2020
DOI: 10.1109/access.2020.3020847
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security in NOMA-Enabled Cognitive Radio Networks With Outdated Channel State Information

Abstract: In this paper, we investigate physical layer security (PLS) in non-orthogonal multiple access-enabled (NOMA-enabled) underlay cognitive radio networks (CRNs) with outdated channel state information (CSI). Considering the influence of outdated CSI on the interference of secondary transmitter (Alice) to primary user (PU), the constraint for the power is adopted to guarantee the quality-of-service (QoS) of PU over Nakagami-m channels. To further analyze the NOMA-enabled underlay CRNs with outdated CSI in PLS pers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(19 citation statements)
references
References 48 publications
(53 reference statements)
1
18
0
Order By: Relevance
“…In [29], the joint effects of in-phase and quadrature-phase imbalance and ipSIC on the performance of TWR CNOMA networks over the Rician fading channels were studied. Besides, the realistic assumptions of the residual hardware impairments or ipCSIs of two-way or multiway CNOMA networks have also been considered in the articles [21,22,30]. Moreover, DNC and NOMA techniques can be combined to decreasing transmission time between devices and improve the performance system [5,31,32].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In [29], the joint effects of in-phase and quadrature-phase imbalance and ipSIC on the performance of TWR CNOMA networks over the Rician fading channels were studied. Besides, the realistic assumptions of the residual hardware impairments or ipCSIs of two-way or multiway CNOMA networks have also been considered in the articles [21,22,30]. Moreover, DNC and NOMA techniques can be combined to decreasing transmission time between devices and improve the performance system [5,31,32].…”
Section: Related Workmentioning
confidence: 99%
“…We also assume that the flat and block Rayleigh fading channels with the fading coefficients for links S k ⟶ R i and R i ⟶ S k are denoted as h S k R i and h R i S k , respectively, where k ∈ f1, 2g. In addition, perfect knowledge of all links is assumed at the receivers by channel estimators that are error-free [35], and the ipCSIs are only caused by the feedback delay with a time-variant channel representation and is described by [12,14,16,20,22,32,35]…”
Section: System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Information security is a critically important issue in cognitive radio networks (CRNs). Physical layer security, which exploits the intrinsic randomness of wireless channel to enhance the security, is developed, and user cooperation technology is widely recognized as one of the essentials for physical layer security [2]- [6].…”
Section: Introductionmentioning
confidence: 99%