二次NOMA网络安全改进的性能分析

IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS
E. Y. Li, M. J. Zheng, W. Yang, R. Y. Wang, X. J. Wang
{"title":"二次NOMA网络安全改进的性能分析","authors":"E. Y. Li,&nbsp;M. J. Zheng,&nbsp;W. Yang,&nbsp;R. Y. Wang,&nbsp;X. J. Wang","doi":"10.1007/s12243-025-01065-5","DOIUrl":null,"url":null,"abstract":"<div><p>In order to improve the security of cognitive non-orthogonal multiple access (NOMA) systems, we propose a highly secure forwarding strategy for secondary networks, in which the relay uses the data sent by the primary transmitter to improve the security of its forwarding data. Specifically, two relay encoding strategies are designed to improve the security of the cognitive transmitter data, namely, power superposition (PS) encoding strategy and bit-level exclusive OR-PS (XOR-PS) encoding strategy. Considering the imperfect successive interference cancellation (SIC) technology, the exact closed-form expressions of the outage probabilities and intercept probabilities of the PS and XOR-PS schemes in Rayleigh fading scenarios are derived. Then, the corresponding approximate results in high signal-to-noise ratio (SNR) are also given and the correctness of the theoretical results is verified by simulations. Furthermore, two other conventional PS and XOR-PS schemes without using the data of the primary user, represented by NPS and NXOR-PS, respectively, are provided as the benchmark to compare the security and reliability of the proposed protocols. Finally, numerical results show that the security of the proposed PS and XOR-PS schemes is much better than that of the NPS and NXOR-PS schemes in the case of without degrading the outage performance.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"627 - 638"},"PeriodicalIF":2.2000,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Performance analysis for security improvement in secondary NOMA networks\",\"authors\":\"E. Y. Li,&nbsp;M. J. Zheng,&nbsp;W. Yang,&nbsp;R. Y. Wang,&nbsp;X. J. Wang\",\"doi\":\"10.1007/s12243-025-01065-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>In order to improve the security of cognitive non-orthogonal multiple access (NOMA) systems, we propose a highly secure forwarding strategy for secondary networks, in which the relay uses the data sent by the primary transmitter to improve the security of its forwarding data. Specifically, two relay encoding strategies are designed to improve the security of the cognitive transmitter data, namely, power superposition (PS) encoding strategy and bit-level exclusive OR-PS (XOR-PS) encoding strategy. Considering the imperfect successive interference cancellation (SIC) technology, the exact closed-form expressions of the outage probabilities and intercept probabilities of the PS and XOR-PS schemes in Rayleigh fading scenarios are derived. Then, the corresponding approximate results in high signal-to-noise ratio (SNR) are also given and the correctness of the theoretical results is verified by simulations. Furthermore, two other conventional PS and XOR-PS schemes without using the data of the primary user, represented by NPS and NXOR-PS, respectively, are provided as the benchmark to compare the security and reliability of the proposed protocols. Finally, numerical results show that the security of the proposed PS and XOR-PS schemes is much better than that of the NPS and NXOR-PS schemes in the case of without degrading the outage performance.</p></div>\",\"PeriodicalId\":50761,\"journal\":{\"name\":\"Annals of Telecommunications\",\"volume\":\"80 7-8\",\"pages\":\"627 - 638\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2025-02-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Annals of Telecommunications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://link.springer.com/article/10.1007/s12243-025-01065-5\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annals of Telecommunications","FirstCategoryId":"94","ListUrlMain":"https://link.springer.com/article/10.1007/s12243-025-01065-5","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

为了提高认知非正交多址(NOMA)系统的安全性,提出了一种二级网络的高安全转发策略,该策略中中继利用主发射机发送的数据来提高其转发数据的安全性。具体来说,为了提高认知发射机数据的安全性,设计了两种中继编码策略,即功率叠加(PS)编码策略和位级独占OR-PS (XOR-PS)编码策略。考虑不完全连续干扰消除技术,推导了瑞利衰落情况下PS和XOR-PS方案的中断概率和截获概率的精确封闭表达式。给出了在高信噪比条件下的近似结果,并通过仿真验证了理论结果的正确性。此外,还以NPS和NXOR-PS两种不使用主用户数据的传统PS和XOR-PS方案为基准,比较了两种协议的安全性和可靠性。最后,数值结果表明,在不降低中断性能的情况下,所提出的PS和XOR-PS方案的安全性远远优于NPS和NXOR-PS方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Performance analysis for security improvement in secondary NOMA networks

In order to improve the security of cognitive non-orthogonal multiple access (NOMA) systems, we propose a highly secure forwarding strategy for secondary networks, in which the relay uses the data sent by the primary transmitter to improve the security of its forwarding data. Specifically, two relay encoding strategies are designed to improve the security of the cognitive transmitter data, namely, power superposition (PS) encoding strategy and bit-level exclusive OR-PS (XOR-PS) encoding strategy. Considering the imperfect successive interference cancellation (SIC) technology, the exact closed-form expressions of the outage probabilities and intercept probabilities of the PS and XOR-PS schemes in Rayleigh fading scenarios are derived. Then, the corresponding approximate results in high signal-to-noise ratio (SNR) are also given and the correctness of the theoretical results is verified by simulations. Furthermore, two other conventional PS and XOR-PS schemes without using the data of the primary user, represented by NPS and NXOR-PS, respectively, are provided as the benchmark to compare the security and reliability of the proposed protocols. Finally, numerical results show that the security of the proposed PS and XOR-PS schemes is much better than that of the NPS and NXOR-PS schemes in the case of without degrading the outage performance.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Annals of Telecommunications
Annals of Telecommunications 工程技术-电信学
CiteScore
5.20
自引率
5.30%
发文量
37
审稿时长
4.5 months
期刊介绍: Annals of Telecommunications is an international journal publishing original peer-reviewed papers in the field of telecommunications. It covers all the essential branches of modern telecommunications, ranging from digital communications to communication networks and the internet, to software, protocols and services, uses and economics. This large spectrum of topics accounts for the rapid convergence through telecommunications of the underlying technologies in computers, communications, content management towards the emergence of the information and knowledge society. As a consequence, the Journal provides a medium for exchanging research results and technological achievements accomplished by the European and international scientific community from academia and industry.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信