 2 + α 3 ν n 1 2 C 2 + l λ P D 2
P U 2 _ s o p ST _ ASYM = 1 + σ 2 α 2 M ω 2 π λ E 2 N λ P D Q k = 1 M s = 1 M l = 1 M n = 1 N M k M s M l 1 k + s + l s 1 τ n 2 α 2 α 3 ν n 2 2 C 4 + l λ P D 2
P U 3 _ s o p ST _ ASYM = 1 + k = 1 M s = 1 M l = 1 M M k M s M l 1 k + s + l s λ U 3 2 α 3 Q λ E k θ 3 + λ U 3 λ P D k σ 2 M θ 3 1 + l λ U 3 α 3 Q
By observing the above expressions, we can reach a useful understanding as follows:
Remark 1.
As P t increases, the SOP of the secondary users is finally constant because the QoS of the PD limits the maximum transmit power. From (3), we can obtain the current transmission power of BS as P s = Q / h P D 2 .
Remark 2.
Equations (51), (56) and (59)–(62) are monotonic decreasing functions about M. Therefore, increasing the number of antennas in the MISO-CR-NOMA network can improve the secrecy outage performance of all secondary users in the ST scheme, but benefits only one of the secondary users in the MCC scheme.
Combining Remarks 1 and 2, in the next section, we find the minimum overall SOP in the CR-NOMA network by optimizing the power allocation coefficient to maximize the advantages of the TAS schemes.

6. Power Optimization with SA Algorithm

Common optimization algorithms in CR-NOMA networks include golden search, simulated annealing (SA), and gradient descent. Compared with previous algorithms, the SA algorithm has the advantages of simple description and high running efficiency. Thus, we consider the SA algorithm to solve the minimum overall SOP of secondary network problems based on the maximum BS transmit power under QoS constraints.
We formulate this optimization problem as follows:
min α 1 , α 2 , α 3 P o v e r a l l _ s o p Θ _ ASYM , s . t . C 1 : α j + 1 > α j , C 2 : j = 1 3 α j = 1 , C 3 : 0 < α j < 1 , C 4 : j 1 , 2 , 3 , Θ M 1 , M 2 , M 3 , ST .
where constraint condition C1 is the power coefficient requirements of SIC technology, and constraint conditions C2 and C3 represent the total power constraints allocated by the BS to the superimposed signal.
Since the objective function given in is highly non-linear, and this optimization problem contains the equality constraints, we transform the constraints C1 and C2 into a penalty function and then construct a new objective function. The new optimization problem is given as
min α 1 , α 2 , α 3 Θ , s . t . C 3 : 0 < α j < 1 , C 4 : j 1 , 2 , 3 , Θ M 1 , M 2 , M 3 , ST .
where Θ , j = P o v e r a l l _ s o p Θ _ ASYM m k P α j , m k represents penalty coefficient, P α j = max 0 , α j + 1 α j 2 + j = 1 3 α j 2 represents external penalty function. Then, we can use the SA algorithm (shown as Algorithm 1) for solving (64).
Algorithm 1 The SA Algorithm to solve (64).
Input:
  • Initial value α j ( 0 ) ;
  • initial temperature T 0 and target temperature T 1 : T = T 0 , T 1 ;
  • cooling coefficient ε : 0 < ε < 1 ;
Iteration:
1:
while T 0 T 1 do
2:
   for  i = 1 : i max  do
3:
     Compute ( i 1 ) Θ , j ;
4:
     Obtain a new set of values for α j ( i ) by making random adjustments, and then compute the corresponding value of ( i ) ;
5:
     Compute Δ = ( i ) ( i 1 ) ;
6:
     if  Δ < 0  then
7:
        Update α j ( i 1 ) = α j ( i ) with the probability of e Δ T ;
8:
     else
9:
        Update α j ( i 1 ) = α j ( i ) ;
11:
     end if
12:
   end for
13:
   Set T = ε T 0 ;
14:
end whilereturn α j ( i 1 )
In the upcoming section, we will conduct a simulation verification and analyze the SA algorithm’s superiority in terms of convergence speed.

7. Simulation Results

This section simulates the above-mentioned theoretical derivation and algorithm, then uses the theoretical curve and simulation results to analyze the influence of system parameters on the secrecy outage performance index. We use 10 8 samples per Monte Carlo simulation to ensure sufficient statistical confidence. Unless otherwise specified, we set the power coefficient α 1 = 0.6, α 2 = 0.3, α 3 = 0.1, numbers of BS transmit antenna M = 4 , distance between receiving nodes of secondary users, primary users and eavesdropper and BS d U 1 = 300 m , d U 2 = 200 m , d U 3 = 100 m , d P D = 100 m , d E = 700 m , the reference distance d 0 = 1 m , the path-loss constant L = 1, the path-loss exponent κ = 3.3 , interference temperature Q = −10 dBm , total noise power σ 2 = 0.001 w , and secondary users secrecy communication rate R 1 s = R 2 s = R 3 s = 0.5 bps / Hz . For brevity, “M1”, “M2” and “M3” mean “max- U 1 ”, “max- U 2 ” and “max- U 3 ”, “Ana” means “Analysis”, “Sim” means “Simulation” and “Asym” means “Asymptotic analysis” in all figures.

7.1. Validation of Analysis and Performance Comparison

In Figure 2, we compare the secrecy outage performance of three secondary users with various TAS schemes, numbers of antennas, and secrecy communication rates in the CR-NOMA network. The analytical results are based on Section 3 and Section 4, and the asymptotic results are based on Section 5. From Figure 2, we can obtain the following views: (1) The results of the theoretical analysis and Monte Carlo simulation are very consistent, which verifies the correctness of theoretical analysis. (2) With the ST and MCC schemes for all secondary users in Figure 2d,e, we increase the secrecy communication rate of each secondary user, i.e., R 1 s , R 2 s , R 3 s , the overall SOP of the secondary network will increase, and the secrecy outage performance will deteriorate. This is due to the fact that when the R 1 s , R 2 s , and R 3 s increase, the outage threshold of U 1 , U 2 , and U 3 also increase correspondingly. (3) For the overall SOP of the secondary network, the max- U 1 of the MCC scheme is far superior to other schemes. The intuitive reason is that in the signal transmission process, U 1 is the farthest user, and its SOP is relatively high, which greatly impacts the overall SOP. (4) When the BS is equipped with multiple-antenna, the secrecy outage performance of secondary users is significantly better than that of the SISO-CR-NOMA network.
In Figure 3, we compare the SOP of the MCC and ST schemes in different interference temperatures. From Figure 3a,b, as can be seen, with the increase of P t , the SOPs of U 1 and U 2 present a curve trend that first decreases, then increases. It can be explained by features of SIC technology and QoS constraints of PD. As with Formulas (4), (5) and (7), when signal x 2 is used as interference, U 1 uses SIC to decode its own signal. With the increase of P t to a certain value, the influence of P t on user channel capacity begins to exceed other parameters such as the power distribution coefficient and channel gain, so the interference effect of x 2 becomes stronger, the user channel capacity and eavesdropping channel capacity decrease synchronously, the security capacity decreases, the SOP increases, and the secrecy performance drops sharply. Meanwhile, with the increase of P t , SOP is finally constant. This result verifies the correctness of Section 5. Because the transmission power of BS is constrained by the QoS of PD. By comparing Figure 2d and Figure 3d, we found that reducing Q can reduce the interference between signals simultaneously, improving the network’s secrecy outage performance.

7.2. Insights on Optimal Solution

In Figure 4, we study the relationship between the power allocation coefficient and SOP of secondary users with various TAS schemes in P t = 20 dBm and P t = 30 dBm . From Figure 4, as α 1 continues to increase, overall SOP presents a trend of first decreasing and then increasing in the MCC and ST schemes. Table 1 provides the optimal transmit allocation coefficient found by the SA algorithm to minimize the overall SOP with different P t . We set the initial temperature T 0 = 100 , the final temperature T 1 = 1 , the cooling coefficient ε = 0.99 , and the inner loop has 200 samples to iterate at the same time. This setting is conducive to finding more accurate results, but the iteration time will be slightly longer. Interestingly, different P t correspond to different optimal power allocation factors. This is because P t affects signal and interference strength, resulting in a non-linear change in SINR. Combined with the analysis of Table 1 and Figure 4, the SA algorithm we proposed to find the optimal power parameters is reasonable and correct.
For more valuable insights, we compared the overall SOP of the system for fixed power allocation and optimal power allocation with P t = 20 dBm , as Table 2. We found that the secrecy outage performances of max- U 1 and max- U 2 of the MCC scheme are better, and the SOPs of max- U 3 in the MCC and ST scheme are higher in the fixed power allocation, which is not conducive to secrecy communication. The overall secrecy outage performance with different TAS schemes obtained after optimization based on the SA algorithm has relatively improved, and the optimization effect of the ST scheme is the best.
Figure 5 shows the convergence rate of the overall SOP of the secondary network optimized by the SA algorithm for different TAS schemes. We observe that the MCC scheme converges faster than the ST scheme, among which max- U 1 is the fastest.

8. Conclusions

In this paper, the secrecy outage performance of the multi-antenna three secondary users CR-NOMA network is studied, and the exact closed-form SOP expressions of secondary users with a single-antenna scheme, MCC scheme, and ST scheme are derived, respectively. Then, the asymptotic performance of SOP is analyzed, and the relationship between system parameters and secondary user secrecy outage performance is obtained. Finally, an SA optimization algorithm is proposed, and the optimal power allocation coefficient and secrecy outage probability of each TAS scheme are obtained. The simulation results verify the correctness of the theoretical analysis and obtain some valuable conclusions. The results of our work prove that the security advantages of using the MCC scheme and ST scheme to prevent eavesdropping will be beneficial to the design of practical CR-NOMA systems with TAS. The secondary users with multiple-antenna are considered in our future work, and the secrecy outage performance of multiple-user is further studied.

Author Contributions

Conceptualization, J.J.; methodology, S.L.; software, S.L.; validation, S.L.; data curation, S.L.; writing—original draft preparation, S.L.; writing—review and editing, S.L. and J.J.; supervision, S.L. and J.J.; project administration, S.L. and J.J.; funding acquisition, S.L. and J.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (no. 61650103), the Natural Science Foundation of Guangxi (no. 2018GXNSFAA281161).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CRCognitive radio
OMAOrthogonal multiple access
NOMANon-orthogonal multiple access
MISOMultiple-input single-output
SISOSingle-input single-output
BSBase station
TASTransmit antenna selection
STSpace-time transmission
MCCMaximum channel capacity
SASimulated-annealing
SOPSecrecy outage probability
CDFCumulative distribution function
PDFProbability density function
PLSPhysical layer security
QoSQuality-of-service
PAPower allocation
CSIChannel state information
SINRSignal-to-noise-plus-interference ratio
SNRSignal-to-noise ratio
AWGNAdditive white Gaussian noise

Appendix A. Proof of Theorem 1

The derivation method of SOP for U 1 and U 2 is the same, and we present the SOP calculation steps for U 2 and U 3 here.
P U 2 _ s o p R 2 s = Pr C s 2 R 2 s = Pr log 2 1 + γ γ U 2 log 2 1 + γ γ E 2 R 2 s = ω α 2 α 3 f γ E 2 x d x + 0 ω F γ U 2 θ 2 x + θ 2 1 f γ E 2 x d x = k = 0 M 1 k M k λ U 2 λ E k θ 2 + λ U 2 1 e Q λ P D P s e k σ 2 θ 2 1 λ U 2 α 3 P s
Using Gaussian–Chebyshev quadrature, (A1) can be approximated as follows:
P U 2 _ s o p R 2 s = 1 n = 1 N σ 2 α 2 ω π 1 τ n 2 α 2 α 3 ν n 2 λ E P s 2 N e σ 2 ν n λ E P s α 2 α 3 ν n + σ 2 θ 2 ν n + θ 2 1 λ U 2 P s α 2 α 3 θ 2 ν n + θ 2 1
P U 3 _ s o p R 3 s = Pr C s 3 R 3 s = Pr log 2 1 + γ γ U 3 log 2 1 + γ γ E 3 R 3 s = ω α 2 α 3 f γ E 3 x d x + 0 ω F γ U 3 θ 3 x + θ 3 1 f γ E 3 x d x = k = 0 M 1 k M k λ U 3 λ E k θ 3 + λ U 3 1 e Q λ P D P s e k σ 2 θ 3 1 λ U 3 α 3 P s
According to BS transmit power P s = min P t , Q / h P D 2 , the SOP of U 1 , U 2 and U 3 in Formulas (19) and (20) can be obtained after calculating the statistical average of the interfering channel gain variable h P D 2 in Formula (17).

Appendix B. Proof of (21)

Drawing upon the pertinent tenets of probability theory, it can be inferred that:
P o v e r a l l _ s o p = Pr U 1 outage or U 2 outage or U 3 outage = Pr U 1 outage , E eavesdrops U 1 + Pr U 2 outage , E eavesdrops U 2 + Pr U 3 outage , E eavesdrops U 3 = Pr U 1 outage | when E eavesdrops U 1 Pr E eavesdrops U 1 = Pr U 2 outage | when E eavesdrops U 2 Pr E eavesdrops U 2 = Pr U 3 outage | when E eavesdrops U 3 Pr E eavesdrops U 3 = P U 1 _ s o p × Pr E eavesdrops U 1 + P U 2 _ s o p × Pr E eavesdrops U 2 + P U 3 _ s o p × Pr E eavesdrops U 3 = 1 3 P U 1 _ s o p + P U 2 _ s o p + P U 3 _ s o p

Appendix C. Proof of asymptotic SOP (48)

When x 0 , the incomplete gamma function has the following properties: Γ s , x = Γ s , Re ( s ) > 0 . Therefore, when the peak transmission power of BS P t Q , we have Γ 2 , Q P t A 2 + 1 λ P D = Γ 2 , and the upper limit of the integration for the statistical average of the interference channel gain variable h P D 2 approaches positive infinity, i.e., 1 e Q λ P D P t = 0 . Simplifying according to the above two steps, the SOP of U 1 can be simplified as (48). Similarly, we can easily derive asymptotic SOP expressions for other users.

References

  1. Dai, L.; Wang, B.; Ding, Z.; Wang, Z.; Chen, S.; Hanzo, L. A survey of non-orthogonal multiple access for 5G. IEEE Commun. Surv. Tutor. 2018, 20, 2294–2323. [Google Scholar] [CrossRef]
  2. Hassan, M.; Singh, M.; Hamid, K.; Saeed, R.; Abdelhaq, M.; Alsaqour, R.; Odeh, N. Enhancing NOMA’s Spectrum Efficiency in a 5G Network through Cooperative Spectrum Sharing. Electronics 2023, 12, 815. [Google Scholar] [CrossRef]
  3. Zhang, Y.; Liu, J.; Peng, Y.; Dong, Y.; Zhao, C. Performance analysis of intelligent CR-NOMA model for industrial IoT communications. CMES Comput. Model. Eng. Sci. 2020, 125, 239–257. [Google Scholar] [CrossRef]
  4. Ghous, M.; Abbas, Z.H.; Hassan, A.K.; Abbas, G.; Baker, T.; Al-Jumeily, D. Performance analysis and beamforming design of a secure cooperative MISO-NOMA network. Sensors 2021, 21, 4180. [Google Scholar] [CrossRef]
  5. Singh, S.; Bansal, M. On the outage performance of overlay cognitive STBC-NOMA system with imperfect SIC. IEEE Wirel. Commun. Lett. 2021, 10, 2587–2591. [Google Scholar] [CrossRef]
  6. Luo, L.; Li, Q.; Cheng, J. Performance analysis of overlay cognitive NOMA systems with imperfect successive interference cancellation. IEEE Trans. Commun. 2020, 68, 4709–4722. [Google Scholar] [CrossRef]
  7. Kumar, V.; Ding, Z.; Flanagan, M.F. On the performance of downlink NOMA in underlay spectrum sharing. IEEE Trans. Veh. Technol. 2021, 70, 4523–4540. [Google Scholar] [CrossRef]
  8. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.K.; Gao, X. A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef]
  9. Tefera, M.K.; Jin, Z.; Zhang, S. A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security. Sensors 2022, 22, 3589. [Google Scholar] [CrossRef] [PubMed]
  10. Xiang, Z.; Yang, W.; Cai, Y.; Ding, Z.; Song, Y. Secure transmission design in HARQ assisted cognitive NOMA networks. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2528–2541. [Google Scholar] [CrossRef]
  11. Ahmad, N.; Sidhu, G.A.S.; Khan, W.U. A Learning Based Framework for Enhancing Physical Layer Security in Cooperative D2D Network. Electronics 2022, 11, 3981. [Google Scholar] [CrossRef]
  12. Nandan, N.; Majhi, S.; Wu, H.C. Secure beamforming for MIMO-NOMA-based cognitive radio network. IEEE Commun. Lett. 2018, 22, 1708–1711. [Google Scholar] [CrossRef]
  13. Nguyen, H.N.; Nguyen, N.L.; Nguyen, N.T.; Le, A.T.; Ha, N.D.X.; Do, D.T.; Voznak, M. Reliable and secure transmission in multiple antennas hybrid satellite-terrestrial cognitive networks relying on NOMA. IEEE Access. 2020, 8, 215044–215056. [Google Scholar] [CrossRef]
  14. Zhao, F.; Hao, W.; Guo, H.; Sun, G.; Wang, Y.; Zhang, H. Secure Energy Efficiency for mmWave-NOMA Cognitive Satellite Terrestrial Network. IEEE Commun. Lett. 2022, 27, 283–287. [Google Scholar] [CrossRef]
  15. Zhu, J.; Zou, Y.; Wang, G.; Yao, Y.D.; Karagiannidis, G.K. On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping. IEEE Trans. Veh. Technol. 2015, 65, 214–225. [Google Scholar] [CrossRef]
  16. Lei, H.; Zhang, J.; Park, K.H.; Xu, P.; Ansari, I.S.; Pan, G.; Alomair, B.; Alouini, M.S. On secure NOMA systems with transmit antenna selection schemes. IEEE Access 2017, 5, 17450–17464. [Google Scholar] [CrossRef]
  17. Pei, X.; Yu, H.; Wen, M.; Li, Q.; Ding, Z. Secure outage analysis for cooperative NOMA systems with antenna selection. IEEE Trans. Veh. Technol. 2020, 69, 4503–4507. [Google Scholar] [CrossRef]
  18. Shim, K.; Do, T.N.; Nguyen, T.V.; da Costa, D.B.; An, B. Enhancing PHY-security of FD-enabled NOMA systems using jamming and user selection: Performance analysis and DNN evaluation. IEEE Internet Things J. 2021, 8, 17476–17494. [Google Scholar] [CrossRef]
  19. Zhang, Y.; Wang, H.M.; Yang, Q.; Ding, Z. Secrecy sum rate maximization in non-orthogonal multiple access. IEEE Commun. Lett. 2016, 20, 930–933. [Google Scholar] [CrossRef]
  20. Wei, L.; Jing, T.; Fan, X.; Wen, Y.; Huo, Y. The secrecy analysis over physical layer in NOMA-enabled cognitive radio networks. In Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018. [Google Scholar]
  21. Tran, H.; Dang, V.H.; Niyato, D.; Cuong, D.N.; Luong, N.C.; So-In, C. Outage Probability Minimization in Secure NOMA Cognitive Radio Systems with UAV Relay: A Machine Learning Approach. IEEE Trans. Cogn. Commun. Netw. 2022, 9, 82–98. [Google Scholar]
  22. Auyo, A.M.; Babale, S.A.; Bello, L.M. Effect of Inspired CR-NOMA Power Allocation on Bit Error Rate For Three User NOMA system. In Proceedings of the 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON), Lagos, Nigeria, 17–19 May 2022. [Google Scholar]
  23. Fang, Z.; Hu, J.; Lu, Y.; Ni, W. Three-user cooperative NOMA transmission. IEEE Wirel. Commun. Lett. 2019, 9, 465–469. [Google Scholar] [CrossRef]
  24. Do, T.N.; da Costa, D.B.; Duong, T.Q.; An, B. Improving the performance of cell-edge users in NOMA systems using cooperative relaying. IEEE Trans. Commun. 2018, 66, 1883–1901. [Google Scholar] [CrossRef]
  25. Arzykulov, S.; Tsiftsis, T.A.; Nauryzbayev, G.; Abdallah, M. Outage performance of cooperative underlay CR-NOMA with imperfect CSI. IEEE Commun. Lett. 2018, 23, 176–179. [Google Scholar] [CrossRef]
  26. Xiang, Z.; Yang, W.; Pan, G.; Cai, Y.; Song, Y. Physical layer security in cognitive radio inspired NOMA network. IEEE J. Sel. Top. Signal Process. 2019, 13, 700–714. [Google Scholar] [CrossRef]
  27. Song, Y.; Yang, W.; Xiang, Z.; Wang, H.; Cao, F. Research on cognitive power allocation for secure millimeter-wave NOMA networks. IEEE Trans. Veh. Technol. 2020, 69, 13424–13436. [Google Scholar] [CrossRef]
Figure 1. Network model.
Figure 1. Network model.
Electronics 12 01896 g001
Figure 2. The secrecy outage performance of secondary users with various TAS schemes, numbers of antennas, and secrecy communication rates. (a) SOP of U 1 ; (b) SOP of U 2 ; (c) SOP of U 3 ; (d,e) overall SOP with different secrecy communication rates.
Figure 2. The secrecy outage performance of secondary users with various TAS schemes, numbers of antennas, and secrecy communication rates. (a) SOP of U 1 ; (b) SOP of U 2 ; (c) SOP of U 3 ; (d,e) overall SOP with different secrecy communication rates.
Electronics 12 01896 g002aElectronics 12 01896 g002b
Figure 3. The secrecy outage performance of secondary users with various TAS schemes and interference temperature. (a) SOP of U 1 ; (b) SOP of U 2 ; (c) SOP of U 3 ; and (d) overall SOP.
Figure 3. The secrecy outage performance of secondary users with various TAS schemes and interference temperature. (a) SOP of U 1 ; (b) SOP of U 2 ; (c) SOP of U 3 ; and (d) overall SOP.
Electronics 12 01896 g003aElectronics 12 01896 g003b
Figure 4. The SOPs of secondary users with various TAS schemes based on SA algorithm. (a) Overall SOP with max U 1 of MCC scheme; (b) overall SOP with max U 2 of MCC scheme; (c) overall SOP with max U 3 of MCC scheme; and (d) overall SOP with ST scheme.
Figure 4. The SOPs of secondary users with various TAS schemes based on SA algorithm. (a) Overall SOP with max U 1 of MCC scheme; (b) overall SOP with max U 2 of MCC scheme; (c) overall SOP with max U 3 of MCC scheme; and (d) overall SOP with ST scheme.
Electronics 12 01896 g004aElectronics 12 01896 g004b
Figure 5. Iterative convergence rate of SA algorithm.
Figure 5. Iterative convergence rate of SA algorithm.
Electronics 12 01896 g005
Table 1. Optimal power allocation coefficients for different TAS schemes with different P t (in dBm).
Table 1. Optimal power allocation coefficients for different TAS schemes with different P t (in dBm).
P t α 1 α 2 α 3
M1 of MCC200.65950.26190.0786
scheme300.64190.29370.0647
M2 of MCC200.64010.26100.0989
scheme300.83080.10370.0655
M3 of MCC200.63750.32520.0373
scheme300.77070.21860.0107
ST200.50070.49900.0003
scheme300.78850.21140.0001
Table 2. Comparison of optimized secrecy outage performance.
Table 2. Comparison of optimized secrecy outage performance.
M 1 M 2 M 3 ST
SOP with fixed power allocation0.34600.33420.42570.5915
SOP with optimal power allocation0.33600.33070.39830.3463
optimization percentage2.9%1%6.4%41.4%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lv, S.; Ji, J. Secrecy Outage Performance and Power Allocation for Three Secondary Users CR-NOMA Networks with Transmit Antenna Selection. Electronics 2023, 12, 1896. https://doi.org/10.3390/electronics12081896

AMA Style

Lv S, Ji J. Secrecy Outage Performance and Power Allocation for Three Secondary Users CR-NOMA Networks with Transmit Antenna Selection. Electronics. 2023; 12(8):1896. https://doi.org/10.3390/electronics12081896

Chicago/Turabian Style

Lv, Shuo, and Jianbo Ji. 2023. "Secrecy Outage Performance and Power Allocation for Three Secondary Users CR-NOMA Networks with Transmit Antenna Selection" Electronics 12, no. 8: 1896. https://doi.org/10.3390/electronics12081896

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop