Show simple item record

dc.contributor.authorVo, Van Nhan
dc.contributor.authorViet Hung, Dang
dc.contributor.authorTran, Hung
dc.contributor.authorHa, Dac-Binh
dc.contributor.authorLe, Cong
dc.contributor.authorHo, Tu Dac
dc.contributor.authorChakchai, So-In
dc.date.accessioned2023-04-13T09:12:45Z
dc.date.available2023-04-13T09:12:45Z
dc.date.issued2023-03-31
dc.description.abstractRecently, the combination of cognitive radio networks with the nonorthogonal multiple access (NOMA) approach has emerged as a viable option for not only improving spectrum usage but also supporting large numbers of wireless communication connections. However, cognitive NOMA networks are unstable and vulnerable because multiple devices operate on the same frequency band. To overcome this drawback, many techniques have been proposed, such as optimal power allocation and interference cancellation. In this paper, we consider an approach by which the secondary transmitter (STx) is able to find the best licensed channel to send its confidential message to the secondary receivers (SRxs) by using the NOMA technique. To combat eavesdroppers and achieve reasonable performance, a power allocation policy that satisfies both the outage probability (OP) constraint of primary users and the security constraint of secondary users is optimized. The closed-form formulas for the OP at the primary base station and the leakage probability for the eavesdropper are obtained with imperfect channel state information. Furthermore, the throughput of the secondary network is analyzed to evaluate the system performance. Based on that, two algorithms (i.e., the continuous genetic algorithm (CGA) for CR NOMA (CGA-CRN) and particle swarm optimization (PSO) for CR NOMA (PSO-CRN)), are applied to optimize the throughput of the secondary network. These optimization algorithms guarantee not only the performance of the primary users but also the security constraints of the secondary users. Finally, simulations are presented to validate our research results and provide insights into how various factors affect system performance.en_US
dc.identifier.citationVo VN, Viet Hung, Tran H, Ha D, Le C, Ho T.D., Chakchai S. Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints. IEEE Access. 2023en_US
dc.identifier.cristinIDFRIDAID 2139079
dc.identifier.doi10.1109/ACCESS.2023.3263579
dc.identifier.issn2169-3536
dc.identifier.urihttps://hdl.handle.net/10037/28972
dc.language.isoengen_US
dc.publisherIEEEen_US
dc.relation.journalIEEE Access
dc.rights.accessRightsopenAccessen_US
dc.rights.holderCopyright 2023 The Author(s)en_US
dc.rights.urihttps://creativecommons.org/licenses/by/4.0en_US
dc.rightsAttribution 4.0 International (CC BY 4.0)en_US
dc.titleSecondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraintsen_US
dc.type.versionpublishedVersionen_US
dc.typeJournal articleen_US
dc.typeTidsskriftartikkelen_US
dc.typePeer revieweden_US


File(s) in this item

Thumbnail

This item appears in the following collection(s)

Show simple item record

Attribution 4.0 International (CC BY 4.0)
Except where otherwise noted, this item's license is described as Attribution 4.0 International (CC BY 4.0)