dc.contributor.author | Vo, Van Nhan | |
dc.contributor.author | Viet Hung, Dang | |
dc.contributor.author | Tran, Hung | |
dc.contributor.author | Ha, Dac-Binh | |
dc.contributor.author | Le, Cong | |
dc.contributor.author | Ho, Tu Dac | |
dc.contributor.author | Chakchai, So-In | |
dc.date.accessioned | 2023-04-13T09:12:45Z | |
dc.date.available | 2023-04-13T09:12:45Z | |
dc.date.issued | 2023-03-31 | |
dc.description.abstract | Recently, the combination of cognitive radio networks with the nonorthogonal multiple access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also supporting large numbers of wireless communication connections. However, cognitive NOMA networks are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome this drawback, many techniques have been proposed, such as optimal power allocation and interference cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station and the leakage probability for the eavesdropper are obtained with imperfect channel state information. Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance. Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN) and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput of the secondary network. These optimization algorithms guarantee not only the performance of the primary users but also the security constraints of the secondary users. Finally, simulations are presented to validate our research results and provide insights into how various factors affect system performance. | en_US |
dc.identifier.citation | Vo VN, Viet Hung, Tran H, Ha D, Le C, Ho T.D., Chakchai S. Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints. IEEE Access. 2023 | en_US |
dc.identifier.cristinID | FRIDAID 2139079 | |
dc.identifier.doi | 10.1109/ACCESS.2023.3263579 | |
dc.identifier.issn | 2169-3536 | |
dc.identifier.uri | https://hdl.handle.net/10037/28972 | |
dc.language.iso | eng | en_US |
dc.publisher | IEEE | en_US |
dc.relation.journal | IEEE Access | |
dc.rights.accessRights | openAccess | en_US |
dc.rights.holder | Copyright 2023 The Author(s) | en_US |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0 | en_US |
dc.rights | Attribution 4.0 International (CC BY 4.0) | en_US |
dc.title | Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints | en_US |
dc.type.version | publishedVersion | en_US |
dc.type | Journal article | en_US |
dc.type | Tidsskriftartikkel | en_US |
dc.type | Peer reviewed | en_US |