scholarly journals Robust Secure Beamforming Design for Cooperative Cognitive Radio Nonorthogonal Multiple Access Networks

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Quanzhong Li ◽  
Sai Zhao

By the integration of cooperative cognitive radio (CR) and nonorthogonal multiple access (NOMA), cooperative CR NOMA networks can improve the spectrum efficiency of wireless networks significantly. Due to the openness and exposure of wireless signals, secure communication is an important issue for cooperative CR NOMA networks. In this paper, we investigate the physical layer security design for cooperative CR NOMA networks. Our objective is to achieve maximum secrecy rate of the secondary user by designing optimal beamformers and artificial noise covariance matrix at the multiantenna secondary transmitter under the quality-of-service at the primary user and the transmit power constraint at the secondary transmitter. We consider the practical case that the channel state information (CSI) of the eavesdropper is imperfect, and we model the imperfect CSI by the worst-case model. We show that the robust secrecy rate maximization problem can be transformed to a series of semidefinite programmings based on S-procedure and rank-one relaxation. We also propose an effective method to recover the optimal rank-one solution. Simulations are provided to show the effectiveness of our proposed robust secure algorithm with comparison to the nonrobust secure design and traditional orthogonal multiple access schemes.

Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1948
Author(s):  
Carla E. Garcia ◽  
Mario R. Camana ◽  
Insoo Koo

The integration of non-orthogonal multiple access (NOMA) in cognitive radio (CR) networks has demonstrated how to enhance spectrum efficiency and achieve massive connectivity for future mobile networks. However, security is still a challenging issue due to the wireless transmission environment and the broadcast nature of NOMA. Thus, in this paper, we investigate a beamforming design with artificial noise (AN) to improve the security of a multi-user downlink, multiple-input single-output (MISO) NOMA-CR network with simultaneous wireless information and power transfer (SWIPT). To further support power-limited, battery-driven devices, energy-harvesting (EH) users are involved in the proposed network. Specifically, we investigate the optimal AN, power-splitting ratios, and transmission beamforming vectors for secondary users and EH users in order to minimize the transmission power of the secondary network, subject to the following constraints: a minimum signal-to-interference-plus-noise ratio at the secondary users, minimum harvested energy by secondary users and EH users, maximum power at the secondary transmitter, and maximum permissible interference with licensed users. The proposed solution for the challenging non-convex optimization problem is based on the semidefinite relaxation method. Numerical results show that the proposed scheme outperforms the conventional scheme without AN, the zero-forcing-based scheme and the space-division multiple-access-based method.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Lei Ni ◽  
Xinyu Da ◽  
Hang Hu ◽  
Miao Zhang

In this work, we investigate the secrecy energy efficiency (SEE) optimization problem for a multiple-input single-output (MISO) cognitive radio (CR) network based on a practical nonlinear energy-harvesting (EH) model. In particular, the energy receiver (ER) is assumed to be a potential eavesdropper due to the open architecture of a CR network with simultaneous wireless information and power transfer (SWIPT), such that the confidential message is prone to be intercepted in wireless communications. The aim of this work is to provide a secure transmit beamforming design while satisfying the minimum secrecy rate target, the minimum EH requirement, and the maximum interference leakage power to primary user (PU). In addition, we consider that all the channel state information (CSI) is perfectly known at the secondary transmitter (ST). We formulate this beamforming design as a SEE maximization problem; however, the original optimization problem is not convex due to the nonlinear fractional objective function. To solve it, a novel iterative algorithm is proposed to obtain the globally optimal solution of the primal problem by using the nonlinear fractional programming and sequential programming. Finally, numerical simulation results are presented to validate the performance of the proposed scheme.


2020 ◽  
Vol 7 (4) ◽  
pp. 659-666
Author(s):  
H.T. Madan ◽  
Prabhugoud I. Basarkod

Non orthogonal multiple access (NOMA) in cognitive radio (CR) network has been recognized as potential solution to support the simultaneous transmission of both primary and secondary users. In addition, CR-NOMA can also be used to serve multiple secondary networks in overlay cognitive radio networks. The aim of our work is to increase the secondary user’s throughput without compromising in QoS requirements of the primary users. Our presented work analyses the performance of power domain NOMA in cognitive radio networks for both uplink and downlink scenarios. The primary aspect of the work is to investigate the impact of power allocation on spectrum efficiency and fairness performance of CR-NOMA. Objective function is to maximize the overall throughput under the QOS constraints of the users. We have derived closed form expressions for optimized power allocation coefficient(α) for CR-NOMA uplink and downlink communications. Parameters causing the channel outage, have been examined and conditions for outage probability is derived for CR-NOMA communication. Finally, we have presented the simulation results to validate the mathematical models that are developed for power allocation coefficient and outage probability.


2021 ◽  
Author(s):  
Milad Tatar Mamaghani ◽  
Yi Hong

This paper investigates an average secrecy rate (ASR) maximization problem for an unmanned aerial vehicle (UAV) enabled wireless communication system, wherein a UAV is employed to deliver confidential information to a ground destination in the presence of a terrestrial passive eavesdropper. By employing an artificial noise (AN) injection based secure two-phase transmission protocol, we aim at jointly optimizing the UAV’s trajectory, network transmission power, and AN power allocation over a given time horizon to enhance the ASR performance. Specifically, we divide the original non-convex problem into four subproblems, and propose a successive convex approximation based efficient iterative algorithm to solve it suboptimally with guaranteed convergence. Simulation results demonstrate significant security advantages of our designed scheme over other known benchmarks, particularly for stringent flight durations.


2021 ◽  
Author(s):  
Milad Tatar Mamaghani ◽  
Yi Hong

This paper investigates an average secrecy rate (ASR) maximization problem for an unmanned aerial vehicle (UAV) enabled wireless communication system, wherein a UAV is employed to deliver confidential information to a ground destination in the presence of a terrestrial passive eavesdropper. By employing an artificial noise (AN) injection based secure two-phase transmission protocol, we aim at jointly optimizing the UAV’s trajectory, network transmission power, and AN power allocation over a given time horizon to enhance the ASR performance. Specifically, we divide the original non-convex problem into four subproblems, and propose a successive convex approximation based efficient iterative algorithm to solve it suboptimally with guaranteed convergence. Simulation results demonstrate significant security advantages of our designed scheme over other known benchmarks, particularly for stringent flight durations.


Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4440 ◽  
Author(s):  
Hanming Sun ◽  
Bin Duo ◽  
Zhengqiang Wang ◽  
Xiaochen Lin ◽  
Changchun Gao

To improve the secrecy performance of cellular-enabled unmanned aerial vehicle (UAV) communication networks, this paper proposes an aerial cooperative jamming scheme and studies its optimal design to achieve the maximum average secrecy rate. Specifically, a base station (BS) transmits confidential messages to a UAV and meanwhile another UAV performs the role of an aerial jammer by cooperatively sending jamming signals to oppose multiple suspicious eavesdroppers on the ground. As the UAVs have the advantage of the controllable mobility, the objective is to maximize the worst-case average secrecy rate by the joint optimization of the two UAVs’ trajectories and the BS’s/UAV jammer’s transmit/jamming power over a given mission period. The objective function of the formulated problem is highly non-linear regarding the optimization variables and the problem has non-convex constraints, which is, in general, difficult to achieve a globally optimal solution. Thus, we divide the original problem into four subproblems and then solve them by applying the successive convex approximation (SCA) and block coordinate descent (BCD) methods. Numerical results demonstrate that the significantly better secrecy performance can be obtained by using the proposed algorithm in comparison with benchmark schemes.


2021 ◽  
Vol 13 (21) ◽  
pp. 4286
Author(s):  
Dawei Wang ◽  
Yang Zhao ◽  
Yixin He ◽  
Xiao Tang ◽  
Lixin Li ◽  
...  

Unmanned aerial vehicle (UAV) and reconfigurable intelligent surface (RIS) methods are promising techniques for improving the energy and spectrum efficiency of Fifth Generation/Beyond Fifth Generation (5G/B5G) networks. In order to take advantage of both techniques, we propose an RIS-assisted UAV secure communication scheme, where an UAV is equipped with RIS to facilitate secure transmission. To maximize the average secrecy rate, we jointly optimize the beamforming power, reflect phase shift, and UAV’s trajectory. For this non-convex problem, we decompose it into the power beamforming problem, the phase shift optimization problem, and the UAV’s trajectory design problem, and proposed an efficient iterative algorithm to solve the problem. The numerical results verify the superiority of the proposed scheme that can improve the average secure transmission rate by about 20% compared to that of Eavesdropping elimination methods.


Sign in / Sign up

Export Citation Format

Share Document