Cognitive radio (CR), Nonorthogonal multiple access (NOMA), Unmanned aerial vehicle (UAV), RIS, Covert communication
Abstract :
[en] This paper examines a cognitive radio (CR) nonorthogonal multiple access (NOMA) system
in which an unmanned aerial vehicle equipped with a reconfigurable intelligent surface (UAV-RIS) plays
two roles: relaying and friendly jamming. The communication protocol has two phases. The first is an
energy harvesting phase in which the UAV harvests radio frequency energy from a power beacon. A
secondary transmitter (ST) simultaneously sends superimposed signals to secondary receivers (SRs) (a
public SR and a covert SR) via NOMA with the assistance of the UAV-RIS. Then, a UAV warden and
a UAV jammer launch a cooperative attack, in which the first adversary wiretaps the signals from the
ST and UAV-RIS, whereas the second interferes with the SRs to force the ST to increase its transmit
power. For improved secrecy, the UAV-RIS uses its harvested energy to combat the UAV warden. For
this system, the secrecy performance is evaluated on the basis of the concept of covert communication.
In particular, optimization algorithms are employed to maximize the covert SR throughput under outage
probability and security constraints. A deep neural network model is subsequently trained to discover the
relationships between the environmental parameters and optimized parameters to enable rapid adaptation
to environmental conditions.
Disciplines :
Electrical & electronics engineering
Author, co-author :
Vo, Van Nhan ; Faculty of Information Technology, Duy Tan University, Da Nang, Vietnam
Long, Nguyen Quoc; Faculty of Information Technology, Duy Tan University, Da Nang, Vietnam
Dang, Viet-Hung; Faculty of Information Technology, Duy Tan University, Da Nang, Vietnam
Ho, Tu Dac ; Faculty of Information Technology and Electrical Engineering, Department of Information Security and Communication Technology, Norwegian University of Science and Technology -NTNU, Norway
Tran, Hung; College of Technology, DATCOM Lab, Faculty of Data Science and Artificial Intelligence, National Economics University, Hanoi, Vietnam
A. U. Khan, G. Abbas, Z. H. Abbas, M. Bilal, S. C. Shah, and H. Song, “Reliability analysis of cognitive radio networks with reserved spectrum for 6G-IoT,” IEEE Trans. Network and Service Management, vol. 19, no. 3, pp. 2726–2737, 2022.
S. Arzykulov, G. Nauryzbayev, T. A. Tsiftsis, and B. Maham, “Performance analysis of underlay cognitive radio non-orthogonal multiple access networks,” IEEE Trans. Veh. Technol., vol. 68, no. 9, pp. 9318–9322, Sep. 2019.
M. J. Piran, N. H. Tran, D. Y. Suh, J. B. S. C. S. Hong, and Z. Han, “QoE-driven channel allocation and handoff management for seamless multimedia in cognitive 5G cellular networks,” IEEE Trans. Veh. Tech., vol. 66, no. 7, pp. 6569–6585, Jul. 2017.
Z. Xiang, W. Yang, Y. Cai, Z. Ding, and Y. Song, “Secure transmission design in HARQ assisted cognitive NOMA networks,” IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 2528–2541, Jan. 2020.
W. Zhang, C. Wang, X. Ge, and Y. Chen, “Enhanced 5G cognitive radio networks based on spectrum sharing and spectrum aggregation,” IEEE Trans. Commun., vol. 66, no. 12, pp. 6304–6316, 2018.
O. Hashash, W. Saad, M. F. Imani, and D. R. Smith, “Simultaneous transmitting and reflecting (STAR)-RIS for harmonious millimeter wave spectrum sharing,” in 2023 IEEE Wireless Communications and Networking Conference (WCNC), Glasgow, United Kingdom, Mar. 2023, pp. 1–6.
A.-T. Le, D.-H. Tran, C.-B. Le, P. T. Tin, T. N. Nguyen, Z. Ding, H. V. Poor, and M. Voznak, “Power Beacon and NOMA-Assisted Cooperative IoT Networks With Co-Channel Interference: Performance Analysis and Deep Learning Evaluation,” IEEE Transactions on Mobile Computing, vol. 23, no. 6, pp. 7270–7283, 2024.
C. Zhang, F. Jia, Z. Zhang, J. Ge, and F. Gong, “Physical layer security designs for 5G NOMA systems with a stronger near-end internal eavesdropper,” IEEE Trans. Veh. Tech., vol. 69, no. 11, pp. 13 005–13 017, Nov. 2020.
Z. Chen, Z. Ding, X. Dai, and R. Zhang, “A mathematical proof of the superiority of NOMA compared to conventional OMA,” IEEE Trans. Signal Process., pp. 1–28, Oct. 2016.
K. Mehr, J. Niya, H.Seyedarabi, and S. Nobar, “Secrecy capacity results for a secure NOMA-based cognitive radio network with an external eavesdropper,” IEEE Trans. Commun., vol. 43, Dec. 2020.
V. Aswathi and A. V. Babu, “Performance analysis of NOMA-based underlay cognitive radio networks with partial relay selection,” IEEE Trans. Veh. Tech., vol. 70, no. 5, pp. 4615–4630, Apr. 2021.
H. Lei, C. Zhu, K. H. Park, W. Lei, I. S. Ansari, and T. A. Tsiftsis, “On secure NOMA-based terrestrial and aerial IoT systems,” IEEE Internet of Things J., vol. 9, no. 7, pp. 5329–5343, Apr. 2022.
D. T. Do, C. B. Le, A. Vahid, and S. Mumtaz, “Antenna selection and device grouping for spectrum-efficient UAV-assisted IoT systems,” IEEE Internet of Things J., vol. 10, no. 9, pp. 8014–8030, 2023.
T. H. Vu, T. V. Nguyen, Q. V. Pham, D. B. da Costa, and S. Kim, “Short-packet communications for UAV-based NOMA systems under imperfect CSI and SIC,” IEEE Trans. Cognitive Commun. and Networking, vol. 9, no. 2, pp. 463–478, 2023.
M. Nikooroo and Z. Becvar, “Maximization of minimum user capacity in UAV-enabled mobile networks with NOMA,” IEEE Networking Letters, vol. 5, no. 1, pp. 6–10, Mar. 2023.
V. N. V. et al., “Outage probability minimization in secure noma cognitive radio systems with uav relay: A machine learning approach,” IEEE Trans. Cognitive Commun. and Networking, vol. 9, no. 2, pp. 435–451, 2023.
C. Guo, L. Zhao, C. Feng, Z. Ding, and H.-H. Chen, “Energy harvesting enabled NOMA systems with full-duplex relaying,” IEEE Trans. Veh. Technol., vol. 68, no. 7, pp. 7179–7183, Jul. 2019.
A. Bhowmick, S. Roy, and S. Kundu, “Throughput maximization of a UAV assisted CR network with NOMA-based communication and energy-harvesting,” IEEE Trans. Vehicular Tech., vol. 71, no. 1, pp. 362–374, Jan. 2022.
H. Li and X. Zhao, “Throughput maximization with energy harvesting in uav-assisted cognitive mobile relay networks,” IEEE Trans. Cognitive Commun. and Networking, vol. 7, no. 1, pp. 197–209, Mar. 2021.
P. Yang, L. Yang, and S. Wang, “Performance analysis for ris-aided wireless systems with imperfect csi,” IEEE Wireless Commun. Letters, vol. 11, no. 3, pp. 588–592, Mar. 2022.
L. Yang, F. Meng, J. Zhang, M. O. Hasna, and M. D. Renzo, “On the performance of RIS-assisted dual-hop uav communication systems,” IEEE Trans. Veh. Tech., vol. 69, no. 9, pp. 10 385–10 390, 2020.
H. Ren, Z. Zhang, Z. Peng, L. Li, and C. Pan, “Energy minimization in RIS-assisted UAV-enabled wireless power transfer systems,” IEEE Internet of Things J., vol. 10, no. 7, pp. 5794–5809, Apr. 2023.
V. H. D. et al., “Throughput optimization for noma energy harvesting cognitive radio with multi-UAV-assisted relaying under security constraints,” IEEE Trans. Cognitive Commun. and Networking, vol. 9, no. 1, pp. 82–98, 2023.
D.-H. Tran, V.-D. Nguyen, S. Chatzinotas, T. X. Vu, and B. Ottersten, “UAV Relay-Assisted Emergency Communications in IoT Networks: Resource Allocation and Trajectory Optimization,” IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1621–1637, 2022.
D.-H. Tran, S. Chatzinotas, and B. Ottersten, “Satellite- and Cache-Assisted UAV: A Joint Cache Placement, Resource Allocation, and Trajectory Optimization for 6G Aerial Networks,” IEEE Open Journal of Vehicular Technology, vol. 3, pp. 40–54, 2022.
D.-H. Tran, T. X. Vu, S. Chatzinotas, S. ShahbazPanahi, and B. Ottersten, “Coarse Trajectory Design for Energy Minimization in UAVEnabled,” IEEE Transactions on Vehicular Technology, vol. 69, no. 9, pp. 9483–9496, 2020.
Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with unmanned aerial vehicles: opportunities and challenges,” IEEE Commun. Magazine, vol. 54, no. 5, pp. 36–42, 2016.
Q. Zhang, W. Saad, and M. Bennis, “Distributional reinforcement learning for mmwave communications with intelligent reflectors on a uav,” in GLOBECOM 2020 - 2020 IEEE Global Communications Conference, Taipei, Taiwan, Dec. 2020, pp. 1–6.
D.-H. Tran, S. Chatzinotas, and B. Ottersten, “Throughput Maximization for Backscatter- and Cache-Assisted Wireless Powered UAV Technology,” IEEE Transactions on Vehicular Technology, vol. 71, no. 5, pp. 5187–5202, 2022.
J. Guo, G. Liu, Q. Wu, and P. Fan, “Parallel attention-based transformer for channel estimation in RIS-aided 6G wireless communications,” IEEE Trans. Veh. Tech., pp. 1–14, 2024.
E. B. et al., “Reconfigurable intelligent surfaces for 6G: Emerging hardware architectures, applications, and open challenges,” IEEE Veh. Tech. Magazine, pp. 2–22, 2024.
A.-T. Le, T. D. Hieu, T. N. Nguyen, T.-L. Le, S. Q. Nguyen, and M. Voznak, “Physical layer security analysis for RIS-aided NOMA systems with non-colluding eavesdroppers,” Computer Communications, vol. 219, pp. 194–203, 2024.
C. Wang, X. Chen, J. An, Z. Xiong, C. Xing, N. Zhao, and D. Niyato, “Covert communication assisted by UAV-IRS,” IEEE Trans. Commun., vol. 71, no. 1, pp. 357–369, Jan. 2023.
V. N. Vo, C. So-In, H. Tran, D. D. Tran, and T. P. Huu, “Performance analysis of an energy-harvesting IoT system using a UAV friendly jammer and NOMA under cooperative attack,” IEEE Access, vol. 8, pp. 221 986–222 000, 2020.
S. Abidrabbu, A. Abushattal, and H. Arslan, “Stackelberg game for secure CR-NOMA networks against internal eavesdropper,” IEEE Trans. Cognitive Commun. and Networking, vol. 9, no. 2, pp. 452–462, Apr. 2023.
M. Wang, Z. Xu, B. Xia, Y. Guo, and Z. Chen, “DF relay assisted covert communications: Analysis and optimization,” IEEE Trans. Veh. Tech., vol. 72, no. 3, pp. 4073–4078, Mar. 2023.
L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,” IEEE Trans. Wireless Commun., vol. 21, no. 3, pp. 1735–1750, 2022.
M. Chen, U. Challita, W. Saad, C. Yin, and M. Debbah, “Artificial neural networks-based machine learning for wireless networks: A tutorial,” IEEE Commun. Surveys and Tutorials, vol. 21, no. 4, pp. 3039–3071, Jul. 2019.
C. Thomas, C. Chaccour, W. Saad, M. Debbah, and C. S. Hong, “Causal reasoning: Charting a revolutionary course for next-generation AI-native wireless networks,” IEEE Veh. Techn. Magazine, vol. 19, no. 1, pp. 5394–5408, Mar. 2024.
F. Okoli, J. Bert, S. Abdelaziz, N. Boussion, and D. Visvikis, “Optimizing the beam selection for noncoplanar VMAT by using simulated annealing approach,” IEEE Trans. Radiation Plasma Medical Sci., vol. 6, no. 5, pp. 609–618, May 2022.
D. K. Luong, M. Ali, Y. F. Hu, J. P. Li, R. Asif, and K. Abdo, “Simulated annealing-based multilink selection algorithm in SDN-enabled avionic networks,” IEEE Access, vol. 9, pp. 145 301–145 316, Oct. 2021.
M. Yan, H. Yuan, and J. Xu, “Task allocation and route planning of multiple UAVs in a marine environment based on an improved particle swarm optimization algorithm,” EURASIP Journal on Advances in Signal Processing, vol. 2021, no. 94, pp. 1–23, Oct. 2021.
Z. Liu, J. Liu, F. Zhou, R. W. Liu, and N. Xiong, “A robust GA/PSOhybrid algorithm in intelligent shipping route planning systems for maritime traffic networks,” Journal of Internet Technology, vol. 19, no. 6, pp. 1635–1644, Nov. 2019.
A. M. Yesaswini and K. Annapurna, “GA and PSO based spectrum allotment in cognitive radio networks,” in Intern. Conf. Inventive Computat. Techn., Feb. 2021, pp. 701–704.
H. E. S. Hassan, A. E. D. S. Hafez, and A. A. Saied, “Optimum cognitive radio networks performance in AWGN using genetic algorithm,” in Intern. Telecommun. Conf., Jul. 2021, pp. 1–4.
M. G. C. P and V. T, “Analysis and performance evaluation of pso for spectrum allocation in CRN,” in Intern. Conf. Innovative Practices Techno. and Management, Apr. 2021, pp. 119–124.
Y. Luo, C. Wu, Y. Leng, N. Huang, L. Mao, and J. Tang, “Throughput Optimization for NOMA Cognitive Relay Network with RF Energy Harvesting Based on Improved Bat Algorithm,” Mathematics, vol. 10, no. 22, 2022.
N. Mladenovic, A. Sleptchenko, A. Sifaleras, and M. Omar, Variable Neighborhood Search 8th International Conference, ICVNS 2021, Abu Dhabi, United Arab Emirates, March 21–25, 2021, Proceedings: 8th International Conference, ICVNS 2021, Abu Dhabi, United Arab Emirates, March 21–25, 2021, Proceedings, 01 2021.
Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of nonorthogonal multiple access in 5G systems with randomly deployed users,” IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
Y. Liu, Z. Qin, M. Elkashlan, A. Nallanathan, and J. A. McCann, “Non-orthogonal multiple access in large-scale heterogeneous networks,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 12, pp. 2667–2680, 2017.
B. Ji, Y. Li, S. Chen, C. Han, C. Li, and H. Wen, “Secrecy outage analysis of UAV assisted relay and antenna selection for cognitive network under nakagami-m channel,” IEEE Trans. Cognitive Commun. and Networking, vol. 7, pp. 1–11, Jan. 2020.
V. N. Vo, H. Tran, and C. So-In, “Enhanced intrusion detection system for an eh iot architecture using a cooperative uav relay and friendly uav jammer,” IEEE/CAA Journal of Automatica Sinica, vol. 8, no. 11, pp. 1786–1799, 2021.
B. Ji, Y. Li, D. Cao, C. Li, S. Mumtaz, and D. Wang, “Secrecy performance analysis of UAV assisted relay transmission for cognitive network with energy harvesting,” IEEE Trans. Veh. Tech., vol. 69, no. 7, pp. 7404–7415, Jul. 2020.
B. Ji, Y. Li, B. Zhou, C. Li, K. Song, and H. Wen, “Performance analysis of UAV relay assisted IoT communication network enhanced with energy harvesting,” IEEE Access, vol. 7, pp. 38 738–38 747, Mar. 2019.
H. Tran, T. X. Quach, H. Tran, and E. Uhlemann, “Optimal energy harvesting time and transmit power in cognitive radio network under joint constraints of primary users and eavesdroppers,” in Proc. Int. Symp. Personal, Indoor and Mobile Radio Commun., Oct. 2017, pp. 1–8.
X. Cao, X. Wang, and X. Lin, “Design and implementation of a centralized routing protocol for wireless sensor network,” in Proc. Int. Conf. Sensing Tech., Nov. 2016, pp. 1–6.
T. H. Pham, X. J. Li, P. H. J. Chong, and Y. W. Leong, “Design and implementation of a centralized routing protocol for wireless sensor network,” in Proc. Int. Conf. Commun. Software and Net., Nov. 2010, p. 88–92.
Y. Li, R. Zhang, J. Zhang, S. Gao, and L. Yang, “Cooperative jamming for secure UAV communications with partial eavesdropper information,” IEEE Access, vol. 7, pp. 94 593–94 603, Jul. 2019.
Y. Chen, N. Zhao, and Z. D. M.-S. Alouini, “Multiple UAVs as relays: Multi-hop single link versus multiple dual-hop links,” IEEE Trans. Wireless Commun., vol. 17, no. 9, pp. 6348–6359, Aug. 2018.
M. F. Sohail, C. Y. Leow, and S. Won, “Non-orthogonal multiple access for unmanned aerial vehicle assisted communication,” IEEE Access, vol. 6, pp. 22 716–22 727, Apr. 2018.
J. Tang, G. Chen, and J. P. Coon, “Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 11, pp. 3026–3041, Nov. 2019.
Y. Su, S. Fu, J. Si, C. Xiang, N. Zhang, and X. Li, “Optimal hovering height and power allocation for UAV-Aided NOMA covert communication system,” IEEE Wireless Commun. Letters, vol. 12, no. 6, pp. 937–941, 2023.
Y. Dong, M. J. Hossain, and J. Cheng, “Performance of wireless powered amplify and forward relaying over nakagami-m fading channels with nonlinear energy harvester,” IEEE commun. Letters, vol. 20, no. 4, pp. 672–675, 2016.
D.-T. Do, A.-T. Le, and B. M. Lee, “NOMA in cooperative underlay cognitive radio networks under imperfect SIC,” IEEE Access, vol. 8, pp. 86 180–86 195, May 2020.
T. X. Zheng, H. M. Wang, D. W. K. Ng, and J. Yuan, “Multi-antenna covert communications in random wireless networks,” IEEE Trans. Wireless Commun., vol. 18, no. 3, pp. 1974–1987, 2019.
J. Si, Z. Li, Y. Zhao, J. Cheng, L. Guan, J. Shi, and N. Al-Dhahir, “Covert transmission assisted by intelligent reflecting surface,” IEEE Trans. Commun., vol. 69, no. 8, pp. 5394–5408, 2021.
A. Vaswani, N. M. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, L. Kaiser, and I. Polosukhin, “Attention is all you need,” in Neural Information Processing Systems, 2017. [Online]. Available: https://api.semanticscholar.org/CorpusID:13756489
M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 3949–3963, Jun. 2016.
A. M. Hayaneh, S. A. R. Zaidi, D. C. Mclernon, M. D. Renzo, and M. Ghogho, “Performance analysis of UAV enabled disaster recovery networks: A stochastic geometric framework based on cluster processes,” IEEE Access, vol. 6, pp. 26 215–26 230, Jun. 2018.
J. Zhu, “Comparative study of sequence-to-sequence models: From rnns to transformers,” Applied and Computational Engineering, vol. 42, pp. 67–75, 02 2024.
X. Ma, X. Yang, W. Xiong, B. Chen, L. Yu, H. Zhang, J. May, L. Zettlemoyer, O. Levy, and C. Zhou, “Megalodon: Efficient llm pretraining and inference with unlimited context length,” Advances in Neural Information Processing Systems, vol. 37, pp. 71 831–71 854, 2024.