{"title":"NOMA-Enabled Underlay Cognitive IoT Networks: Secrecy Energy Efficiency Optimization and Deep Learning-Based Assessment","authors":"P. P. Hema, Babu A V","doi":"10.1002/dac.70060","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Physical layer security (PLS) is a novel approach that has surfaced as an additional security measure for wireless networks, enhancing the existing cryptography-based techniques. The notion of secrecy energy efficiency (SEE) effectively addresses the task of establishing secure and energy-efficient communication in wireless networks. Nonorthogonal multiple access (NOMA)-enabled cognitive Internet-of-Things (IoT) systems have been proposed to enhance spectrum utilization efficiency, connectivity, and quality of service for IoT applications, where IoT devices can function as secondary users (SUs) and take advantage of the spectrum used by primary users (PUs) for communication among themselves or with the Internet. The objective of this paper is to study the SEE performance of NOMA-enabled underlay cognitive radio networks (NOMA-UCRNs) with an external passive eavesdropper. Initially, analytical models are developed to assess the SEE and secrecy sum rate (SSR) of the secondary network in NOMA-UCRN, considering imperfect successive interference cancellation conditions and interference power constraints of the primary receiver. Next, we determine the optimal transmit power allocation (OTPA) for the SUs at the secondary base station that maximizes the SEE while adhering to the requirements of maintaining minimum data rates for the SUs and satisfying the interference constraint on the primary receiver. The OTPA is determined by employing an iterative algorithm based on the Dinkelbach method. It is demonstrated that the proposed OTPA strategy enhances the following: (i) the SEE of the secondary network by 190<i>%</i> and 360<i>%</i> and (ii) the secrecy sum rate by 30<i>%</i> and 95<i>%</i> compared to random transmit power allocation and equal transmit power allocation strategies, respectively. Lastly, a state-of-the-art deep neural network (DNN) framework is devised to achieve precise and rapid prediction of the OTPA, ultimately maximizing the SEE of the NOMA-UCRN under investigation.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.70060","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Physical layer security (PLS) is a novel approach that has surfaced as an additional security measure for wireless networks, enhancing the existing cryptography-based techniques. The notion of secrecy energy efficiency (SEE) effectively addresses the task of establishing secure and energy-efficient communication in wireless networks. Nonorthogonal multiple access (NOMA)-enabled cognitive Internet-of-Things (IoT) systems have been proposed to enhance spectrum utilization efficiency, connectivity, and quality of service for IoT applications, where IoT devices can function as secondary users (SUs) and take advantage of the spectrum used by primary users (PUs) for communication among themselves or with the Internet. The objective of this paper is to study the SEE performance of NOMA-enabled underlay cognitive radio networks (NOMA-UCRNs) with an external passive eavesdropper. Initially, analytical models are developed to assess the SEE and secrecy sum rate (SSR) of the secondary network in NOMA-UCRN, considering imperfect successive interference cancellation conditions and interference power constraints of the primary receiver. Next, we determine the optimal transmit power allocation (OTPA) for the SUs at the secondary base station that maximizes the SEE while adhering to the requirements of maintaining minimum data rates for the SUs and satisfying the interference constraint on the primary receiver. The OTPA is determined by employing an iterative algorithm based on the Dinkelbach method. It is demonstrated that the proposed OTPA strategy enhances the following: (i) the SEE of the secondary network by 190% and 360% and (ii) the secrecy sum rate by 30% and 95% compared to random transmit power allocation and equal transmit power allocation strategies, respectively. Lastly, a state-of-the-art deep neural network (DNN) framework is devised to achieve precise and rapid prediction of the OTPA, ultimately maximizing the SEE of the NOMA-UCRN under investigation.
期刊介绍:
The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues.
The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered:
-Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.)
-System control, network/service management
-Network and Internet protocols and standards
-Client-server, distributed and Web-based communication systems
-Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity
-Trials of advanced systems and services; their implementation and evaluation
-Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation
-Performance evaluation issues and methods.