E. Y. Li, M. J. Zheng, W. Yang, R. Y. Wang, X. J. Wang
{"title":"Performance analysis for security improvement in secondary NOMA networks","authors":"E. Y. Li, M. J. Zheng, W. Yang, R. Y. Wang, X. J. Wang","doi":"10.1007/s12243-025-01065-5","DOIUrl":null,"url":null,"abstract":"<div><p>In order to improve the security of cognitive non-orthogonal multiple access (NOMA) systems, we propose a highly secure forwarding strategy for secondary networks, in which the relay uses the data sent by the primary transmitter to improve the security of its forwarding data. Specifically, two relay encoding strategies are designed to improve the security of the cognitive transmitter data, namely, power superposition (PS) encoding strategy and bit-level exclusive OR-PS (XOR-PS) encoding strategy. Considering the imperfect successive interference cancellation (SIC) technology, the exact closed-form expressions of the outage probabilities and intercept probabilities of the PS and XOR-PS schemes in Rayleigh fading scenarios are derived. Then, the corresponding approximate results in high signal-to-noise ratio (SNR) are also given and the correctness of the theoretical results is verified by simulations. Furthermore, two other conventional PS and XOR-PS schemes without using the data of the primary user, represented by NPS and NXOR-PS, respectively, are provided as the benchmark to compare the security and reliability of the proposed protocols. Finally, numerical results show that the security of the proposed PS and XOR-PS schemes is much better than that of the NPS and NXOR-PS schemes in the case of without degrading the outage performance.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"627 - 638"},"PeriodicalIF":2.2000,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annals of Telecommunications","FirstCategoryId":"94","ListUrlMain":"https://link.springer.com/article/10.1007/s12243-025-01065-5","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
In order to improve the security of cognitive non-orthogonal multiple access (NOMA) systems, we propose a highly secure forwarding strategy for secondary networks, in which the relay uses the data sent by the primary transmitter to improve the security of its forwarding data. Specifically, two relay encoding strategies are designed to improve the security of the cognitive transmitter data, namely, power superposition (PS) encoding strategy and bit-level exclusive OR-PS (XOR-PS) encoding strategy. Considering the imperfect successive interference cancellation (SIC) technology, the exact closed-form expressions of the outage probabilities and intercept probabilities of the PS and XOR-PS schemes in Rayleigh fading scenarios are derived. Then, the corresponding approximate results in high signal-to-noise ratio (SNR) are also given and the correctness of the theoretical results is verified by simulations. Furthermore, two other conventional PS and XOR-PS schemes without using the data of the primary user, represented by NPS and NXOR-PS, respectively, are provided as the benchmark to compare the security and reliability of the proposed protocols. Finally, numerical results show that the security of the proposed PS and XOR-PS schemes is much better than that of the NPS and NXOR-PS schemes in the case of without degrading the outage performance.
期刊介绍:
Annals of Telecommunications is an international journal publishing original peer-reviewed papers in the field of telecommunications. It covers all the essential branches of modern telecommunications, ranging from digital communications to communication networks and the internet, to software, protocols and services, uses and economics. This large spectrum of topics accounts for the rapid convergence through telecommunications of the underlying technologies in computers, communications, content management towards the emergence of the information and knowledge society. As a consequence, the Journal provides a medium for exchanging research results and technological achievements accomplished by the European and international scientific community from academia and industry.