dc.contributor.author | Vo, Van Nhan | |
dc.contributor.author | Dang, Viet-Hung | |
dc.contributor.author | Tran, Hung | |
dc.contributor.author | Ha, Dac-Binh | |
dc.contributor.author | Le, Cong | |
dc.contributor.author | Ho, Tu Dac | |
dc.contributor.author | So-In, Chakchai | |
dc.date.accessioned | 2023-04-13T09:15:44Z | |
dc.date.available | 2023-04-13T09:15:44Z | |
dc.date.issued | 2023-03-31 | |
dc.description.abstract | Recently, the combination of cognitive radio networks with the nonorthogonal multiple
access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also
supporting large numbers of wireless communication connections. However, cognitive NOMA networks
are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome
this drawback, many techniques have been proposed, such as optimal power allocation and interference
cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able
to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by
using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power
allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security
constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station
and the leakage probability for the eavesdropper are obtained with imperfect channel state information.
Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance.
Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN)
and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput
of the secondary network. These optimization algorithms guarantee not only the performance of the primary
users but also the security constraints of the secondary users. Finally, simulations are presented to validate
our research results and provide insights into how various factors affect system performance. | en_US |
dc.identifier.citation | Vo, Dang, Tran, Ha, Le, Ho, So-In. Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints. IEEE Access. 2023 | en_US |
dc.identifier.cristinID | FRIDAID 2139011 | |
dc.identifier.doi | 10.1109/ACCESS.2023.3263579 | |
dc.identifier.issn | 2169-3536 | |
dc.identifier.uri | https://hdl.handle.net/10037/28973 | |
dc.language.iso | eng | en_US |
dc.publisher | IEEE | en_US |
dc.relation.journal | IEEE Access | |
dc.rights.accessRights | openAccess | en_US |
dc.rights.holder | Copyright 2023 The Author(s) | en_US |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0 | en_US |
dc.rights | Attribution 4.0 International (CC BY 4.0) | en_US |
dc.title | Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints | en_US |
dc.type.version | publishedVersion | en_US |
dc.type | Journal article | en_US |
dc.type | Tidsskriftartikkel | en_US |
dc.type | Peer reviewed | en_US |