Abstract
With the development of the Internet of Things (IoT), more and more devices are connected in edge-cloud environment, and spectrum scarcity has become a major bottleneck for the employment of IoT devices in the end side of cloud computing. In addition, due to the broadcast nature of RF link, the potential eavesdropper may be presented in the wireless environment. To improve spectrum efficiency (SE) and ensure safe transmission of the users, in this paper, the two-way relay cooperative Cognitive Radio Non-Orthogonal Multiple Access (CR-NOMA) with massive multiple-in multiple-out (MIMO) is proposed. Our objective is to maximize the security energy efficiency (SEE) of the cognitive system subject to the quality of service (QoS) of users. Specifically, the multi-objective optimization problem is decomposed into three subproblems, i.e., the optimization of transmit power, power allocation, and antenna selection, respectively. The Lagrange dual algorithm based on the first-order Taylor series expansion function is proposed to solve the non-convex problem. Moreover, a novel orthogonal antenna selection algorithm is proposed to decrease the cost of radio frequency chains and limit the interference to the primary user. The simulation results show that the proposed scheme has significant performance gain on SEE. It can effectively increase the number of access for cloud computing edge IoT users. In addition, due to the impact of correlation between the antennas, as the number of relay antennas increases, the SEE converges to a specific value, which exists the optimal number of antenna.
Similar content being viewed by others
Explore related subjects
Find the latest articles, discoveries, and news in related topics.Avoid common mistakes on your manuscript.
1 Introduction
Internet of Things (IoT) has become one of the main-stream emerging communication paradigms, which connects all internet devices through information sensing equipment to achieve intelligent identification and management [1, 2]. As a Architectural pattern of IoT, edge cloud combines the advantages of edge computing and cloud computing, which has the functions of low latency data processing, data filtering and simplification, providing better choices for the design and deployment of IoT systems [3]. However, spectrum scarcity has become a major bottleneck for the employment of IoT devices in edge cloud environment [4]. Cognitive radio (CR) has great promise to improve the spectrum efficiency (SE) of the system. In particular, we consider the underlay cognitive radio scenario, which allows secondary users (SUs) to access the spectrum of the primary network while ensuring the quality of service (QoS) of the primary users (PUs) [5, 6]. Besides CR, non-orthogonal multiple access (NOMA) is another promising technique to enhance system SE and achieve massive connectivity of IoT devices in CR networks by employing the underlying strategy. Different from the traditional orthogonal multiple access (OMA), NOMA services multiple users with the same radio resource, in which users are distinguished by different power, which can be achieved by applying successive interference cancellation (SIC) at the receiver [7,8,9].
Integrating the NOMA technology into CR networks will have great potential to improve SE and satisfy the IoT requirements of massive connectivity as it can serve more SUs by sharing the licensed spectrum with PUs [8, 10, 11]. However, the interference constraint in cognitive radio non-orthogonal multiple access (CR-NOMA) can severely limit the transmission rate achievable of the SUs [12]. In addition, due to the effects of non-line-of-sight transmission, deep fading, and shadow effects between the transmitter and receiver of the SUs in the actual transmission process, direct link transmission may have poor channel conditions [13]. Two-way relay (TWR) is an attractive solution to circumvent this challenge, which can simultaneously send or receive user information from different directions within the same time slot. Compared to the traditional one-way relay, TWR not only reduces long-distance transmission path loss but also improves the utilization of spectrum resources [14].
However, with the development of intelligent IoT, a large number of sensing devices have flooded into the network access side, how to improve the network access capability is also an urgent and noteworthy issue. Latest, massive multiple-input multiple-output (MIMO) techniques have also been identified as a key enabling technology for improving the access performance of the next-generation wireless network, which adjusts multiple-antenna units by controlling the phase and signal amplitude of the signals emitted by each antenna unit, generating directional beams, and allowing the wireless signal energy to form an electromagnetic wave superposition at the mobile phone position. Massive MIMO not only increases the number of user access, but also ensures higher communication capabilities [15]. In addition to high SE and the QoS of the uses, in practice, due to the broadcast nature of NOMA as well as RF link itself, the potential eavesdropper may be presented in the wireless environment, stealing part of the information sent to the destination node [16]. Therefore, it is urgent to ensure the secure communication of the CR-NOMA systems and studies the physical layer security performance of the cognitive radio-inspired NOMA network, a user pairing method based on optimal channel gain is proposed. However, in the scheme, the NOMA users are limited, and large-scale access scenarios are not considered. To meet the requirements of high SEE, massive connectivity and low power consumption for IoT devices in CR-NOMA networks, a scheme is investigated to improve the SEE of the unlicensed SUs.
The main contributions are summarized as follows:
-
TWR cooperative CR-NOMA with massive MIMO scheme is proposed to improve the security energy efficiency of the cognitive network, where two groups of NOMA users exchange the message with the aid of the TWR. Considering the existence of physical layer security problems in practical systems, the joint optimization strategy based on power splitting (PS) ratios, transmission power and antenna selection is proposed, which can achieve a better tradeoff between security and energy consumption.
-
The problem of maximizing security energy efficiency is formulated under the constraints of ensuring the primary user’s quality of service and NOMA user de-coded successfully. Fractional programming is introduced to convert the original fraction optimization into tractable integral expression.
-
The objective function is a non-convex and complex multi-objective optimization problem. To tackle the problem, transformed it into three single-objective problem. The semi-determined relaxation algorithm based on the first-order Taylor series expansion function is proposed to convert the problem into convex function. The novel orthogonal antenna selection algorithm is proposed to optimize the number of antennas. In order to get the optimal solution of SEE, a multi-objective iterative algorithm (MOIA) is proposed to solve it.
-
The numerical results are presented to demonstrate under same parameters the proposed scheme of cognitive massive-MIMO-NOMA with two-way relay has more obvious advantages in improving system security energy efficiency. Moreover, due to the impact of correlation between the antennas, as the number of relay antennas increases to infinity, the SEE converges to a specific value, which exist the optimal number of antennas.
2 Related Works
Recently, two-way relay (TWR) as a promising relay technology has been widely used in the cooperative transmission of CR-NOMA systems. Different from one-way relay, two-way relay can send or receive user information from different directions in the same time slot, which has huge potential in improving user transmission performance and spectrum utilization [17]. The authors of [18] and [19] are dedicated to improving the signal-to-noise ratio of cooperative TWR in the cognitive radio network. Specifically, in [18], the two-way relay was applied in cognitive hybrid satellite-terrestrial networks and multi-antenna secondary users transmit, the content caching technology was designed to minimize network transmission delay. The authors of [19] study the two-way relay assistant cooperative network, the algorithm of joint optimal relay selection and spectrum allocation was proposed to maximize the receive signal-to-noise ratio of SUs. Recently, TWR technology has been widely used in NOMA systems to improve spectral efficiency [20, 21]. In [20], the achievable ergodic secrecy rates of NOMA users have been deduced, which has proved the effectiveness of TWR in improving the security rate of the main link and eavesdropping link. In [21], the asymptotic outage probabilities and ergodic rate of the TWR-NOMA system were analyzed under the conditions of perfect successive interference cancellation and imperfect serial interference cancellation.
Besides, relay cooperation CR-NOMA system, multiple-antenna technology has been testified as an efficient scheme to improve the performance of NOMA systems for IoT devices [22, 23]. Tang et al. [24] propose a hybrid cell-free large-scale antenna NOMA system model, and the system throughput is optimized under the constraints of intra-cluster interference and inter-cluster interference, which shows that the proposed scheme has obvious advantages in improving the utilization of spectrum resources and increasing the number of users access. Based on [24], the authors of [25] study the user bandwidth efficiency of cell-free large-scale antenna NOMA system, the maximum–minimum optimization strategy is proposed to optimize system performance. In [26], the impact of predefined power allocation and range power allocation schemes on the throughput of massive MIMO-NOMA systems was investigated. In [27], the outage probability performance of multi-antenna NOMA systems affected by the actual machine-type communications was studied, including receiving sequence and access quantity of the receivers, which demonstrated the performance gains of the proposed multi-antenna have an obvious advantage over the single-antenna. In order to reduce the complexity of the massive MIMO system and improve the energy efficiency of the system, [28] proposed the algorithm based on the dinkelback and alternating optimization framework.
Although increasing the number of antennas has a clear advantage in improving system performance, to a certain extent, results in power consumption and the waste of radio frequency (RF) chains. Transmission antenna selection (TAS) has been widely used in large-scale antenna systems to solve the problem [29]. In [30], the backhaul combination scheme based on a large-scale MIMO-NOMA system was investigated, in which the optimization algorithm is proposed to maximize the signal-to-interference-plus-noise ratio of the backhaul link. In [31], the outage probability for Cooperative MIMO-NOMA was studied, and in order to improve the system’s outage probability, a hybrid antenna scheme based on antenna selection and maximum ratio combining is proposed. In [32], in order to improve the performance of MISO-NOMA system for the Internet of Vehicles (IoV) field, a fusion antenna selection scheme for near and far users is proposed, which verifies the obvious advantages in improving the channel attenuation. Similar to [32], the authors of [33] consider the joint antenna selection algorithm to improve the outage probability. Considering cooperative cognitive NOMA systems, in [34], a novel joint user selection and antenna transmit of scheme is proposed. It is envisioned that TAS can significantly reduce the complexity of large-scale antenna CR-NOMA systems [30,31,32,33,34]. However, the interference of the secondary user to the primary user is ignored in the antenna selection process. In this paper, we propose a novel-based orthogonal selection algorithm, which is aimed to maximize the transmission performance of SUs with minimal interference to the primary users (PUs).
In addition, due to the broadcast nature of NOMA as well as CR and the dual function of RF signals [35], NOMA CRNs relying on TWR is vulnerable to be eavesdropped. Therefore, it is urgent to ensure the secure communication of the CR-NOMA system [36, 37]. In [38], the physical layer security performance of the cognitive radio-inspired NOMA network is studied, and a user pairing method based on optimal channel gain is proposed. In [39], the problem of security resource allocation of CR-NOMA system under the influence of interference with base stations to effectively improve the security rate of the system is studied. Tang et al. [40] propose a secure transmission mode of 3D UAV based on CR-NOMA network, and compared with the benchmark scheme, the method has obvious advantages in improving security. In order to improve the physical layer security performance of the CR-NOMA system, Zhao et al. [41] propose a secure beamforming scheme to improve the secure transmission of CR-NOMA system.
3 System Model
The system model as shown in Fig. 1, which mainly contains two groups of secondary users (SUs) \(G_{1} = \left\{ {C_{1} ,C_{2} ,...,C_{K} } \right\}\),\(G_{2} = \left\{ {C_{K + 1} ,C_{K + 2} ,...,C_{2K} } \right\}\) and a pair of primary users. The two-way relay is applied in the system to assist the secondary users transmission. It is assumed that TWR has M antennas, the cognitive users have N antennas, while other nodes are equipped with one antenna. Relay assists the exchange of information between two sets of secondary users, mainly including two time slots, multiple access and broadcast time slots.
Multiple-Access Slot: SUs transmits the information to TWR with the uplink NOMA. As the result, the TWR is equipped with two set of antennas, and the self-interference exists when receiving and transmitting signals. The signal received by the TWR is given by
where \({\mathbf{h}}_{i} \in {\mathbb{C}}^{M \times N}\) is the channel between the \(C_{i}\) and TWR, with \(\left| {{\mathbf{h}}_{1} } \right|^{2} \le \left| {{\mathbf{h}}_{2} } \right|^{2} \le ,..., \le \left| {{\mathbf{h}}_{K} } \right|^{2}\),\(\left| {{\mathbf{h}}_{K + 1} } \right|^{2} \le \left| {{\mathbf{h}}_{K + 2} } \right|^{2} \le ,..., \le \left| {{\mathbf{h}}_{2K} } \right|^{2}\). \({\mathbf{h}}_{PR}\) is the channel between the PT and TWR, \(x_{i} (i = 1,2,...2K)\) and \(s_{n}\) are the transmission signals of \(C_{i}\) and PU, respectively. \({\mathbf{n}}_{r} \sim CN(0,\delta^{2} {\mathbf{I}})\) is the Gaussian noise at TWR. \(P_{s,i}\) and \(P_{t}\) are the transmit power of \(C_{i}\) and PU, respectively. For the received signal, the received signal-to-interference-plus-noise ratio (SINR) at TWR to detect \(x_{m}\) of \(G_{1}\) is given by
where \(\sum\nolimits_{i = K + 1}^{2K} {\left| {{\mathbf{h}}_{i} } \right|^{2} } P_{s,i}\) is the interference from \(G_{2}\) at the TWR. The rate at TWR to decode the n-th NOMA user in \(G_{2}\) is given by
Broadcast plot: The information is exchanged between the \(G_{1}\) and \(G_{2}\) by the virtue of TWR. Since the cognitive users in the two sets have the same transmission mechanism, the only one set users in \(G_{1}\) are considered. Therefore, in the broadcast plot, relay node transmits information to the users with downlink NOMA, and the signals received at k-th SUs in \(G_{1}\) can be written as
where \(P_{R}\) denotes the transmit power of TWR. \(n_{k} \sim CN(0,\sigma_{k}^{2} )\) is the Gaussian noise, where \(a_{i} (i = 1,2,...,K)\) denotes the power allocation of TWR with \(\sum\nolimits_{i = 1}^{K} {a_{i} } = 1\). Moreover, we adopt a low complexity maximum ratio transmission (MRT) beamforming scheme. Such a beamforming scheme can be expressed as \({\mathbf{w}}_{i} = {\hat{\mathbf{h}}}_{Ri} /\left\| {{\hat{\mathbf{h}}}_{Ri} } \right\|\). Without loss of generality, the channel gains are sorted as \(\left| {{\mathbf{h}}_{R1} {\mathbf{w}}_{1} } \right|^{2} \le \left| {{\mathbf{h}}_{R2} {\mathbf{w}}_{2} } \right|^{2} \le ... \le \left| {{\mathbf{h}}_{Rk} {\mathbf{w}}_{k} } \right|^{2} \le ... \le \left| {{\mathbf{h}}_{RK} {\mathbf{w}}_{K} } \right|^{2}\). According to NOMA protocol, received SINR of k-th SU can be given by
Therefore, the rate of \(C_{k}\) can be written as \(R_{k} = \log_{2} (1 + \gamma_{k} )\). With the purpose of realizing user \(C_{k}\) to decode the signal of user \(C_{l}\), it should be satisfied \(l < k\), so the decoding rate can be given by
where \(b = P_{R} \sigma_{e}^{2} (\sum\nolimits_{i = k + 1}^{K} {a_{i} \left| {{\mathbf{w}}_{i} } \right|^{2} } )\). Due to the broadcast nature of the wireless channel, it is easy to be eavesdropped by illegal users during the actual transmission of information, so two eavesdroppers \(E_{1}\) and \(E_{2}\) are considered in the system model. Thus, the signal transmitted by TWR eavesdropped by \(E_{1}\) can be written as
where he denotes the channel gain from TWR to \(E_{1}\). \(n_{e}\) is the additive white Gaussian noise due to the receiving antenna at the eavesdropper with the variance \(\sigma_{E}^{2}\). Therefore, the signal received by eavesdropper \(E_{1}\) to overhear \(C_{k}\) is obtained by
Just like all cognitive radio networks, in the CR-NOMA system, cognitive users can communicate normally under the constraint of the interference to the primary users is less than the minimum threshold. The received rate of primary user can be obtained as
where \({\mathbf{h}}_{RP}\) and \({\mathbf{h}}_{PP}\) denote the channel from TWR to PR and PT to PR, respectively, \(n_{P}\) is the Gaussian noise of PR.
4 Problem Formulation
In this part, we evaluate the system performance with the security energy efficiency (SEE), because the SEE is defined as the ratio of security rate to the actual energy consumption, so we first give the expression of the system’s security sum rate. For the convenience, cognitive users on both sides of TWR are assumed to have transport mechanisms, so only the cognitive users in \(G_{1}\) is considered. For \(1 \le k \le K\), therefore, the security rate achievable by the k-th user and the sum rate can be, respectively, given by
where \(\left[ x \right]^{ + } \triangleq \max (0,x)\). From above, it can be seen when \(R_{k} \le R_{e}^{k}\), \(R_{S}^{k}\) will be zero. Furthermore, it assume that when \(k = N\), we have \(R_{n} \le R_{e}^{N}\), In this case, there are \(N\) users whose secrecy rate is zero. The channels of the \(K\) cognitive users are sorted as \(0 \le \left| {{\mathbf{h}}_{R1} {\mathbf{w}}_{1} } \right|^{2} \le \left| {{\mathbf{h}}_{R2} {\mathbf{w}}_{2} } \right|^{2} \le ... \le \left| {{\mathbf{h}}_{e} {\mathbf{w}}_{k} } \right|^{2} \le ... \le \left| {{\mathbf{h}}_{RK} {\mathbf{w}}_{W} } \right|^{2}\). Then, the expression of formula (15) can be rewritten as
The actual energy consumption of the system can be given by
where \(\xi\) is energy efficiency, \(P_{R}\) is the TWR transmission power of TWR, and \(P_{C}\) denotes other energy consumption for system operation besides \(P_{R}\). Consequently, the objective function is set to maximize the security energy efficiency by adjusting power allocation and transmit power. To the end, the optimization problem p0 is formulated as
where \(r_{{{\text{th}}}}\) and \(R_{m}\) represents the minimum constraints for the transmission rate of the primary users and cognitive users, respectively; Eq. (18c) denotes the constraint of the TWR power allocation. Moreover, \(P_{\max }\) is the maximum transmit power of TWR.
5 Optimization Solution
In this section, we first decouple the problem into three subproblems, i.e., the optimization of transmission power, power allocation and antenna selection. Next, we propose a multi-objective alternative iterative algorithm to obtain global optimal of security energy efficiency.
5.1 Optimization of the Transmission Power
The objective function in (18) is non-convex. In order to avoid high complexity of the solution to this problem, we introduce the following parameter transformation. In this section, the fractional programming is introduced to reduce the complexity by transforming fractional problems into equation problems with parameter \(\lambda\), which can be formulated as \(F(\Xi ,\lambda ) = R_{S} - \lambda P_{{{\text{tot}}}}\), and \(\Xi\) is the collection of variable \(P_{R}\), \(M\) and \(a_{i}\), and only if it is the root that satisfies with the formula \(g(\lambda ) = 0\), which of the optimal value of \(g(\lambda )\). Theorem 3.1 is formulated to solve the optimal solution \(\lambda^{*}\) of \(g(\lambda )\).
Theorem 3.1
g(λ) is convex, continuous and decreasing function of \(\lambda\), and the optimal solution of problem \(a_{i}\) exists at \(F(\Xi ,\lambda ) = 0\).
It is assumed that optimize the transmit power \(P_{R}\) with the variables power allocation \(a_{i}\),\(\lambda^{*}\) and the number of transmission antennas M are given; therefore, the optimization problem is formulated as \(p_{1}\):
Obviously, it is very difficult to solve problem \(p_{1}\) directly because it is a non-convex problem. A convex approximation method based on Taylor expansion is proposed to transform the constraints (15a) and (15b) approximate them as convex constraints. According to Taylor formula, the secrecy sum rate \(R_{S}\) can be approximately formulated as
where \(\tilde{\sigma } = \sigma_{e}^{2} \sum\nolimits_{i = 1}^{K} {a_{i} }\). The second and fourth terms in \(R_{{{\text{tot}}}}^{*}\) are extended to approximate affine functions with the first-order Taylor formula:
where \(\varepsilon_{1}\) and \(\varepsilon_{2}\) denote the Taylor expansion error, and the specific expressions of \(\Theta_{1}\) and \(\Theta_{2}\) are, respectively, given by
Based on (22) and (23), the sum rate of SUs is rewritten as
where \(\varsigma = \sum\nolimits_{i = 1}^{2} {\Theta_{i} } + \varepsilon_{i}\), \(\varsigma\) is a constant for the given \(P_{0}\). Constraints (15a) and (15b) are also converted by this way, which can be, respectively, given by
where \(\varepsilon_{3}\) is the Taylor expansion error:
By deriving from the above formula, problem \(p_{1}\) can be rewritten as
Note that the problem is convex and satisfies the Lagrangian dual optimization problem. The dual problem of \(P_{R}\) can be expressed as
Assuming that inequality constraints (25a) and (25b) are strictly feasible, that is \(P_{R}\), they both exist, \(R_{P}^{*} (P_{R} ) \ge r_{th}\), \(R_{k}^{*} (P_{R} ) \ge R_{m}\),\(P_{R} \le P_{\max }\). Then, there exists \(P_{R}\) and \(w\),\(\mu\),\(\gamma\), so that \(P_{R}\) is the optimal solution of the original problem, \(w\),\(\mu\),\(\gamma\) is the optimal solution of the dual problem:
With the dual variables, according to Lagrange’s dual algorithm, formula (25) can be expressed as
where \(w\), \(\mu\) and \(\gamma\) are dual variables associated with constraints (26). The extremum points \(P_{R}^{*}\), \(w*\), \(\mu^{*}\) and \(\gamma^{*}\) can be obtained by the first-order partial of (29):
Based on the constraints of (25a), (25b) and (25c), the value range of \(P_{R}\) is obtained by
where
where \(R_{t} = 2^{{r_{th} }} - 1\), \(R_{M} = 2^{{R_{m} }} - 1\). According to the properties of solving the univariate optimal solution, the optimal value of \(P_{R}\) can be obtained by
5.2 Optimization of the Power Allocation
In this section, the power allocation is proposed to maximize the security energy efficiency under the constraint of the user’s minimum transmission rate requirement. It is assumed that \(P_{R}\), and \(M\) are given, and the objective function \(p_{2}\) can be written as
For the convenience, we considered under high SNR conditions to solve the optimal power allocation, so we assume that \(\sigma^{2} = \sigma_{E}^{2} = \sigma_{n}^{2}\), where \(\sigma_{n}^{2} = P_{R} \sigma_{e}^{2} \sum\limits_{i = 1}^{K} {a_{i} } + \sigma_{k}^{2}\). Since \(R_{N} = R_{e}^{N}\), we have \(\left| {{\hat{\mathbf{h}}}_{e} {\mathbf{w}}_{N} } \right|^{2} = \left| {{\hat{\mathbf{h}}}_{RN} {\mathbf{w}}_{N} } \right|^{2}\),\(\sum\limits_{i = N + 1}^{K} {\left| {{\hat{\mathbf{h}}}_{RN} {\mathbf{w}}_{i} } \right|^{2} } = \sum\limits_{i = N + 1}^{K} {\left| {{\hat{\mathbf{h}}}_{e} {\mathbf{w}}_{i} } \right|^{2} }\); therefore, the \(R_{S}\) can be reformulated as follows:
For notations simplicity, we define
Based on above, let us denote a new function:
Then, \(R_{S}\) in (32) can be rewritten as
Next, we have to solve this optimization problem. Here, we transform the function \(J_{m} (t_{m} )\) with the monotonicity. The first-order derivative of \(J_{m} (t_{m} )\) is given by
The denominator of (36) is positive, since \(\Gamma_{m + 1} - \Gamma_{m} > 0\), and hence \(dJ_{m} (t_{m} )/dt_{m} > 0\), \(J_{m} (t_{m} )\) is the monotonically increasing function of \(t_{m}\). Consequently, the maximization of \(J_{m}\) is equivalent to finding the maximum of \(J_{m}\). The optimization problem of \(J_{m} (t_{m} )\) can be written as
where\(\Theta = (2R_{m} - 1)/P_{R} \left| {{\hat{\mathbf{h}}}_{Rk} {\mathbf{w}}_{k} } \right|^{2}\); it is observed that the problem (37) is convex. The conditions of Karush–Kuhn–Tucker (KKT) are met, so we get the optimal solution of problem (38) as
where \(u_{i}\) and \(\lambda\) are the Lagrange multipliers for the inequality constraints (37a) and (37b), respectively. In order to derive the optimal solution of problem (37), constraint (37a) should be equal. Based on this, the closed-form expression for \(a_{k}\) can be obtained as
5.3 Orthogonal Antenna Selection
The ergodic secrecy rate of \(C_{k}\) is given by
where \(\{ x\}^{ + } = \max (x,0)\) [37]. Due to the channel hardening characteristics, this approximation is reasonable when the TWR is equipped with a large number of antennas [20]. The achievable rate of \(C_{k}\) is given by
where\(E\left\{ \cdot \right\}\) denotes the expectation operator, and \(\tilde{\gamma }_{k}\) is the average SINR of \(C_{k}\):
where \(\Gamma ( \cdot )\) is the gamma function, step (a) is based on the fact that \(\left| {\hat{\user2{h}}_{Rk} } \right|^{2}\) has a scaled Chi distribution with \(2T\) degrees of freedom by a factor of \(1/\sqrt 2\). Therefore, \(E\left(\left| {\hat{\user2{h}}_{Rk} } \right|^{2} \right) = \Gamma^{2} (M + 0.5)/\Gamma^{2} (M)\), and step (b) is obtained using the approximation \(\Gamma^{2} (M + 0.5)/\Gamma^{2} (M) \to (M \to \infty ) = M\), which we can obtain by
Therefore, the can be simplified as the follows:
Therefore, we have
Based on the constraints of (48) and (49), the average of \(\eta_{SEE}\) is given by
Taking the second derivative of \(\overline{\eta }_{{{\text{SEE}}}}\) with respect to \(M\), we achieve
It is observed that \(d\overline{\eta }_{{{\text{SEE}}}} /d^{2} M \le 0\); therefore, the security energy efficiency is an upward convex function on the number of antennas. In order to reduce the complexity and the interference to the primary user and improve the security performance of the system, the orthogonal antenna selection algorithm is proposed. A new function is defined, which can be formulated as follows:
Antenna \(i\) and \(j\) are called the \(\delta\)-orthogonal if and only if
In this section, an orthogonal antenna selection algorithm based on the security energy efficiency is proposed, which can be described in Table 1.
The whole orthogonal antenna selection algorithm is divided into two steps. The first step is the \(\delta_{p}\)-orthogonal antenna selection. This step mainly selects the number of orthogonal antennas less than the primary user’s transmission channel \(\Delta ({\mathbf{h}}_{pp} ,{\mathbf{h}}_{m} ) \le \delta_{p}\) from all antennas as the candidate antenna set \(Q_{1}\), with the goal of keeping orthogonal with the primary user to minimize the secondary user’s interference to the primary user in the cognitive radio environment. The second step is to select the antenna with the best channel conditions \(S(1) = \arg \max_{{k \in Q_{1} }} \left\| {{\hat{\mathbf{h}}}_{m} } \right\|\) from the set of candidate antennas with the first stage as the initial antenna in the second stage. In the second stage, the antenna selection is mainly based on the \(\delta_{c}\)-orthogonal algorithm on the basis of the set of candidate antennas \(Q_{1}\) in the first stage. This part is mainly based on the user’s convenience in selecting the number of antennas that meet the conditions based on the optimal channel gain in the set of candidate antennas. Simultaneously, select the antenna with better front \(M\) as the final candidate antenna set.
5.4 MOIT for Joint Optimization
This section proposed a multi-objective iterative algorithm for joint optimization, which is designed to maximize the security energy efficiency of cognitive Massive-MIMO-NOMA with two-way relay based on the single-objective optimal solution transmission power \(P_{R}\), power allocation \(a_{k}\) and the number of antennas \(M\). The main details of the multi-objective iterative algorithm are shown in Table 2
6 Simulation Result
In this section, the simulation results are designed to evaluate the performance of the cognitive massive MIMO-NOMA proposed in this paper. The set of simulation parameters designed in this paper as shown in Table 3. The channel matrices are modeled as \({\mathbf{H}}_{R} = {\mathbf{G}}_{R} {\mathbf{D}}_{R}^{1/2}\), where \({\mathbf{G}}_{R}\) is small-scale fading matrices having i.i.d. elements associated with the pdf CN(0,1), while the large-scale fading matrices \({\mathbf{D}}_{R}\) similar to [2].
In Fig. 2, we evaluate the security energy efficiency of the system using the orthogonal antenna selection (OAS) algorithm and the max–min–max (AIA) algorithm with different relay antenna number M. As expected, in the region of a large number of antennas M, the AIA algorithm can achieve higher security energy efficiency values. This is because when the relay node is equipped with a small number of antennas, the influence of intra-cluster interference, imperfect CSI, and the noise between NOMA users is large. It is also very obvious from Fig. 2 that the existence of imperfect channel state information will affect the realization of the system’s security energy efficiency.
Figure 3 illustrates the sum rate versus the transmit power of TWR with different number of cognitive users. From Fig. 3, we can observe that until the transmit power \(P_{R}\) reaches a certain value, as the TWR transmit power increases, the sum rate of the cognitive users increases. This is because although increasing the transmission power will improve the overall system sum rate, it will also increase the interference between NOMA users, which cause the values of system sum rate to stabilize. Note that in Fig. 3, the NOMA scheme is better than the OMA, the reason of which is NOMA users are less interfered by other users when decoding. Moreover, the proposed power allocation and antenna selection algorithm can obviously improve the spectral efficiency compared to the OMA.
In order to verify the superiority of the large-scale antenna selection method based on TWR assistance proposed in this article in improving the performance of CR-NOMA systems, a comparative analysis was conducted with the relay selection CR-NOMA system (RS CR-NOMA) in [42]. The results are shown in Fig. 4. It can be seen that as the transmission power increases, the advantages of the proposed method in improving system throughput. Since our method not only considers the use of TWR to assist users in transmission, but also introduces large-scale antennas to enhance the overall throughput capacity of the system. In addition, it also considers the interference that large-scale antennas may cause to the system, and proposes an antenna selection mechanism. Therefore, the method proposed in this article has obvious application prospects in large-scale IOT access scenarios compared to other CR-NOMA system.
Figure 5 shows the security energy efficiency versus channel estimation error with different transmission power. One can be observe that large channel estimation error will reduce the security energy efficiency of the system. It can be explained that larger estimation error will reduce the achievable rate of \(C_{k}\), resulting in lower security performance. It also be seen the security energy efficiency of TWR is superior to the OWR.
Figure 6 shows the relationship between security sum rate and minimum transmission rate requirements for cognitive NOMA users. It can be see that the SSR decreases with Rm increases, the reason of which is that in order to meet the increasing minimum transmission rate Rm requirements, the relay transmitter needs to allocate more transmission power to the NOMA users with poor channel conditions, which affects the realization of the higher security sum rate. Further, as \(R_{m}\) becomes very large, the security sum rate approaches zero, since limited by the transmission power \(P_{R}\), When \(R_{m}\) increases to a certain value, which cannot satisfy the QoS requirements for all the users.
In this paper, to analyze the robustness of the proposed method, we consider NOMA adopts an incomplete serial interference cancellation (iSIC) method during decoding, that is, user k is interfered by all other NOMA users during decoding, and received SINR of k-th SU can be rewritten as
where the first summation in (54) is the non-removable interference of the weaker users \(\kappa_{i} = P_{R} \left| {{\hat{\mathbf{h}}}_{Rk} {\mathbf{w}}_{i} } \right|^{2} a_{i}\), while the second term is the residual interference caused by the SIC inefficiency, with influence factors for iSIC \(0 \le \iota_{i} \le 1\). The channel error plus hardware distortion noise power is denoted by \((P_{R} \sigma_{e}^{2} \sum\nolimits_{i = 1}^{K} {\left| {{\hat{\mathbf{h}}}_{Rk} {\mathbf{w}}_{i} } \right|^{2} a_{i} } + \sigma_{k}^{2} )\).
Based on the above imperfect serial interference cancellation method for system CR-NOMA system interference, the robustness of the proposed scheme in this paper is verified, and compared with the method in [42], and the results are shown in Fig. 7.
Figure 7 shows the relationship between security energy efficiency and influence factors for iSIC. It can be see that with the increase of interference factors, the security energy efficiency of the system continue to decrease. Obviously, because introducing the interference will cause a decrease in system throughput, thereby affecting system performance. At the same time, it can be seen that the system performance has indeed decreased after considering robustness, but the decrease is not significant. In addition, the method proposed in this article has better robustness compared to the method mentioned in reference [42]. This is because this article uses TWR method for user information exchange and improves the system transmission performance through large-scale antennas, thereby ensuring its robustness.
7 Conclusions
In this paper, in order to better meet the needs of IoT large-scale access, we focus on edge cloud environments to study a two-way relay CR-NOMA system with large-scale antennas, in which in order to complete the exchange of information between multiple pairs of cognitive users, TWR is equipped with massive antenna. The security energy efficiency is proposed to evaluate the performance of the CR-NOMA system. In order to reduce system complexity and power consumption, a new orthogonal antenna selection algorithm is proposed. We further proposed the MOIA algorithm to jointly optimize the transmission power, power distribution and the number of transmission antennas to maximize the security energy efficiency. According to the analysis results, the performance of massive MIMO CR-NOMA outperformed the MIMO. Next, the relay cooperative transmission system based on mobile edge computing is also the focus of future research, and at the same time, we will explore applying the proposed system to practical wireless environments.
Availability of Data and Materials
The data that support the findings of this study are available from the corresponding author, upon reasonable request.
References
Sotenga, P.Z., Djouani, K., Kurien, A.M.: Media access control in large-scale internet of things: a review. IEEE Access 66(11), 55834–55859 (2020)
Wang, D., Wang, W., Zhang, Z., Huang, A.: Delay-optimal random access in large-scale energy harvesting IoT networks based on mean field game. China Commun. 19(4), 121–136 (2022)
Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., Fang, B.: A survey on access control in the age of internet of things. IEEE Int. Thing J. 7(6), 4682–4696 (2020)
Fernandes, R., Lus, M., Sargento, S.: Large-scale lora networks: a mode adaptive protocol. IEEE Int. Thing J. 8(17), 13487–13502 (2021)
Xu, X., Yang, W., Cai, Y., Jin, S.: On the secure spectral-energy efficiency tradeoff in random cognitive radio networks. IEEE J. Sel. Areas Commun. 34(10), 2706–2722 (2016)
Liu, Y., Ding, Z., Elkashlan, M., Yuan, J.: Nonorthogonal multiple access in large-scale underlay cognitive radio networks. IEEE Trans. Vel. Technol. 65(12), 10152–10157 (2016)
Zhou, F., Wu, Y., Liang, Y.C., Li, Z., Wang, Y., Wong, K.K.: State of the art, taxonomy, and open issues on cognitive radio networks with NOMA. IEEE Wirel. Commun. 25(2), 100–108 (2018)
Caceres, F.M., Sithamparanathan, K., Sun, S.: Theoretical analysis of hybrid SIC success probability under Rayleigh channel for uplink CR-NOMA. IEEE Trans. Vel. Technol. 71(10), 10584–10599 (2022)
Chen, W., Ding, H., Wang, S., da Costa, D.B., Gong, F., Juliano Nardelli, P.H.: Backscatter cooperation in NOMA communications systems. IEEE Trans. Wirel. Commun. 20(6), 3458–3474 (2021)
Zhang, Z., Chen, J., Lv, L., Ye, Q.: Utilizing cooperative jamming to secure cognitive radio NOMA networks. 2020 IEEE Global Commun. Conf. 23(1), 176–179 (2019)
Do, D.T., Le, A.T., Lee, B.M.: NOMA in cooperative underlay cognitive radio networks under imperfect SIC. IEEE Access 8, 86180–86195 (2020)
Mohammadi, M., Chalise, B.K., Hakimi, A., Mobini, Z.: Beamforming design and power allocation for full-duplex non-orthogonal multiple access cognitive relaying. IEEE Trans. Commun. 66(12), 5952–5965 (2018)
Im, G., Lee, J.H.: Outage probability for cooperative NOMA systems with imperfect SIC in cognitive radio networks. IEEE Commun. Let. 23(4), 692–695 (2019)
Lv, L., Yang, L., Jiang, H., Luan, T.H., Chen, J.: When NOMA meets multiuser cognitive radio: opportunistic cooperation and user scheduling. IEEE Trans. Vel. Technol. 67(7), 6679–6684 (2018)
Wang, H., Wang, J., Fang, J.: Grant-free massive connectivity in massive MIMO systems: collocated versus cell-free. IEEE Wirel. Commun. Lett. 10(3), 634–638 (2021)
Abidrabbu, S., Abushattal, A., Arslan, H.: Stackelberg game for secure CR-NOMA networks against internal eavesdropper. IEEE Trans. Cogn. Commun. Netw. 9(2), 452–462 (2023)
Das, P., Mehta, N.B.: Rate-optimal relay selection for average interference-constrained underlay CR. IEEE Trans. Commun. 65(12), 5137–5148 (2017)
Bastami, A.H., Habibi, S.: Cognitive MIMO two-way relay network: joint optimal relay selection and spectrum allocation. IEEE Trans. Vel. Technol. 67(7), 5937–5952 (2018)
Singh, V., Upadhya, P.K.: Exploiting cache-free/cache-aided TWR NOMA in cognitive hybrid satellite-terrestrial networks. IEEE Trans. Vel. Technol. 71(2), 1778–1793 (2022)
Awad, M., Ibraheem, S.M., Napoleon, S.A., Saad, W., Shokair, M., Nasr, M.E.: Secrecy enhancement of cooperative NOMA networks with two-way untrusted relaying. IEEE Access 8, 216349–216364 (2020)
Shukla, M.K., Nguyen, H.H.: Ergodic secrecy sum rate analysis of a two-way relay NOMA system. IEEE Syst. J. 15(2), 2222–2225 (2021)
Liu, Z.: Performance analysis of reconfigurable intelligent surface assisted two-way NOMA networks. IEEE Trans. Vel. Technol. 71(12), 13091–13104 (2022)
Le, M.T.P., Sanguinetti, L., Bjornson, E., Benedett, M.G.D.: Code Domain NOMA in massive MIMO: When is it needed? IEEE Trans. Vel. Technol. 70(5), 4709–4723 (2021)
Shi, Z., Poor, H.V.: IEEE Internet of Things Journal. IEEE Trans. Wireless Commun. 7(4), 2716–2737 (2020)
Nguyen, T.K., Nguyen, H.H., Tuan, H.D.: Max-min QoS power control in generalized cell-free massive MIMO-NOMA with optimal backhaul combining. IEEE Trans. Vel. Technol. 69(10), 10949–10964 (2020)
Bashar, M., Cumanan, K., Burr, A.G., Ngo, H.Q., Hanzo, L., Xiao, P.: On the performance of cell-free massive MIMO relying on adaptive NOMA/OMA mode-switching. IEEE Trans. Commun. 68(2), 792–810 (2020)
Kusaladharma, S., Zhu, W.-P., Ajib, W., Aruma Baduge, G.A.: Rate and energy efficiency improvements of massive MIMO-based stochastic cellular networks with NOMA. IEEE Trans. Green Commun. Net. 5(3), 1467–1481 (2021)
Tominaga, E.N., Lopez, O.L.A., Alves, H., Souza, R.D., Rebelatto, J.L.: Performance analysis of MIMO-NOMA iterative receivers for massive connectivity. IEEE Access 10, 46808–46822 (2022)
Chen, L., Hu, B., Xu, G., Chen, S.: Energy-efficient power allocation and splitting for mmWave Beamspace MIMO-NOMA with SWIPT. IEEE Sens. J. 21(14), 16381–16394 (2021)
He, J., Yu, K., Shi, Y., Zhou, Y., Chen, W., Letaief, K.B.: Reconfigurable intelligent surface assisted massive MIMO with antenna selection. IEEE Trans. Wirel. Commun. 21(7), 4769–4783 (2022)
Nguyen, T.K., Nguyen, H.H., Tuan, H.D.: Min QoS power control in generalized cell-free massive MIMO-NOMA with optimal backhaul combining. IEEE Trans. Vel. Technol. 69(10), 10949–10964 (2020)
Aldababsa, M., Gven, E., Durmaz, M.A., Göztepe, C., Kurt, G.K., Kucur, O.: Unified performance analysis of antenna selection schemes for cooperative MIMO-NOMA with practical impairments. IEEE Trans. Wirel. Commun. 21(6), 4364–4378 (2022)
Jaiswal, N., Purohit, N.: Performance analysis of NOMA-enabled vehicular communication systems with transmit antenna selection over double Nakagami-m Fading. Proc. IEEE Trans. Vel. Technol. 70(12), 12725–12741 (2021)
Mobini, Z., Mohammadi, M., Tsiftsis, T.A., Ding, Z., Tellambura, C.: New antenna selection schemes for full-duplex cooperative MIMO NOMA systems. IEEE Trans. Commun. 70(7), 4343–4358 (2022)
Mukherjee, A., Chakraborty, P., Prakriya, S., Mal, A.K.: Cooperative mode switching-based cognitive NOMA with transmit antenna and user selection. IEEE Trans. Signal. Inf. Process. Over Net. 8, 932–945 (2022)
Torabi, M., and Pour, A. B.: Physical layer security of a two-hop mixed RF-FSO system in a cognitive radio network. In 2019 2nd West Asian Colloquium on Optical Wireless Communications (WACOWC). pp 167–170 (2019)
Zhang, Z., Chen, J., Lv, L., Ye, Q.: Utilizing cooperative jamming to secure cognitive radio NOMA networks. IEEE Global Commun. Conf. 2020, 1–6 (2020)
Garcia, C.E., Camana, M.R., Koo, I.: Ensemble learning aided QP SOCBased framework for secrecy energy efficiency in FD CR-NOMA systems. IEEE Trans. Green Commun. Net. 11(3), 335–343 (2022)
Xiang, Z., Yang, W., Pan, G., Cai, Y., Song, Y.: Physical layer security in cognitive radio inspired NOMA network. IEEE J. Select. Top. Signal Process. 13(3), 700–714 (2019)
Budhiraja, I., Kumar, N., Tyagi, S., Tanwar, S., Obaidat, M.S.: URJA: usage jammer as a resource allocation for secure transmission in a CR NOMA-based 5G femtocell system. IEEE Syst. J. 15(2), 1776–1785 (2021)
Tang, N., Tang, H., Li, B., Yuan, X.: Cognitive NOMA for UAV enabled secure communications: joint 3D trajectory design and power allocation. IEEE Access 8, 159965–159978 (2020)
Zhao, W., She, R., Bao, H.: Security energy efficiency maximization for two-way relay assisted cognitive radio NOMA network with self interference harvesting. IEEE Access 7, 74401–74411 (2019)
Funding
This work was supported in part by national key research and development plan project: new data stream heterogeneous processor architecture and computing system (2022YFB4501405); this funding mainly provides data collection and financial support for the research of this paper.
Author information
Authors and Affiliations
Contributions
Conceptualization, RS; methodology, RS; formal analysis, RS; investigation, MYS; resources, MS. Data curation, MYS; writing—original draft preparation, RS and MYS. All the authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Conflict of Interest
No potential conflict of interest was reported by the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
She, R., Sun, M. Security Energy Efficiency Analysis of CR-NOMA Enabled IoT Systems for Edge-cloud Environment. Int J Comput Intell Syst 16, 118 (2023). https://doi.org/10.1007/s44196-023-00273-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s44196-023-00273-y