A Multi-Rate Queue Management for Delay-Constrained Non-Orthogonal Multiple Access (NOMA) based Secure Cognitive Radio Network

Document Type : Original Article

Authors

1 Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran

2 Electrical and Electronics Engineering Department, Bilkent University, Ankara, Turkey

Abstract

In this article, we consider a secure cognitive radio network (CRN) deploying non-orthogonal multiple access (NOMA). A mixed delay constrained multicast and unicast traffic is received by the intended CRN receivers, while keeping the traffic secret from the eavesdroppers. Physical layer security (PLS) is deployed to secure the confidential messages of both primary user (PU) and secondary user (SU). A queue management policy (QMP) is proposed to enhance the quality of service (QoS) of CRN. The proposed QMP adaptively uses all or some of the SU's resources towards the transmission of the PU's packet, this decision being based on the packet's delay experienced in the PU queue. Exact delay distribution of PU traffic is derived via a novel multi-regime Markov fluid queue (MRMFQ) model. Thanks to the closed form expressions, the proposed QMP is optimized to provide the highest attainable throughput for SU, while satisfying PU's QoS constraints. It is shown via numerical examples that NOMA based CRN consistently outperforms orthogonal multiple access (OMA) based counterpart. We also show that the performance improvements gained by the proposed QMP depends on the intensity of PU traffic as well as the channel conditions. Moreover, a heuristic suboptimal parameter selection procedure with significantly lesser computational complexity is proposed for less capable devices.

Keywords


[1] Daniel Minoli and Benedict Occhiogrosso, “Practical Aspects for the Integration of 5G Networks and IoT Applications in Smart Cities Environments”, Wireless Communications and Mobile Computing, Vol. 2019, pp. 1-30, August 2019.
[2] Dai, B. Wang, Y. Yuan, S. Han, C.-L. I, and Z. Wang, “Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends,” IEEE Commun. Mag., vol. 53, no. 9, pp. 74-81, Sep. 2015.
[3] Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future radio access,” in Proc. IEEE 77th Veh. Technol. Conf., Dresden, Germany, Jun. 2013, pp. 1-5.
[4] Dehghani, J. Pourrostam, “Improving Jain Fairness Index and Optimizing Transmitter Power Consumption in NOMA Systems”, Tabriz Journal of Electrical Engineering, vol. 49, no. 2, pp. 577-586, 2019 (in persian).
[5] Ding, Z. Zhao, M. Peng, and H. V. Poor, “On the spectral efficiency and security enhancements of NOMA assisted multicast-unicast streaming,” IEEE Trans. Commun., vol. 65, no. 7, pp. 3151-3163, Jul. 2017.
[6] Mitola and G. Q. Maguire, “Cognitive radio: Making software radios more personal,” IEEE Personal Communications, Vol. 6, No. 4, pp. 13-18, August 1999.
[7] Torabi, N. Mohammadi, “Performance Evaluation of Cooperative Amplify-and-Forward Relaying Systems in a Spectrum Sharing Cognitive Radio with Relay Selection”, Tabriz Journal of Electrical Engineering, online preprint, 2020 (in persian).
[8] Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, “Breaking spectrum gridlock with cognitive radios: An information theoretic perspective,” Proceedings of the IEEE, Vol. 97, No. 5, pp. 894-914, May 2009.
[9] Xu, A. Nallanathan, X. Pan, J. Yang, and W. Liao, “Security-aware resource allocation with delay constraint for NOMA-based cognitive radio network,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 2, pp. 366-376, Feb. 2018.
[10] A. R. Zaidi, C. D. McLernon, M. Ghogho, and M. A. Imran, “Cloud empowered cognitive inter-cell interference coordination for small cellular networks,” IEEE International Conference on Communication Workshop (ICCW 2015), pp. 2218-2224, 2015.
[11] Giuliano, F. Mazzenga, A. Neri, and A. M. Vegni, “Security access protocols in IoT capillary networks,” IEEE Internet Things J., vol. 4, no. 3, pp. 645-657, June 2017.
[12] D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp.1355–1387, Oct 1975.
[13] F. Shortle, J. M. Thompson, D. Gross, and C. M. Harris, Fundamentals of Queueing Theory, 5th Edition, Wiley, New York, 2018.
[14] E. Kankaya and N. Akar, “Solving multi-regime feedback fluid queues,” Stochastic Models, Vol. 24, No. 3, pp. 425-450, 2008.
[15] Akar and K. Sohraby, “Infinite- and finite-buffer Markov fluid queues: A unified analysis,” Journal of Applied Probability, Vol. 41, No. 2, pp. 557-569, June 2004.
[16] Adli Mehr, J. Musevi Niya, and N. Akar, “Queue management for two-user cognitive radio with delay-constrained primary user,” Computer Networks, Vol 142, pp. 1-12, 2018.
[17] G. Bafghi, S. Salimi, B. Seyfe, and M. R. Aref, “Cognitive interference channel with two confidential messages,” International Symposium on Information Theory Its Applications, pp. 952-956, 2010.
[18] Gabry, N. Li, N. Schrammar, M. Girnyk, L. K. Rasmussen, and M. Skoglund, “On the optimization of the secondary transmitter's strategy in cognitive radio channels with secrecy,” IEEE Journal on Selected Areas in Communications, Vol. 32, No. 3, pp. 451-463, March 2014.
[19] Chen and et al, “Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access,” IEEE Journal on Selected Areas in Communications, Vol. 36, No. 4, pp. 788 - 801, April 2018.
[20] Zhang et al, “Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things,” IEEE Access, Vol. 6, pp. 58405 – 58417, October 2018.
[21] Choi, et al, “Minimum power multicast beamforming with superposition coding for multiresolution broadcast and application to NOMA systems,” IEEE Trans. Commun., vol. 63, no. 3, pp. 791-800, March 2015.
[22] Ding et al, “On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming,” IEEE Trans. Commun., vol. 65, no. 7, pp. 3151 - 3163, July 2017.
[23] Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, “Capacity of cognitive interference channels with and without secrecy,” IEEE Transactions on Information Theory, Vol. 55, No. 2, pp. 604-619, February 2009.
[24] E. Koksal, O. Ercetin, and Y. Sarikaya, “Control of wireless networks with secrecy,” IEEE/ACM Transactions on Networking, Vol. 21, No. 1, pp. 324-337, February 2013.
[25] Sarikaya, O. Ercetin, and C. E. Koksal, “Confidentiality-preserving control of uplink cellular wireless networks using hybrid ARQ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 5, pp. 1457-1470, October 2015.
[26] Mao, C. E. Koksal, and N. B. Shroff, “Achieving full secrecy rate with low packet delays: An Optimal Control Approach,” IEEE Journal on Selected Areas in Communications, Vol. 31, No. 9, pp. 1944-1956, September 2013.
[27] Mao, C. E. Koksal, and N. B. Shroff, “Fair rate allocation for broadcast channel with confidential messages,” IEEE Global Conference on Signal and Information Processing, pp. 799-802, 2013.
[28] Sarikaya, C. E. Koksal, and O. Ercetin, “Dynamic network control for confidential multi-hop communications,” IEEE/ACM Transactions on Networking, Vol. 24, No. 2, pp. 1181-1195, April 2016.
[29] Musavian, S. Aïssa, and S. Lambotharan, “Effective capacity for interference and delay constrained cognitive radio relay channels,” IEEE Transactions on Wireless Communications, Vol. 9, No. 5, pp. 1698-1707, May 2010.
[30] Wu and R. Negi, “Effective capacity: A wireless link model for support of quality of service,” IEEE Transactions on Wireless Communications, Vol. 24, No. 4, pp. 630-643, July 2003.
[31] Yang, S. Aïssa, and K. N. Salama, “Spectrum band selection in delay-QoS constrained cognitive radio networks,” IEEE Transactions on Vehicular Technology, Vol. 64, No. 7, pp. 2925-2937, July 2015.
[32] Ma, Y. Ma, and P. Ma, “Delay-QoS-driven secrecy power allocation in underlay secure cognitive radio system,” IEEE 83rd Vehicular Technology Conference (VTC 2016), pp. 1_5, 2016.
[33] M. Elmahdy, A. El-Keyi, T. ElBatt, and K. G. Seddik, “Optimizing cooperative cognitive radio networks performance with primary QoS provisioning,” IEEE Transactions on Communications, Vol. 65, N0. 4, pp. 1451-1463, April 2017.
[34] Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Transactions on Information Theory, Vol. 54, No. 6, pp. 2515-2534, June 2008.
[35] Tunc and N. Akar, “Performance modeling of delay-based dynamic speed scaling,” 9th International Conference on Matrix-Analytic Methods in Stochastic Models, Budapest, Hungry, 2016.
[36] Scheinhardt, N. Van Foreest, and M. Mandjes, “Continuous feedback fluid queues,” Operations Research Letters, Vol. 33, No. 6, pp. 551-559, November 2005.