On the Secrecy Rate of Downlink NOMA in Underlay Spectrum Sharing with Imperfect CSI

In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing non-orthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.

[1]  Jianxin Chen,et al.  Physical Layer Security in the Age of Artificial Intelligence and Edge Computing , 2020, IEEE Wireless Communications.

[2]  Rafael F. Schaefer,et al.  Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping , 2018, IEEE Transactions on Cognitive Communications and Networking.

[3]  Octavia A. Dobre,et al.  Secrecy Performance of Small-Cell Networks With Transmitter Selection and Unreliable Backhaul Under Spectrum Sharing Environment , 2019, IEEE Transactions on Vehicular Technology.

[4]  Barry Cardiff,et al.  Fundamental Limits of Spectrum Sharing for NOMA-Based Cooperative Relaying Under a Peak Interference Constraint , 2019, IEEE Transactions on Communications.

[5]  Mohamed-Slim Alouini,et al.  Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes , 2018, IEEE Transactions on Communications.

[6]  Daniel Benevides da Costa,et al.  Performance Analysis of Underlay Cognitive Multihop Regenerative Relaying Systems with Multiple Primary Receivers , 2013, IEEE Transactions on Wireless Communications.

[7]  Chen Feng,et al.  Secrecy Performance of NOMA Systems With Energy Harvesting and Full-Duplex Relaying , 2020, IEEE Transactions on Vehicular Technology.

[8]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[9]  H. Vincent Poor,et al.  Multiple Access Techniques for 5G Wireless Networks and Beyond , 2018 .

[10]  Hai Jiang,et al.  Cognitive Non-Orthogonal Multiple Access with Cooperative Relaying: A New Wireless Frontier for 5G Spectrum Sharing , 2018, IEEE Communications Magazine.

[11]  Zhiguo Ding,et al.  Secrecy-Enhancing Design for Cooperative Downlink and Uplink NOMA With an Untrusted Relay , 2020, IEEE Transactions on Communications.

[12]  Zhiguo Ding,et al.  On the performance of downlink NOMA in underlay spectrum sharing , 2020, ArXiv.

[13]  Xinbing Wang,et al.  Energy Efficiency of Secure Cognitive Radio Networks with Cooperative Spectrum Sharing , 2019, IEEE Transactions on Mobile Computing.