Enyu Li, Meijuan Zheng, Zanyang Liang, Ye Wang, Haoming Wang
{"title":"提高 NOMA 认知网络的安全性","authors":"Enyu Li, Meijuan Zheng, Zanyang Liang, Ye Wang, Haoming Wang","doi":"10.1016/j.phycom.2024.102502","DOIUrl":null,"url":null,"abstract":"<div><div>Aiming at the scenario where the eavesdropper try to eavesdrop on the confidential messages of secondary trusted users, two physical-layer network coding (PNC) strategies, namely dual power superposition (PS-PS) encoding strategy and bit-level exclusive-or power superposition (XOR-PS) encoding strategy, are proposed to improve the security performance of cognitive non-orthogonal multiple access (NOMA) networks with the help of the data transmitted by the primary user. Considering the overlay spectrum sharing mechanism and the imperfect successive interference cancellation (SIC) technology, we first derive the closed-form accurate expressions of the outage probability and intercept probability of the secondary network with these two schemes over Rayleigh fading, and also give the asymptotic outage probability in the high signal-to-noise ratio (SNR) regime. Then, the correctness of the theoretical results is verified by simulation. For comparison, we also use the scheme without the assistance of the primary user as the benchmark scheme, which is represented by NPS. Finally, the simulation results show that the security of the proposed PS-PS and XOR-PS schemes is much better than that of the NPS scheme in the case of without reducing the outage performance.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"67 ","pages":"Article 102502"},"PeriodicalIF":2.0000,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improving the security of NOMA cognitive networks\",\"authors\":\"Enyu Li, Meijuan Zheng, Zanyang Liang, Ye Wang, Haoming Wang\",\"doi\":\"10.1016/j.phycom.2024.102502\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Aiming at the scenario where the eavesdropper try to eavesdrop on the confidential messages of secondary trusted users, two physical-layer network coding (PNC) strategies, namely dual power superposition (PS-PS) encoding strategy and bit-level exclusive-or power superposition (XOR-PS) encoding strategy, are proposed to improve the security performance of cognitive non-orthogonal multiple access (NOMA) networks with the help of the data transmitted by the primary user. Considering the overlay spectrum sharing mechanism and the imperfect successive interference cancellation (SIC) technology, we first derive the closed-form accurate expressions of the outage probability and intercept probability of the secondary network with these two schemes over Rayleigh fading, and also give the asymptotic outage probability in the high signal-to-noise ratio (SNR) regime. Then, the correctness of the theoretical results is verified by simulation. For comparison, we also use the scheme without the assistance of the primary user as the benchmark scheme, which is represented by NPS. Finally, the simulation results show that the security of the proposed PS-PS and XOR-PS schemes is much better than that of the NPS scheme in the case of without reducing the outage performance.</div></div>\",\"PeriodicalId\":48707,\"journal\":{\"name\":\"Physical Communication\",\"volume\":\"67 \",\"pages\":\"Article 102502\"},\"PeriodicalIF\":2.0000,\"publicationDate\":\"2024-10-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Physical Communication\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1874490724002209\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Communication","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874490724002209","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Aiming at the scenario where the eavesdropper try to eavesdrop on the confidential messages of secondary trusted users, two physical-layer network coding (PNC) strategies, namely dual power superposition (PS-PS) encoding strategy and bit-level exclusive-or power superposition (XOR-PS) encoding strategy, are proposed to improve the security performance of cognitive non-orthogonal multiple access (NOMA) networks with the help of the data transmitted by the primary user. Considering the overlay spectrum sharing mechanism and the imperfect successive interference cancellation (SIC) technology, we first derive the closed-form accurate expressions of the outage probability and intercept probability of the secondary network with these two schemes over Rayleigh fading, and also give the asymptotic outage probability in the high signal-to-noise ratio (SNR) regime. Then, the correctness of the theoretical results is verified by simulation. For comparison, we also use the scheme without the assistance of the primary user as the benchmark scheme, which is represented by NPS. Finally, the simulation results show that the security of the proposed PS-PS and XOR-PS schemes is much better than that of the NPS scheme in the case of without reducing the outage performance.
期刊介绍:
PHYCOM: Physical Communication is an international and archival journal providing complete coverage of all topics of interest to those involved in all aspects of physical layer communications. Theoretical research contributions presenting new techniques, concepts or analyses, applied contributions reporting on experiences and experiments, and tutorials are published.
Topics of interest include but are not limited to:
Physical layer issues of Wireless Local Area Networks, WiMAX, Wireless Mesh Networks, Sensor and Ad Hoc Networks, PCS Systems; Radio access protocols and algorithms for the physical layer; Spread Spectrum Communications; Channel Modeling; Detection and Estimation; Modulation and Coding; Multiplexing and Carrier Techniques; Broadband Wireless Communications; Wireless Personal Communications; Multi-user Detection; Signal Separation and Interference rejection: Multimedia Communications over Wireless; DSP Applications to Wireless Systems; Experimental and Prototype Results; Multiple Access Techniques; Space-time Processing; Synchronization Techniques; Error Control Techniques; Cryptography; Software Radios; Tracking; Resource Allocation and Inference Management; Multi-rate and Multi-carrier Communications; Cross layer Design and Optimization; Propagation and Channel Characterization; OFDM Systems; MIMO Systems; Ultra-Wideband Communications; Cognitive Radio System Architectures; Platforms and Hardware Implementations for the Support of Cognitive, Radio Systems; Cognitive Radio Resource Management and Dynamic Spectrum Sharing.