Secrecy capacity results for a secure NOMA-based cognitive radio network with an external eavesdropper

Abstract In this paper, we investigate a secure cognitive radio network (CRN), which deploys non-orthogonal multiple access (NOMA) to deliver a mixed multicast and unicast traffic to the intended receivers, while keeping them secret from the eavesdroppers. This model represents a cognitive interference channel with an external eavesdropper (CIC-EE). In this model, there are one pair of primary nodes, one pair of secondary nodes, and an external eavesdropper. The primary transmitter multicasts a confidential message to both primary and secondary receivers, while trying to keep it secret from the eavesdropper. The secondary transmitter helps the primary user to deliver its message in exchange of transmission opportunity. The secondary message is unicasted to the secondary receiver, while concealing it from both primary receiver and the eavesdropper. This scenario models a NOMA-based overlay cognitive radio paradigm with an external eavesdropper. For this scenario, the achievable rate-equivocation region is obtained and its optimality is shown for a class of degraded channels. Then, the results obtained for the discrete memoryless channel are extended to the Gaussian channel model. Furthermore, by deploying numerical examples, a comparison is made between the proposed secure NOMA-based scheme, its orthogonal multiple access (OMA) based counterpart, and a cognitive interference channel without an external eavesdropper. It is shown that the NOMA-based method achieves significantly higher rates than its OMA based counterpart.

[1]  Daniela Tuninetti,et al.  Multi-user Cognitive Interference Channels: A Survey and New Capacity Results , 2015, IEEE Transactions on Cognitive Communications and Networking.

[2]  Shun Watanabe,et al.  Cognitive Interference Channels With Confidential Messages Under Randomness Constraint , 2014, IEEE Transactions on Information Theory.

[3]  Bahareh Akhbari,et al.  Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message , 2016, IEEE Transactions on Information Forensics and Security.

[4]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Xin Fan,et al.  The Secrecy Analysis over Physical Layer in NOMA-Enabled Cognitive Radio Networks , 2018, 2018 IEEE International Conference on Communications (ICC).

[6]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[7]  Maria Rita Palattella,et al.  Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.

[8]  Abbas El Gamal,et al.  Three-Receiver Broadcast Channels With Common and Confidential Messages , 2012, IEEE Transactions on Information Theory.

[9]  Sangeeta Bhattacharjee Friendly Jamming Assisted Secure Cooperative Multicasting in Cognitive Radio-NOMA Networks , 2019, 2019 IEEE Globecom Workshops (GC Wkshps).

[10]  Elisabeth Uhlemann,et al.  Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints , 2020, IEEE Access.

[11]  Alexander Schrijver,et al.  Theory of linear and integer programming , 1986, Wiley-Interscience series in discrete mathematics and optimization.

[12]  Hossein Khoshbin Ghomash,et al.  New Inner Bounds for the Gaussian Interference Channel with a Cognitive Relay , 2019, 2019 Iran Workshop on Communication and Information Theory (IWCIT).

[13]  Mohammad Reza Aref,et al.  Cognitive interference channel with two confidential messages , 2010, 2010 International Symposium On Information Theory & Its Applications.

[14]  Jian Yang,et al.  Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network , 2018, IEEE Transactions on Information Forensics and Security.

[15]  Reza Khosravi-Farsani,et al.  Capacity theorems for the Cognitive Radio Channel with confidential messages , 2014, 2014 IEEE International Symposium on Information Theory.

[16]  Bahareh Akhbari,et al.  Multiple access channel with common message and secrecy constraint , 2014, IET Commun..

[17]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[18]  Shuangfeng Han,et al.  Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.

[19]  Ming Xiao,et al.  Strong Secrecy for Interference Channels Based on Channel Resolvability , 2018, IEEE Transactions on Information Theory.

[20]  Katalin Marton,et al.  A coding theorem for the discrete memoryless broadcast channel , 1979, IEEE Trans. Inf. Theory.

[21]  Roy D. Yates,et al.  Secrecy capacity region of a class of one-sided interference channel , 2008, 2008 IEEE International Symposium on Information Theory.

[22]  Aylin Yener,et al.  A new outer bound for the gaussian interference channel with confidential messages , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[23]  Dinesh Rajan,et al.  An Achievable Region for the Cognitive Interference Relay Channel , 2018, IEEE Transactions on Cognitive Communications and Networking.

[24]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[25]  Pablo Piantanida,et al.  Secrecy Capacity Region of Some Classes of Wiretap Broadcast Channels , 2014, IEEE Transactions on Information Theory.

[26]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[27]  Sarah J. Johnson,et al.  Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations , 2016, IEEE Communications Magazine.

[28]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[29]  Jun Li,et al.  Quality-of-Service Control in GRAMS for ATM Local Area Network , 1995, IEEE J. Sel. Areas Commun..

[30]  Fan Li,et al.  Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel , 2019, IEEE Transactions on Information Forensics and Security.

[31]  Mahtab Mirmohseni,et al.  On the secrecy of the cognitive interference channel with partial channel states , 2015, Trans. Emerg. Telecommun. Technol..

[32]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).

[33]  Amin Gohari,et al.  Evaluation of Marton's inner bound for the general broadcast channel , 2009, ISIT.

[34]  Ying-Chang Liang,et al.  State of the Art, Taxonomy, and Open Issues on Cognitive Radio Networks with NOMA , 2018, IEEE Wireless Communications.

[35]  Mikael Skoglund,et al.  On the Optimization of the Secondary Transmitter's Strategy in Cognitive Radio Channels with Secrecy , 2014, IEEE Journal on Selected Areas in Communications.

[36]  Anass Benjebbour,et al.  Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[37]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[38]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[39]  Rose Qingyang Hu,et al.  Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks , 2019, IEEE Transactions on Communications.

[40]  Mikael Skoglund,et al.  New Achievable Rates for Gaussian Partially Cognitive Interference Channels With Multiple Cognitive Pairs , 2014, IEEE Transactions on Communications.

[41]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[42]  Jiaxin Wu,et al.  Secrecy rate and residual energy trade-off in energy harvesting cognitive radio networks , 2019, Phys. Commun..

[43]  Thomas M. Cover,et al.  Broadcast channels , 1972, IEEE Trans. Inf. Theory.

[44]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[45]  Muhammad Ali Imran,et al.  Cloud empowered Cognitive Inter-cell Interference Coordination for small cellular networks , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[46]  Shilpa Thakur,et al.  Secure transmission in underlay cognitive radio network with outdated channel state information , 2019, Phys. Commun..

[47]  Jinhua Jiang,et al.  Interference Channels With Common Information , 2006, IEEE Transactions on Information Theory.

[48]  H. Vincent Poor,et al.  On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.

[49]  Yueming Cai,et al.  Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.

[50]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[51]  Onur Ozan Koyluoglu,et al.  Secrecy games over the cognitive channel , 2010, 2010 IEEE International Symposium on Information Theory.

[52]  Mahtab Mirmohseni,et al.  Three-user cognitive interference channel: capacity region with strong interference , 2012, IET Commun..

[53]  Shlomo Shamai,et al.  Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.

[54]  Mahtab Mirmohseni,et al.  One-Receiver Two-Eavesdropper Broadcast Channel With Degraded Message Sets , 2013, IEEE Transactions on Information Forensics and Security.

[55]  Martina Cardone,et al.  The Two-User Causal Cognitive Interference Channel: Novel Outer Bounds and Constant Gap Result for the Symmetric Gaussian Noise Channel in Weak Interference , 2016, IEEE Transactions on Information Theory.

[56]  Shlomo Shamai,et al.  On the capacity of interference channels with one cooperating transmitter , 2007, Eur. Trans. Telecommun..

[57]  François Gagnon,et al.  Cognitive radio network with secrecy and interference constraints , 2017, Phys. Commun..

[58]  Tolga M. Duman,et al.  LDPC Codes for Interference Channels in the Primary Decodes Cognitive Regime , 2019, IEEE Wireless Communications Letters.

[59]  H. Vincent Poor,et al.  On the secure degrees of freedom in the K-user Gaussian interference channel , 2008, 2008 IEEE International Symposium on Information Theory.

[60]  Stefano Rini The fast fading Z cognitive interference channel , 2018, 2018 Iran Workshop on Communication and Information Theory (IWCIT).

[61]  Jinyuan Chen Secure Communication Over Interference Channel: To Jam or not to Jam? , 2020, IEEE Transactions on Information Theory.

[62]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[63]  Panagiotis Papadimitratos,et al.  Security in the Gaussian interference channel: Weak and moderately weak interference regimes , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[64]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[65]  Yingbin Liang,et al.  Bounds and Capacity Theorems for Cognitive Interference Channels With State , 2012, IEEE Transactions on Information Theory.