1. Introduction
The rapid expansion of wireless networks has produced a massive increment in data traffic. The fundamental requirements for future networks such as 5G include massive connectivity of users and the Internet of Things (IoT), low latency, high energy efficiency, and higher data rates. Non-orthogonal multiple access (NOMA) has attracted extensive attention in the literature because it can provide superior energy efficiency, higher data rates, and low transmission latency [1,2]. NOMA is based on superposition coding at the transmitter and successive interference cancellation (SIC) at the receiver, where multiple users can simultaneously access the same frequency with different transmit power levels [3,4]. To further improve the coverage of the network, cooperative communications utilize a relay or a cooperative user to forward messages to the intended users who are very far away from the base station (BS) and who do not have a direct link because of obstacles or the shadowing effect.
Security represents one of the major problems in wireless networks because the signals transmitted can be intercepted in the shared wireless medium. Physical layer security (PLS) was introduced to complement traditional security techniques, and it exploits the nature of physical layer dynamics to provide a secure transmission [5]. Several studies in the literature have investigated the security in NOMA systems with the objectives of secrecy sum rate maximization [6,7,8] and secrecy energy efficiency (SEE) [3,9]. Zhang et al. [6] considered a single-input single-output NOMA system with a passive eavesdropper, where the objective was to maximize the secrecy sum rate (SSR) under the constraint of minimum data rate at the users. The authors compared their proposed solution with the orthogonal multiple access (OMA) method, obtaining a significant improvement of the SRR by using NOMA. A downlink simultaneous wireless information and power transfer (SWIPT) system with NOMA was proposed in [7]. The BS simultaneously served several information receivers and multiple EH receivers in which the EH receivers were considered potential eavesdroppers. The authors solved the SSR maximization problem under the constraints of minimum data rate required by the information receiver users and minimum harvested energy required by the EH receivers. Garcia et al. [8] proposed secrecy sum rate maximization in a cooperative NOMA system composed of two users and a relay. The paper highlights the importance in cooperative communications of improving the secrecy performance of the network, since simulation results showed that higher values for the secrecy sum rate were obtained by employing a cooperative relay compared to values obtained by the NOMA network without cooperative relaying. A cooperative system model with SWIPT was proposed in [10], where an EH user co-existed with a nearby user that applies SWIPT to harvest energy and work as a relay to help and guarantee a minimum data rate at the far user. The minimum transmit power problem was considered under the constraints of minimum signal to interference plus noise ratio (SINR) of the users and minimum harvested energy at the EH user. Mao et al. [11] considered an underlay cognitive multiple-input single-output NOMA system with SWIPT in which the secondary BS and the multiple secondary SWIPT users co-existed with several primary users via the underlay scheme. The minimum transmit power problem is investigated subject to the constraints of minimum SINR, minimum energy harvested to satisfy the power consumption at the users, and maximum interference power with the primary network.
Yao et al. [9] considered a downlink NOMA system composed of a BS and multiple legitime users under the presence of an eavesdropper. The Secrecy energy efficiency was maximized subject to the constraints of minimum data rate and maximum available power at the BS. A NOMA cognitive radio (CR) system with energy harvesting (EH) users was proposed by Wang et al. [3] in which the secondary users harvest energy in the first phase and transmit their uplink information with NOMA in the second phase under the presence of the eavesdropper. The authors proposed the secrecy energy efficiency (SEE) maximization problem under the constraints of minimum data rate, maximum interference power to the primary users (PUs) and maximum secrecy outage probability. However, none of the researchers studied SEE maximization in a downlink CR-NOMA system with cooperative relaying and an EH user. The importance of the EH user lies in powering the user terminal expected in 5G applications, such as those in the Internet of Things (IoT) [12]. In this paper, we consider the EH user to be a receiver that stores energy from RF signals.
With the above motivations, and because energy efficiency is a crucial factor for future wireless networks, we investigate a downlink CR-NOMA scheme to maximize the SEE with cooperative relaying, subject to quality of service (QoS) requirements. We propose a particle swarm optimization (PSO)-based algorithm to solve the optimization problem, which has advantages over the optimal exhaustive search method, such as low computational complexity and high accuracy. Moreover, in the literature, application of PSO in wireless communications networks has shown high performance in resolving optimization problems [8,13].
The main contributions of this paper are summarized as follows.
- Since we focus on enhancing the PLS (and to enable sustainable 5G networks), we propose maximizing the SEE of the CR-NOMA system with cooperative relaying and an EH user to prevent eavesdropper wiretaps by satisfying the following QoS requirements: minimum required energy at the EH user, a minimum data rate for secondary users, the maximum permissible transmission power at the relay, and a transmitter that avoids interference with the primary user.
- To reduce the computation complexity of the solution, we solve the SEE maximization problem with a PSO-based algorithm that provides high-accuracy outcomes and high convergence speed. In addition, we provide the mathematical boundaries for the variables of the proposed optimization problem. The simulation results show that the proposed PSO algorithm achieves outcomes very close to values obtained by the high computational–complexity exhaustive search method.
- We solve the SEE maximization problem for a CR orthogonal multiple access (CR-OMA) scheme to compare it with our proposed CR-NOMA scheme. Similar to the CR-NOMA system, we also optimize the power allocation variables of each OMA user. Simulation results show that our proposed scheme based on NOMA outperforms the OMA scheme, where an improvement in the SEE of around 40% to more than 100% is achieved by NOMA compared with OMA.
The rest of this paper is organized as follows. The CR-NOMA network model with an EH user is described in Section 2. In Section 3, the SEE maximization problem in the CR-NOMA network is formulated, and the PSO-based power allocation scheme for SEE maximization is described. The comparison approach of SEE maximization in the CR-OMA scheme is studied in Section 4. Simulation results of the cooperative CR-NOMA network with an EH user are presented in Section 5. Finally, the conclusion is presented in Section 6. Table 1 lists the main abbreviations used throughout the paper.
2. Network Model
We study a downlink underlying CR-NOMA system consisting of one secondary transmitter, one cooperative relay, two secondary users, one EH user, one primary user and one eavesdropper. The cooperative relay operates in half-duplex mode and implements the decode-and-forward (DF) protocol. Figure 1 illustrates the system model; the nearby secondary user is U1, and we assume there is no direct link between the transmitter and the distant secondary user, U2, because of path obstruction. User 3 (denoted as U3) is the EH user and the primary user is denoted as PU. The system model involves two phases. In Phase 1, the transmitter serves the secondary users and sends a superimposed signal, x, composed of Message 1, Message 2, and Message 3 corresponding to the close, distant and EH users’ messages, respectively. Then, U1 and the relay receive the messages. In Phase 2, the relay retransmits Message 2 to U2 and U1. In the following, we provide a detailed description of the two phases.
Concerning Phase 1, letx1,x2∈Cdenote the messages for U1 and U2, with transmit powers ofp1andp2respectively. According to the NOMA concept, the transmission power level for the user with the lower channel gain should be higher than the transmission power level of the user with the higher channel gain. Therefore, we considerp2>p1. The energy signal intended for the EH user,x3, can be a signal known to both secondary users prior to information transmission. At the secondary transmitter,x3is sent with a transmit power ofp3. Then, the transmit signal is defined asx=p1x1+p2x2+p3x3. The channels from the transmitter to User 1, User 3, the relay, and the eavesdropper are denoted ash˜Tu1,h˜Tu3,h˜TRandh˜TE, respectively. The channels from the relay to User 1, User 2, and the eavesdropper are denoted asg˜Ru1,g˜Ru2, andg˜RE, respectively. We assume that the variance in the noise of the users, the relay, and the eavesdropper is the same, and we define them asσ2=σR2=σEv2=σu12=σu22. We also assume that U1 and U2 can cancel the interference from known symbolx3.
In Phase 1, since the relay decodes Message 2 (considering Message 1 as interference), the rate of Message 2 at the relay is given by
Rx2,TR=12log2(1+p2 hTRp1 hTR+σR2),
wherehTR=h˜TR2.
At the eavesdropper, the rate of Message 1 is:
Rx1,TE=12log2(1+p1 hTEp2 hTE+p3 hTE+σEv2),
wherehTE=h˜TE2.
The energy harvested by User 3 in Phase 1 can be expressed as
E3(1)=h˜Tu32p1+p2+p3τ=hTu3p1+p2+p32,
wherehTu3=h˜Tu32,τ∈0,1,τ=12is the transmission time fraction for Phase 1.
In Phase 2, the relay retransmits Message 2. User 1 and the eavesdropper use maximum-ratio combining, and the rate of Message 2 at U1 is given as follows:
Rx2,u1=12log2(1+p2 hTu1p1 hTu1+σu12+pr gRu1σu12),
wherehTu1=h˜Tu12,gRu1=g˜Ru12, andprdenotes the transmit power of Message 2 at the relay. The rate of Message 2 at the eavesdropper is given as follows:
Rx2,E=12log2(1+p2 hTEp1 hTE+p3 hTE+σE2+pr gREσE2),
wheregRE=g˜RE2.
Under NOMA, User 1 performs successive interference cancellation to remove the interference of Message 2, and decodes Message 1. Then, the rate of Message 1 at U1 is defined as follows:
Rx1,Tu1=12log2(1+p1 hTu1σu12).
Therefore, the secrecy rate of Message 1 is given by
Ru1 =Rx1,Tu1−Rx1,TE+,
wherec+=max0,c.
The rate of Message 2 at U2 is as follows:
Rx2,Ru2=12log2(1+pr gRu2σu22),
wheregRu2=g˜Ru22.
The achievable rate of Message 2 is defined by the rate observed at U1, the relay, and User 2 as follows:
Ru2,min=min(Rx2,u1,Rx2,TR,Rx2,Ru2).
Consequently, the secrecy rate of Message 2 is defined as:
Ru2 =Ru2,min−Rx2,E+.
The power at the transmitter and the relay should remain at a controllable level to avoid interference with the primary user, and these power constraints are specified in Section 3.
3. Problem Formulation and the PSO-Based Power Allocation Scheme for SEE Maximization
The objective is to maximize the SEE, subject to the constraints of a minimum required rate at each secondary user, minimum energy harvested by U3, and maximum available power at the relay and transmitter based on the maximum permissible interference with the primary user. The SEE is defined as the ratio of secrecy sum rate maximization to total power consumption [3,5,14]. The optimization problem can be modeled as follows:
maxp1,p2,p3,prRu1 +Ru2 12p1+p2+p3+pcT+12pr+pcR
s.t.Rx1,Tu1≥ϕ1,
Ru2,min≥ϕ2,
p1+p2+p3≤PTmax,
pr≤PRmax,
E3(1)≥ξ,
wherepcTandpcRare circuit power consumption,ξis the minimum required energy harvested by U3, andϕ1andϕ2are the minimum required data rates for U1 and U2, respectively.PTmaxandPRmaxare the maximum power permitted at the transmitter and relay, respectively, to avoid interference with the primary user.
To guarantee that the power level from the transmitter and the relay will not interfere with the primary user, the maximum transmission power at the transmitter and at the relay, respectively, are constrained as indicated in (12) and (13):
PTmax=minImax hTp2,PT,
whereImaxis the power level of the maximum permissible interference with the primary user,PTis the maximum available power at the BS, andhTpis the channel coefficient from the secondary transmitter to the primary user; and:
PRmax=minImax gRp2,PR,
wheregRpis the channel coefficient from the relay to the primary user, andPRis the maximum available power at the relay.
To solve problem (11), we propose a low-complexity algorithm based on PSO [15]. First, we define the boundaries of the variablesp1,p2,p3andprbased on the constraints in problem (11). Then, the minimum transmit power for Message 1 is calculated based on (11b) and (11f), the minimum transmit power of Message 2 at the transmitter is calculated based on (11c) and (11f), the minimum transmit power intended for the EH user is calculated based on (11f), and the minimum transmit power of the relay is calculated based on (11c), as follows:
p1min=max22ϕ1−1σ12 hTu12,α,
p2min=maxγ1,γ2,α,
p3min=max0,α,
prmin=maxδ1,δ2,
in whichγ1=22ϕ2−1p1min hTR+σR2hTR,δ1=22ϕ2−1σu22 gRu22,γ2=22ϕ2−1−PRmax gRu1σu12p1min hTu1+σu12hTu1,δ2=22ϕ2−1−PTmax hTu1p1min hTu1+σu12σu12 gRu1, andα=2ξhTu3−2PTmax.
The overall algorithm of the proposed scheme using PSO is described in Algorithm 1. LetItmax, S, w,c1, andc2, respectively, denote the maximum number of iterations, the total number of particles, the inertia weight parameter, and the acceleration coefficients. Each particle’s position represents a vector of four elements (p1,p2,p3,pr) for which the boundaries arep1min,PTmax,p2min,PTmax,p3min,PTmaxandprmin,PRmax, respectively. Letxn,vn, andpbestndefine the position, velocity, and local best position of particle n, respectively.
In addition, the global best position of all particles is defined bygbest. We use a penalty function to deal with the constraints, where we define fitness functionfxn=fp1,p2,p3,prbased on the objective function of problem (11), as follows:
fxn=Ru1 +Ru2 12p1+p2+p3+pcT+12pr+pcR−ρ∑i=15δgi,
whereρis the penalty value,giis the i-th constraint of problem (11), andδgi=0ifgiis satisfied andδgi=1otherwise. Note that if all the constraints are satisfied (feasible point),fxn is the objective function (11a) without penalty.
Algorithm 1: The proposed PSO algorithm to solve SEE problem (11). |
Under the presence of more users, the proposed system model can be utilized by applying a user grouping scheme. For instance, a user grouping for a downlink NOMA system is proposed in [16]. In the paper, the authors considered a grouping scheme where two users are selected for each group (strong user and weak user), and the different groups use orthogonal resources by avoiding interference between groups. In [17], the authors proposed a NOMA-TDMA scheme by considering an uplink industrial IoT scenario composed of several sensors and one sink. The first step is to sort the channel gains and divide the total time into several time slots. Then, an optimization problem is formulated to allocate the power with NOMA and define the duration of the time slots, where the system allows a maximum of two users in each group, and the different groups are assigned different time slots. Based on the previous studies on many users, therefore we can group the users according to their channel gains, where each time slot is assigned to each group. In this case, there is no interference between users in different groups, and an extension of the proposed scheme can be applied to allocate the power to maximize the SEE with NOMA in each group. However, it is noteworthy that the proposed scheme considers that there is no direct link to the secondary user 2 because of path obstruction so that a cooperative relay is needed to consider. In the case of a user grouping scheme, there exist some groups where the distant secondary user has poor channel conditions. In that case, our proposed scheme based on a cooperative relay can be utilized efficiently.
In the case of multiple relays, the development of a relay selection algorithm is needed, where a simple solution is an exhaustive search among the possible relays. That is to say, we can perform the power allocation while considering each relay and choose the relay that achieves the highest SEE. However, an efficient solution with multiple relays needs a joint optimization of the power variables and relay selection, which may be topics for future research. On the other hand, the case of multiple eavesdroppers can be addressed by considering just the eavesdropper with the highest SINR to compute the secrecy rate with small modifications in (2) and (5), following the approach proposed in [18].
4. Energy Efficiency Maximization in the Baseline CR-OMA Scheme with Cooperative Relaying and an EH User In this section, we describe the baseline scheme for the energy efficiency maximization problem in OMA with cooperative relaying and an EH user. In OMA, the messages are sent to each user in different time slots. Accordingly, the transmission of each message from the transmitter to its respective secondary user in the OMA scheme involves three phases, which are detailed as follows.
In Phase 1, the transmitter sends messagex1to U1. Therefore, the rate of Message 1 at U1 can be expressed as
Rx1,Tu1_OMA=13log2(1+p1 hTu1σu12).
The rate of Message 1 at the eavesdropper is:
Rx1,TE_OMA=13log2(1+p1 hTEσEv2).
Accordingly, the secrecy rate of Message 1 is given by
Ru1_OMA=Rx1,Tu1_OMA−Rx1,TE_OMA+.
In Phase 2, the transmitter sends Message 2 to the relay. Then, the rate of Message 2 at the relay is as follows:
Rx2,TR_OMA=13log2(1+p2 hTRσR2).
In Phase 3, the relay forwards Message 2 to U2. Then, the rate of Message 2 at User 2 is
Rx2,Ru2_OMA=13log2(1+pr gRu2σu22).
The achievable rate for Message 2 is defined by the rate observed at U2 and the relay, as follows:
Ru2,min_OMA=min(Rx2,TR_OMA,Rx2,Ru2_OMA).
The rate for Message 2 at the eavesdropper is given as follows:
Rx2,E_OMA=13log2(1+p2 hTEσE2+pr gREσE2),
Therefore, the secrecy rate of Message 2 is defined as:
Ru2_OMA =Ru2,min_OMA−Rx2,E_OMA+.
To improve the OMA scheme, the transmitter does not send an energy signal to User 3, because it involves an extra period of time to send that signal; instead, we assume that User 3 stores the energy that comes to U1 from the transmitter during Phase 1 plus the energy that comes from the transmitter to the relay during Phase 2. In that way, it is possible to take advantage of the energy used by the transmitter when it sends the messages of secondary users. Accordingly, the energy stored by User 3 is given by
E3_OMA=hTu3p1+p23.
Our goal is to maximize the secrecy energy efficiency, to guarantee the QoS requirement of the minimum rate at each secondary user, minimum requered energy and to guarantee maximum permitted power at the relay and transmitter. Accordingly, the problem can be formulated as follows:
maxp1,p2,prRu1_OMA+Ru2_OMA13p1+pcT1+13p2+pcT2+13pr+pcR1
s.t.Rx1,Tu1_OMA≥ϕ1,
Ru2,min_OMA≥ϕ2,
p1≤PTmax,
p2≤PTmax,
pr≤PRmax,
E3_OMA≥ξ,
wherepcT1,pcT2andpcR1are circuit power consumption during the phase 1, phase 2 and phase 3 at the transmitter and at the relay, respectively,
Similar to the proposed solution to P1, secrecy energy efficiency maximization problem P2 for CR-OMA is solved by using the PSO algorithm. Therefore, we need to establish the boundaries for power allocation variablesp1,p2, andprto be optimized. In this sense, the minimum transmit power,p1min_OMA, is calculated based on constraints (28b) and (28g), withp2min_OMAcalculated based on (28c) and (28g), and withprmin_OMAcalculated based on constraint (28c), as follows:
p1min_OMA=max23ϕ1−1σu12 hTu1,ω,
p2min_OMA=23ϕ2−1σR2 hTR,ω,
prmin_OMA=23ϕ2−1σu22 gRu2,
whereω=3ξhTu3−PTmax.
Accordingly, the boundaries of each particle’s position for the power allocation variables in the PSO algorithm arep1min_OMA,PTmax,p2min_OMA,PTmaxandprmin_OMA,PRmax.
5. Simulation Results
In this section, we numerically evaluate the performance of our proposed PSO-based algorithm in the CR-NOMA network with cooperative relaying and an EH user, as illustrated in Figure 1, in comparison with the CR-OMA approach and with the baseline exhaustive search (ES) method. In the simulations, the channels are modeled ash˜Tu1∼CN0,dTu1−v,h˜Tu3∼CN0,dTu3−v,h˜TR∼CN0,dTR−v,h˜TE∼CN0,dTE−v,g˜Ru1∼CN0,dRu1−v,g˜Ru2∼CN0,dRu2−v,g˜RE∼CN0,dRE−v,h˜Tp∼CN0,dTp−v, andg˜Rp∼CN0,dRp−v, wheredijis the distance between device i and j, and the path loss exponent is defined by v. We evaluated the proposed algorithm with the following parameters:v=4,σ2=−60dBm,w=0.7, andc1=c2=1.494. The simulations were carried out on a computer with 16 GB of RAM and an Intel Core i7-6700K CPU by using Matlab.
The distance from the transmitter to the EH user is set asdTu3=10 m. This distance needs to be small since the RF signal is attenuated as the distance increases and there exists a minimum energy harvesting requirement. In addition, it is common to find in the literature distances of 10 m or less for an EH user. For instance, we can refer to [11], where the authors used a distance of four meters from the secondary BS to the secondary EH users.
On the hard, depending on the scenario, the distances of the secondary users can be small. For example, picocells consider a maximum range of 200 m [19]. In the literature, common distances assumed to NOMA users are in the range of 10 to 80 m [2,6,20]. In addition, the objective of the proposed optimization problem is to maximize the SEE of the secondary network, which has relatively small distances since the transmission power is constrained with a maximum permissible interference with the primary users. In this paper, therefore we consider the distances from the secondary transmitter to User 1, the relay, the PU, and the eavesdropper asdTu1=30,dTR=50,dTp=60, anddTE=50in meters, respectively. The distances from the relay to User1, User2, the PU, and the eavesdropper are defined asdRu1=30,dRu2=50,dRp=50anddRE=30in meters, respectively.
With respect to the maximum permissible interference power with the PU, Tuan et al. [21] studied the effects of the maximum permissible interference power in a range from −30 dBm to −90 dBm. In addition, the trade-off between the interference power and throughput of the cognitive network was investigated in [22], where the authors considered a range from −10 dBm to −40 dBm for the maximum permissible interference power. It is noteworthy that as we increase the maximum interference power value, we obtain a wider feasible domain of the problem. Then, to analyze the worst scenario, we selectImax=−60dBm.
To define the number of particles in the proposed PSO-based algorithm, we analyze the relative change of the objective function, i.e., SEE, for several numbers of particles, S. The relative change can be defined asfgbesti−1−fgbestifgbesti−1−fgbestifgbesti−1fgbesti−1, wherefgbesti−1is the fitness function of the global best particle at iterationi−1andfgbesti is the fitness function of the global best particle at the current iteration i. We present in Figure 2 the relative change of the SEE when the number of particles are equal to 25, 20 and 15, respectively. The values of the minimum rates at the secondary users areϕ1=ϕ2=1(bit/s/Hz),the minimum energy harvested by the EH user isξ=−18dBm,and the transmit power at both the transmitter and the relay isPT=PR=30dBm . In addition, Table 2 shows the comparison of a different number of particles when the number of iterations was selected to satisfy a tolerance of10−4in the relative change of the SEE. The absolute error is evaluated by taking into account the SEE obtained by exhaustive search. We can observe that the absolute error is very small for all the cases with a small value in the computational time. The case withS=10archives the lowest computational time, however, the small number of particles in PSO can lead to a local optimal solution, which should be avoided. Therefore, in the paper, we had selectedS=20particles to be used in the rest of the simulations.
Figure 3 shows the convergence behavior of the proposed algorithm given in Algorithm 1 for an average of several channel realizations. The value of the minimum rates at the secondary users areϕ1=ϕ2=0.5,1,1.5(bits/s/Hz), the minimum energy harvested by the EH user isξ=−18dBm and the maximum available transmission power at the transmitter and the relay isPT=PR=30 dBm. We can see that the SEE is enhanced as the iteration index is increased, and its convergence reaches a stable value from iteration index 50. However, from Table 2, we observe that we need at least 90 iterations to achieve a tolerance of10−4. Then, we considerItmax=70for further simulations, which is a trade-off between accuracy and computational time. We also observed that the SEE increases when decreasing the minimum data rate requirement of the secondary users. The reason for this is that the transmitter and the relay should deliver low transmission power to satisfy the low required rate of the secondary users. Consequently, the eavesdropper hardly trap the messages transmitted from the transmitter and the relay.
Note that if a lower computational time is needed, we can reduce the number of particles and iterations with a consequent reduction in the accuracy of the solution. For instance, at 40 iterations, the tolerance value is around 0.03 with an absolute error of around 0.0008 in the case ofS=20andϕ1=ϕ2=1(bits/s/Hz).
In this paper, we analyze the computational cost based on the number of equations that the PSO-based algorithm needs to compute in each iteration, where a detailed study of the operations involved in each equation is omitted since it includes simple operations that just uses real values and do not have matrix operations. In addition, it is assumed that the secondary transmitter has high computational capabilities.
The computational cost for a complete iteration of the proposed PSO-based algorithm depends on the evaluation of the objective function and constraints in the problem (11), and the computations needed to update the velocity and position of the particles. First, from the problem (11), the algorithm needs to evaluate the expressions of the rates and the energy harvested for the current particle position, which requires the evaluation of 10 equations involving just real numbers. To estimate the objective function and constraints, it is also necessary to evaluate 8 equations and one additional equation for obtaining the fitness function in (18). Second, for each particle, we require to calculate two random numbers and evaluate 8 equations for the velocity update and position update since we have four variables. Third, we limit the position of the particle and find the local and best positions by computing six equations. Then, for each particle n, we need to execute around 35 equations. Since the algorithm repeats the process for a total ofItmaxiterations, the total number of equations to be evaluated is35×S×Itmax, which can be mathematically expressed as the computational complexity ofOS×Itmax.
In the case of the exhaustive search method, the complexity depends on the range of the variables which is based on numerical precision. Let us defineζas the steps used for the power variables, then the total possible values for the variablep1areΥp1 =PTmax−p1min+ζPTmax−p1min+ζζζ , where the same procedure is applied to the other variables to obtain Υp2, Υp3 and Υpr. Then, for the ES method, we need to evaluate the objective function and constraints a total number of Υp1 × Υp2 × Υp3 × Υpr times. We can observe that the proposed PSO-based scheme permits a huge reduction in the computational complexity compared with the exhaustive search. For instance, in the case of ϕ1 = ϕ2 = 1 (bits/s/Hz) and = −18 dBm with a step of ξ = 1, the computational time of ES is around 72,4492 (s), which increases exponentially by reducing the value of ξ, i.e., with more numerical precision. By contrast, the PSO-based algorithm achieves a computational time of 18.92 (ms) with a number of particles equal to 20 and 90 iterations as we can see in Table 2.
Figure 4 shows a comparison of SEE performance between our proposal using NOMA and the conventional OMA scheme in accordance with the SEE objective function versus the minimum data rate at the secondary users when the minimum energy harvested by the EH user isξ=−15dBm, when the maximum available transmission power at the transmitter and the relay isPT=PR=30 dBm. From Figure 4, we can see that the NOMA scheme significantly outperforms the traditional OMA. This is because, under NOMA, the location of both users is exploited to simultaneously transmit to User 1 and User 2, in which the power allocated for the distant user is higher, compared to the power allocated for the closer user. This strategy is complemented with SIC in which the closer user first decodes the message of the distant user, where the SINR is high since it has the higher power, and it then subtracts that contribution to easily decode its own message (the message for the closer user). For the distant user, the interference from the message of the closer user is low, since the power allocated to this message is not high. On the other hand, the OMA scheme does not use SIC and the transmitter needs different periods of time to send each message to each intended user. Then, the transmission under the NOMA scheme is completed in two phases, as shown in Figure 1, while the transmission under OMA is completed in three phases. Therefore, because NOMA uses the resources more efficiently, it achieves better performance than the OMA scheme.
Moreover, we can see that the result obtained by our proposed PSO-based method achieves performance very close to that obtained by the exhaustive search method, but with lower complexity. The reason is that the PSO-based method iteratively updates the global and local particles’ positions to search for the optimal solution, instead of systematically evaluating all possibilities to find its optimal solution, as the exhaustive search method does.
Figure 5 and Figure 6 show that the proposed CR-NOMA scheme outperforms the baseline OMA scheme, and this finding confirms the outcomes obtained in the simulation results seen in Figure 3. From Figure 5, we can see that the SEE decreases when increasing the minimum required harvested energy at User 3. This is because the transmitter needs to send more power to satisfy the requirement of the EH user, and this fact requiresp3 to increase, which is inversely proportional to the maximization of the objective function (11a). Moreover, as the values of the data rate requirement increase, the SEE performance decreases, since more power must be delivered by the transmitter and the relay in order to satisfy the data rate requirements, which makes it easier for the eavesdropper to catch the messages. Figure 6 shows a comparison of SEE performance between our proposal using NOMA versus the minimum energy harvested by User 3 when the minimum data rates at the secondary users areϕ1=ϕ2=0.5,1,1.5(bit/s/Hz), when the maximum available transmission power at the transmitter and the relay isPT=PR=30 dBm. From Figure 6, we verify that the performance under NOMA is superior to OMA, and we can see that when the values of energy harvested and for data rate requirements increase, the values of the SEE start to decay.
6. Conclusions This paper proposes a low-complexity PSO-based algorithm to maximize the SEE in a cooperative relay CR-NOMA network with an EH user. The power allocation variables for each user are optimized to achieve SEE maximization under the following constraints: a minimum data rate for secondary users, a minimum level of harvested energy for the EH user, and the maximum permitted transmission power at both the secondary transmitter and the relay (based on a threshold for interference with the primary user). To validate the outcomes of the proposed solution, we compared the performance of our proposed PSO-based algorithm with the exhaustive search method. We confirmed that PSO achieves near-optimal performance compared to that obtained by the high computational–complexity exhaustive search method. Moreover, we studied SEE maximization in a cooperative relaying CR-OMA network with an EH user and compared it with our proposed scheme using the NOMA transmission strategy. The experimental results confirm the advantage of the proposed NOMA method compared to the OMA scheme, where an improvement in the SEE of around 40% to more than 100% is achieved by NOMA compared with OMA in the scenario varying the minimum energy harvested at user 3.
Figure 3. The convergence behavior of the proposed PSO-based algorithm with different minimum rates at the secondary users.
Figure 4. SSE performance comparison between the exhaustive search method, CR-NOMA with cooperative relaying, and CR-OMA with cooperative relaying, based on the minimum data rate requirements for the secondary users.
Figure 5. SSE performance comparison between CR-NOMA and CR-OMA according to the minimum harvested energy at User 3 and the minimum rates at secondary User 1ϕ1and secondary User 2ϕ2.
Figure 6. SSE performance comparison between CR-NOMA and CR-OMA according to the minimum harvested energy at User 3 with three different values for the data rate requirements at secondary User 1ϕ1and secondary User 2ϕ2.
Abbreviation | Term | Abbreviation | Term |
---|---|---|---|
NOMA | non-orthogonal multiple access | PSO | particle swarm optimization |
OMA | orthogonal multiple access | QoS | quality of service |
SIC | successive interference cancellation | TDMA | time-division multiple access |
PLS | physical layer security | U1 | nearby secondary user |
SEE | secrecy energy efficiency | U2 | distant secondary user |
Number of Particles | 30 | 25 | 20 | 15 | 10 |
---|---|---|---|---|---|
N. of iterations | 80 | 85 | 90 | 90 | 100 |
Absolute error | 6.25×10−6 | 1.39×10−5 | 3.13×10−5 | 0.000353 | 0.001005 |
Time (ms) | 22.54316 | 20.96096 | 18.91602 | 13.08286 | 9.843146 |
Author Contributions
C.E.G. conceived and proposed the research idea. All authors designed the experiments. C.E.G. performed the experiments. M.R.C. and I.K. analyzed the experimental results. C.E.G. wrote the paper under the supervision of I.K. All authors have read and agreed to the published version of the manuscript.
Funding
This research was supported by the National Research Foundation of Korea (NRF) through the Korean Government and the Ministry of Science and ICT (MSIT) under Grant NRF-2018R1A2B6001714.
Conflicts of Interest
The authors declare no conflict of interest.
1. Wan, D.; Wen, M.; Ji, F.; Yu, H.; Chen, F. Non-Orthogonal Multiple Access for Cooperative Communications: Challenges, Opportunities, and Trends. IEEE Wirel. Commun. 2018, 25, 109-117.
2. Wang, R.; Liu, G.; Zhang, H.; Kang, W.; Tsiftsis, T.; Leung, V.C.M. Resource Allocation for Energy-Efficient NOMA Network Based on Super-Modular Game. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20-24 May 2018.
3. Wang, D.; Men, S. Secure Energy Efficiency for NOMA Based Cognitive Radio Networks With Nonlinear Energy Harvesting. IEEE Access 2018, 6, 62707-62716.
4. Liu, Q.; Tan, F.; Lv, T.; Gao, H. Energy efficiency and spectral-efficiency tradeoff in downlink NOMA systems. In Proceedings of the 2017 IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France, 21-25 May 2017.
5. Zhang, M.; Cumanan, K.; Thiyagalingam, J.; Wang, W.; Burr, A.G.; Ding, Z.; Dobre, O.A. Energy Efficiency Optimization for Secure Transmission in MISO Cognitive Radio Network With Energy Harvesting. IEEE Access 2019, 7, 126234-126252.
6. Zhang, Y.; Wang, H.-M.; Yang, Q.; Ding, Z. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access. IEEE Commun. Lett. 2016, 20, 930.
7. Tang, J.; Dai, T.; Cui, M.; Zhang, X.Y.; Shojaeifard, A.; Wong, K.-K.; Li, Z. Optimization for Maximizing Sum Secrecy Rate in SWIPT-Enabled NOMA Systems. IEEE Access 2018, 6, 43440-43449.
8. Garcia, C.E.; Camana, M.R.; Koo, I.; Rahman, M.A. Particle Swarm Optimization-Based Power Allocation Scheme for Secrecy Sum Rate Maximization in NOMA with Cooperative Relaying. In Proceedings of the 2019 International Conference on Intelligent Computing (ICIC), Nanchang, China, 3-6 August 2019.
9. Yao, R.; Yao, L.; Zuo, X.; Qi, N.; Liu, Y.; Xu, J. Secrecy Energy Efficiency Maximization in a NOMA System. In Proceedings of the 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, 12-15 June 2019.
10. Garcia, C.E.; Tuan, P.V.; Camana, M.R.; Koo, I. Optimized Power Allocation for a Cooperative NOMA System with SWIPT and an Energy-Harvesting User. Int. J. Electron. 2020, accepted.
11. Mao, S.; Leng, S.; Hu, J.; Yang, K. Power Minimization Resource Allocation for Underlay MISO-NOMA SWIPT Systems. IEEE Access 2019, 7, 17247-17255.
12. Wu, Q.; Li, G.Y.; Chen, W.; Ng, D.W.K.; Schober, R. An Overview of Sustainable Green 5G Networks. IEEE Wirel. Commun. 2017, 24, 72-80.
13. Camana, M.R.; Tuan, P.V.; Garcia, C.E.; Koo, I. Joint power allocation and power splitting for MISO SWIPT RSMA systems with energy-constrained users. Wirel. Netw. 2020, 26, 2241-2254.
14. Song, M.; Zheng, M. Energy Efficiency Optimization For Wireless Powered Sensor Networks With Nonorthogonal Multiple Access. IEEE Sens. Lett. 2018, 2, 1-4.
15. Zhang, Y.; Wang, S.; Ji, G. A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications. Math. Probl. Eng. 2015, 2015, 931256.
16. Kang, J.-M.; Kim, I.-M. Optimal User Grouping for Downlink NOMA. IEEE Wirel. Commun. Lett. 2018, 7, 724-727.
17. Sun, Y.; Guo, Y.; Li, S.; Wu, D.; Wang, B. Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things. Sensors 2018, 18, 1572.
18. Feng, Y.; Yan, S.; Liu, C.; Yang, Z.; Yang, N. Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1670-1683.
19. Mukherjee, A.; Bhattacherjee, S.; Pal, S.; De, D. Femtocell based green power consumption methods for mobile network. Comput. Netw. 2013, 57, 162-178.
20. Al-Obiedollah, H.M.; Cumanan, K.; Thiyagalingam, J.; Burr, A.G.; Ding, Z.; Dobre, O.A. Energy Efficient Beamforming Design for MISO Non-Orthogonal Multiple Access Systems. IEEE Trans. Commun. 2019, 67, 4117-4131.
21. Tuan, P.V.; Koo, I. Optimal Multiuser MISO Beamforming for Power-Splitting SWIPT Cognitive Radio Networks. IEEE Access 2017, 5, 14141-14153.
22. Le, T.A.; Navaie, K. On the Interference Tolerance of the Primary System in Cognitive Radio Networks. IEEE Wirel. Commun. Lett. 2015, 4, 281-284.
Carla E. Garcia, Mario R. Camana and Insoo Koo*
School of Electrical and Computer Engineering, University of Ulsan, Ulsan 680-749, Korea
*Author to whom correspondence should be addressed.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2020. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Security is considered a critical issue in the deployment of 5G networks because of the vulnerability of information that can be intercepted by eavesdroppers in wireless transmission environments. Thus, physical layer security has emerged as an alternative for the secure enabling of 5G technologies and for tackling this security issue. In this paper, we study the secrecy energy efficiency (SEE) in a downlink underlying cognitive radio (CR)—non-orthogonal multiple access (NOMA) system with a cooperative relay. The system has an energy-harvesting (EH) user and an eavesdropper, where the transmitter provides direct communication with a close secondary user and a distant secondary user via the relay. Our objective is to maximize the SEE of the CR-NOMA system under the constraints of a minimum information rate for the secondary users, a minimum amount of energy harvested by the EH user, and maximum power availability at the transmitter and the relay that still prevents them from causing unacceptable interference with the primary user. The proposed solution to maximize the SEE is based on the low-computational—complexity particle swarm optimization (PSO) algorithm. For validation purposes, we compare the optimization outcomes obtained by the PSO algorithm with the optimal exhaustive search method. Furthermore, we compare the performance of our proposed CR-NOMA scheme with the conventional orthogonal multiple access (OMA) scheme.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer