Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints

VH Dang, H Tran, DB Ha, C Le, TD Ho, C So-In - IEEE Access, 2023 - ieeexplore.ieee.org
Recently, the combination of cognitive radio networks with the nonorthogonal multiple
access (NOMA) approach has emerged as a viable option for not only improving spectrum …

Utilizing cooperative jamming to secure cognitive radio NOMA networks

Z Zhang, J Chen, L Lv, Q Ye - GLOBECOM 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we propose an innovative framework to improve the physical layer security of
cognitive radio nonorthogonal multiple access (CR-NOMA) networks. Specifically, we …

The secrecy analysis over physical layer in NOMA-enabled cognitive radio networks

L Wei, T Jing, X Fan, Y Wen… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
An underlay cognitive radio network (CRN) with non-orthogonal multiple access (NOMA) is
a promising multiple access scheme to solve the problem of scarce spectrum. This novel …

Performance analysis of NOMA-based underlay cognitive radio networks with partial<? brk?> relay selection

V Aswathi, AV Babu - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
This paper investigates outage and throughput performance of non-orthogonal multiple
access (NOMA) based underlay cognitive radio (ie, CR-NOMA) network under partial relay …

Security and Reliability Performance Analysis of Cognitive NOMA Network Under Outage Constraint of Multiple Primary Users

T Pham Huu, H Tran, DT Tran, VH Dang… - Proceedings of the 12th …, 2023 - dl.acm.org
In this paper, we conduct an investigation into the security and reliability aspects of a
cognitive non-orthogonal multiple access (NOMA) network operating under outage …

Physical layer security in cognitive radio inspired NOMA network

Z Xiang, W Yang, G Pan, Y Cai… - IEEE Journal of Selected …, 2019 - ieeexplore.ieee.org
This paper investigates physical layer security (PLS) in cognitive radio inspired non-
orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary …

Security-aware resource allocation with delay constraint for NOMA-based cognitive radio network

L Xu, A Nallanathan, X Pan, J Yang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, a downlink security-aware resource allocation problem with delay constraint
via spectrum sensing is modeled as a mixed integer non-linear problem for non-orthogonal …

State of the art, taxonomy, and open issues on cognitive radio networks with NOMA

F Zhou, Y Wu, YC Liang, Z Li, Y Wang… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
The explosive growth of mobile devices and the rapid increase of wideband wireless
services call for advanced communication techniques that can achieve high spectral …

Security performance analysis for power domain NOMA employing in cognitive radio networks

TA Hoang, CB Le, DT Do - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the
fundamental characteristics and it exhibits the possibility of users to decode the messages of …

Robust resource allocation in NOMA based cognitive radio networks

Y Xu, F Shu, RQ Hu, YC Liang - 2019 IEEE/CIC International …, 2019 - ieeexplore.ieee.org
In this paper, we propose a novel robust resource allocation algorithm for downlink non-
orthogonal multiple access (NOMA) cognitive radio networks with the underlay spectrum …