Secrecy capacity results for a secure NOMA-based cognitive radio network with an external eavesdropper

buir.contributor.authorMehr, K. Adli
dc.citation.epage16en_US
dc.citation.spage1en_US
dc.citation.volumeNumber43en_US
dc.contributor.authorMehr, K. Adli
dc.contributor.authorNiya, J. M.
dc.contributor.authorSeyedarabi, H.
dc.contributor.authorNobar, S. K.
dc.date.accessioned2021-03-05T05:49:21Z
dc.date.available2021-03-05T05:49:21Z
dc.date.issued2020
dc.departmentDepartment of Electrical and Electronics Engineeringen_US
dc.description.abstractIn this paper, we investigate a secure cognitive radio network (CRN), which deploys non-orthogonal multiple access (NOMA) to deliver a mixed multicast and unicast traffic to the intended receivers, while keeping them secret from the eavesdroppers. This model represents a cognitive interference channel with an external eavesdropper (CIC-EE). In this model, there are one pair of primary nodes, one pair of secondary nodes, and an external eavesdropper. The primary transmitter multicasts a confidential message to both primary and secondary receivers, while trying to keep it secret from the eavesdropper. The secondary transmitter helps the primary user to deliver its message in exchange of transmission opportunity. The secondary message is unicasted to the secondary receiver, while concealing it from both primary receiver and the eavesdropper. This scenario models a NOMA-based overlay cognitive radio paradigm with an external eavesdropper. For this scenario, the achievable rate-equivocation region is obtained and its optimality is shown for a class of degraded channels. Then, the results obtained for the discrete memoryless channel are extended to the Gaussian channel model. Furthermore, by deploying numerical examples, a comparison is made between the proposed secure NOMA-based scheme, its orthogonal multiple access (OMA) based counterpart, and a cognitive interference channel without an external eavesdropper. It is shown that the NOMA-based method achieves significantly higher rates than its OMA based counterpart.en_US
dc.description.provenanceSubmitted by Zeynep Aykut (zeynepay@bilkent.edu.tr) on 2021-03-05T05:49:21Z No. of bitstreams: 1 Secrecy_capacity_results_for_a_secure_NOMA_based_cognitive_radio_network_with_an_external_eavesdropper.pdf: 1287525 bytes, checksum: 0a7185b3cbb396a6f5c5a0972904f7a3 (MD5)en
dc.description.provenanceMade available in DSpace on 2021-03-05T05:49:21Z (GMT). No. of bitstreams: 1 Secrecy_capacity_results_for_a_secure_NOMA_based_cognitive_radio_network_with_an_external_eavesdropper.pdf: 1287525 bytes, checksum: 0a7185b3cbb396a6f5c5a0972904f7a3 (MD5) Previous issue date: 2020en
dc.embargo.release2022-12-01
dc.identifier.doi10.1016/j.phycom.2020.101224en_US
dc.identifier.issn1874-4907
dc.identifier.urihttp://hdl.handle.net/11693/75802
dc.language.isoEnglishen_US
dc.publisherElsevieren_US
dc.relation.isversionofhttps://dx.doi.org/10.1016/j.phycom.2020.101224en_US
dc.source.titlePhysical Communicationen_US
dc.subjectCognitive radioen_US
dc.subjectConfidential messagesen_US
dc.subjectEavesdropperen_US
dc.subjectInterference channelen_US
dc.subjectRate-equivocation regionen_US
dc.subjectSecrecy capacity regionen_US
dc.titleSecrecy capacity results for a secure NOMA-based cognitive radio network with an external eavesdropperen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Secrecy_capacity_results_for_a_secure_NOMA_based_cognitive_radio_network_with_an_external_eavesdropper.pdf
Size:
1.23 MB
Format:
Adobe Portable Document Format
Description:
View / Download
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: