Security-reliability analysis in CR-NOMA IoT network under I/Q imbalance

dc.contributor.authorNguyen, Hung
dc.contributor.authorNguyen, Tan N.
dc.contributor.authorMinh, Bui Vu
dc.contributor.authorPham, Thu-Ha Thi
dc.contributor.authorLe, Anh-Tu
dc.contributor.authorVozňák, Miroslav
dc.date.accessioned2024-04-19T06:45:27Z
dc.date.available2024-04-19T06:45:27Z
dc.date.issued2023
dc.description.abstractThis paper presents a controllable analysis framework for evaluating the reliability and security of underlay cognitive radio networks (CRs) relying on non-orthogonal multiple access (NOMA). In such systems, a secondary base station (BS) transmits confidential information to multiple secondary users uniformly distributed in the presence of a nearby located external eavesdropper. Moreover, transmit power constraints are introduced to limit the interference to the primary imposed by cognitive base stations. As an effective approach of multiple input single output (MISO) systems, the transmit antenna selection (TAS) is selected in the BS to improve the secrecy performance of the primary networks. Furthermore, we first consider the impact of quadrature-phase imbalance (IQI) to characterize the secure performance of the considered network in practice. Then, the degraded performance is evaluated in terms of outage probability (OP), intercept probability (IP), and effective secrecy throughput (EST) of two NOMA users. The optimal EST can be achieved through simulations while the results of OP and IP provide guidelines in the design of IQI-aware CR-NOMA systems. Finally, the trade-off between OP and IP with transmit signal-to-noise ratio (SNR) at the BS is investigated for reflecting the security characteristic. Finally, the trade-off between OP and IP with transmit signal-to-noise ratio (SNR) at the BS is studied for displaying the security characteristic. Numerical results show that increasing the number of transmit antennas at the BS and other main parameters improves performance. Moreover, when the system parameters are reasonably set, the secondary NOMA user in CR-NOMA can be reached secure requirements regardless of the controlled IQI.cs
dc.description.firstpage119045cs
dc.description.lastpage119056cs
dc.description.sourceWeb of Sciencecs
dc.description.volume11cs
dc.identifier.citationIEEE Access. 2023, vol. 11, p. 119045-119056.cs
dc.identifier.doi10.1109/ACCESS.2023.3327789
dc.identifier.issn2169-3536
dc.identifier.urihttp://hdl.handle.net/10084/152540
dc.identifier.wos001098689000001
dc.language.isoencs
dc.publisherIEEEcs
dc.relation.ispartofseriesIEEE Accesscs
dc.relation.urihttps://doi.org/10.1109/ACCESS.2023.3327789cs
dc.rights.accessopenAccesscs
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/cs
dc.subjectnon-orthogonal multiple accesscs
dc.subjectcognitive radiocs
dc.subjectphysical layer securitycs
dc.subjectquadrature-phase imbalancecs
dc.titleSecurity-reliability analysis in CR-NOMA IoT network under I/Q imbalancecs
dc.typearticlecs
dc.type.statusPeer-reviewedcs
dc.type.versionpublishedVersioncs

Files

Original bundle

Now showing 1 - 1 out of 1 results
Loading...
Thumbnail Image
Name:
2169-3536-2023v11p119045.pdf
Size:
1.06 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 out of 1 results
Loading...
Thumbnail Image
Name:
license.txt
Size:
718 B
Format:
Item-specific license agreed upon to submission
Description: