Next Article in Journal
A Tunable Dual-Passband Microwave Photonic Filter Based on Optically Injected Distributed Feedback Semiconductor Lasers and Dual-Output Mach-Zehnder Modulator
Previous Article in Journal
Enhanced Phosphorus Removal from Wastewater Using RSPRC and a Novel Reactor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Energy Efficiency Maximization in an Underlying Cognitive Radio–NOMA System with a Cooperative Relay and an Energy-Harvesting User

School of Electrical and Computer Engineering, University of Ulsan, Ulsan 680-749, Korea
*
Author to whom correspondence should be addressed.
Submission received: 8 April 2020 / Revised: 20 May 2020 / Accepted: 21 May 2020 / Published: 24 May 2020

Abstract

:
Security is considered a critical issue in the deployment of 5G networks because of the vulnerability of information that can be intercepted by eavesdroppers in wireless transmission environments. Thus, physical layer security has emerged as an alternative for the secure enabling of 5G technologies and for tackling this security issue. In this paper, we study the secrecy energy efficiency (SEE) in a downlink underlying cognitive radio (CR)—non-orthogonal multiple access (NOMA) system with a cooperative relay. The system has an energy-harvesting (EH) user and an eavesdropper, where the transmitter provides direct communication with a close secondary user and a distant secondary user via the relay. Our objective is to maximize the SEE of the CR-NOMA system under the constraints of a minimum information rate for the secondary users, a minimum amount of energy harvested by the EH user, and maximum power availability at the transmitter and the relay that still prevents them from causing unacceptable interference with the primary user. The proposed solution to maximize the SEE is based on the low-computational—complexity particle swarm optimization (PSO) algorithm. For validation purposes, we compare the optimization outcomes obtained by the PSO algorithm with the optimal exhaustive search method. Furthermore, we compare the performance of our proposed CR-NOMA scheme with the conventional orthogonal multiple access (OMA) scheme.

Graphical Abstract

1. Introduction

The rapid expansion of wireless networks has produced a massive increment in data traffic. The fundamental requirements for future networks such as 5G include massive connectivity of users and the Internet of Things (IoT), low latency, high energy efficiency, and higher data rates. Non-orthogonal multiple access (NOMA) has attracted extensive attention in the literature because it can provide superior energy efficiency, higher data rates, and low transmission latency [1,2]. NOMA is based on superposition coding at the transmitter and successive interference cancellation (SIC) at the receiver, where multiple users can simultaneously access the same frequency with different transmit power levels [3,4]. To further improve the coverage of the network, cooperative communications utilize a relay or a cooperative user to forward messages to the intended users who are very far away from the base station (BS) and who do not have a direct link because of obstacles or the shadowing effect.
Security represents one of the major problems in wireless networks because the signals transmitted can be intercepted in the shared wireless medium. Physical layer security (PLS) was introduced to complement traditional security techniques, and it exploits the nature of physical layer dynamics to provide a secure transmission [5]. Several studies in the literature have investigated the security in NOMA systems with the objectives of secrecy sum rate maximization [6,7,8] and secrecy energy efficiency (SEE) [3,9]. Zhang et al. [6] considered a single-input single-output NOMA system with a passive eavesdropper, where the objective was to maximize the secrecy sum rate (SSR) under the constraint of minimum data rate at the users. The authors compared their proposed solution with the orthogonal multiple access (OMA) method, obtaining a significant improvement of the SRR by using NOMA. A downlink simultaneous wireless information and power transfer (SWIPT) system with NOMA was proposed in [7]. The BS simultaneously served several information receivers and multiple EH receivers in which the EH receivers were considered potential eavesdroppers. The authors solved the SSR maximization problem under the constraints of minimum data rate required by the information receiver users and minimum harvested energy required by the EH receivers. Garcia et al. [8] proposed secrecy sum rate maximization in a cooperative NOMA system composed of two users and a relay. The paper highlights the importance in cooperative communications of improving the secrecy performance of the network, since simulation results showed that higher values for the secrecy sum rate were obtained by employing a cooperative relay compared to values obtained by the NOMA network without cooperative relaying. A cooperative system model with SWIPT was proposed in [10], where an EH user co-existed with a nearby user that applies SWIPT to harvest energy and work as a relay to help and guarantee a minimum data rate at the far user. The minimum transmit power problem was considered under the constraints of minimum signal to interference plus noise ratio (SINR) of the users and minimum harvested energy at the EH user. Mao et al. [11] considered an underlay cognitive multiple-input single-output NOMA system with SWIPT in which the secondary BS and the multiple secondary SWIPT users co-existed with several primary users via the underlay scheme. The minimum transmit power problem is investigated subject to the constraints of minimum SINR, minimum energy harvested to satisfy the power consumption at the users, and maximum interference power with the primary network.
Yao et al. [9] considered a downlink NOMA system composed of a BS and multiple legitime users under the presence of an eavesdropper. The Secrecy energy efficiency was maximized subject to the constraints of minimum data rate and maximum available power at the BS. A NOMA cognitive radio (CR) system with energy harvesting (EH) users was proposed by Wang et al. [3] in which the secondary users harvest energy in the first phase and transmit their uplink information with NOMA in the second phase under the presence of the eavesdropper. The authors proposed the secrecy energy efficiency (SEE) maximization problem under the constraints of minimum data rate, maximum interference power to the primary users (PUs) and maximum secrecy outage probability. However, none of the researchers studied SEE maximization in a downlink CR-NOMA system with cooperative relaying and an EH user. The importance of the EH user lies in powering the user terminal expected in 5G applications, such as those in the Internet of Things (IoT) [12]. In this paper, we consider the EH user to be a receiver that stores energy from RF signals.
With the above motivations, and because energy efficiency is a crucial factor for future wireless networks, we investigate a downlink CR-NOMA scheme to maximize the SEE with cooperative relaying, subject to quality of service (QoS) requirements. We propose a particle swarm optimization (PSO)-based algorithm to solve the optimization problem, which has advantages over the optimal exhaustive search method, such as low computational complexity and high accuracy. Moreover, in the literature, application of PSO in wireless communications networks has shown high performance in resolving optimization problems [8,13].
The main contributions of this paper are summarized as follows.
  • Since we focus on enhancing the PLS (and to enable sustainable 5G networks), we propose maximizing the SEE of the CR-NOMA system with cooperative relaying and an EH user to prevent eavesdropper wiretaps by satisfying the following QoS requirements: minimum required energy at the EH user, a minimum data rate for secondary users, the maximum permissible transmission power at the relay, and a transmitter that avoids interference with the primary user.
  • To reduce the computation complexity of the solution, we solve the SEE maximization problem with a PSO-based algorithm that provides high-accuracy outcomes and high convergence speed. In addition, we provide the mathematical boundaries for the variables of the proposed optimization problem. The simulation results show that the proposed PSO algorithm achieves outcomes very close to values obtained by the high computational–complexity exhaustive search method.
  • We solve the SEE maximization problem for a CR orthogonal multiple access (CR-OMA) scheme to compare it with our proposed CR-NOMA scheme. Similar to the CR-NOMA system, we also optimize the power allocation variables of each OMA user. Simulation results show that our proposed scheme based on NOMA outperforms the OMA scheme, where an improvement in the SEE of around 40% to more than 100% is achieved by NOMA compared with OMA.
The rest of this paper is organized as follows. The CR-NOMA network model with an EH user is described in Section 2. In Section 3, the SEE maximization problem in the CR-NOMA network is formulated, and the PSO-based power allocation scheme for SEE maximization is described. The comparison approach of SEE maximization in the CR-OMA scheme is studied in Section 4. Simulation results of the cooperative CR-NOMA network with an EH user are presented in Section 5. Finally, the conclusion is presented in Section 6. Table 1 lists the main abbreviations used throughout the paper.

2. Network Model

We study a downlink underlying CR-NOMA system consisting of one secondary transmitter, one cooperative relay, two secondary users, one EH user, one primary user and one eavesdropper. The cooperative relay operates in half-duplex mode and implements the decode-and-forward (DF) protocol. Figure 1 illustrates the system model; the nearby secondary user is U1, and we assume there is no direct link between the transmitter and the distant secondary user, U2, because of path obstruction. User 3 (denoted as U3) is the EH user and the primary user is denoted as PU. The system model involves two phases. In Phase 1, the transmitter serves the secondary users and sends a superimposed signal, x, composed of Message 1, Message 2, and Message 3 corresponding to the close, distant and EH users’ messages, respectively. Then, U1 and the relay receive the messages. In Phase 2, the relay retransmits Message 2 to U2 and U1. In the following, we provide a detailed description of the two phases.
Concerning Phase 1, let x 1 , x 2 C denote the messages for U1 and U2, with transmit powers of p 1 and p 2 respectively. According to the NOMA concept, the transmission power level for the user with the lower channel gain should be higher than the transmission power level of the user with the higher channel gain. Therefore, we consider p 2 > p 1 . The energy signal intended for the EH user, x 3 , can be a signal known to both secondary users prior to information transmission. At the secondary transmitter, x 3 is sent with a transmit power of p 3 . Then, the transmit signal is defined as x = p 1 x 1 + p 2 x 2 + p 3 x 3 . The channels from the transmitter to User 1, User 3, the relay, and the eavesdropper are denoted as h ˜ T u 1 , h ˜ T u 3 , h ˜ T R and h ˜ T E , respectively. The channels from the relay to User 1, User 2, and the eavesdropper are denoted as g ˜ R u 1 , g ˜ R u 2 , and g ˜ R E , respectively. We assume that the variance in the noise of the users, the relay, and the eavesdropper is the same, and we define them as σ 2 = σ R 2 = σ E v 2 = σ u 1 2 = σ u 2 2 . We also assume that U1 and U2 can cancel the interference from known symbol x 3 .
In Phase 1, since the relay decodes Message 2 (considering Message 1 as interference), the rate of Message 2 at the relay is given by
R x 2 , T R = 1 2 log 2 ( 1 + p 2 h T R p 1 h T R + σ R 2 ) ,
where h T R = h ˜ T R 2 .
At the eavesdropper, the rate of Message 1 is:
R x 1 , T E = 1 2 log 2 ( 1 + p 1 h T E p 2 h T E + p 3 h T E + σ E v 2 ) ,
where h T E = h ˜ T E 2 .
The energy harvested by User 3 in Phase 1 can be expressed as
E 3 ( 1 ) = h ˜ T u 3 2 p 1 + p 2 + p 3 τ = h T u 3 p 1 + p 2 + p 3 2 ,
where h T u 3 = h ˜ T u 3 2 , τ 0 , 1 , τ = 1 2 is the transmission time fraction for Phase 1.
In Phase 2, the relay retransmits Message 2. User 1 and the eavesdropper use maximum-ratio combining, and the rate of Message 2 at U1 is given as follows:
R x 2 , u 1 = 1 2 log 2 ( 1 + p 2 h T u 1 p 1 h T u 1 + σ u 1 2 + p r g R u 1 σ u 1 2 ) ,
where h T u 1 = h ˜ T u 1 2 , g R u 1 = g ˜ R u 1 2 , and p r denotes the transmit power of Message 2 at the relay. The rate of Message 2 at the eavesdropper is given as follows:
R x 2 , E = 1 2 log 2 ( 1 + p 2 h T E p 1 h T E + p 3 h T E + σ E 2 + p r g R E σ E 2 ) ,
where g R E = g ˜ R E 2 .
Under NOMA, User 1 performs successive interference cancellation to remove the interference of Message 2, and decodes Message 1. Then, the rate of Message 1 at U1 is defined as follows:
R x 1 , T u 1 = 1 2 log 2 ( 1 + p 1 h T u 1 σ u 1 2 ) .
Therefore, the secrecy rate of Message 1 is given by
R u 1 = R x 1 , T u 1 R x 1 , T E + ,
where c + = max 0 , c .
The rate of Message 2 at U2 is as follows:
R x 2 , R u 2 = 1 2 log 2 ( 1 + p r g R u 2 σ u 2 2 ) ,
where g R u 2 = g ˜ R u 2 2 .
The achievable rate of Message 2 is defined by the rate observed at U1, the relay, and User 2 as follows:
R u 2 , min = min ( R x 2 , u 1 , R x 2 , T R , R x 2 , R u 2 ) .
Consequently, the secrecy rate of Message 2 is defined as:
R u 2 = R u 2 , min R x 2 , E + .
The power at the transmitter and the relay should remain at a controllable level to avoid interference with the primary user, and these power constraints are specified in Section 3.

3. Problem Formulation and the PSO-Based Power Allocation Scheme for SEE Maximization

The objective is to maximize the SEE, subject to the constraints of a minimum required rate at each secondary user, minimum energy harvested by U3, and maximum available power at the relay and transmitter based on the maximum permissible interference with the primary user. The SEE is defined as the ratio of secrecy sum rate maximization to total power consumption [3,5,14]. The optimization problem can be modeled as follows:
max p 1 , p 2 , p 3 , p r R u 1 + R u 2 1 2 p 1 + p 2 + p 3 + p c T + 1 2 p r + p c R
s . t . R x 1 , T u 1 ϕ 1 ,
R u 2 , min ϕ 2 ,
p 1 + p 2 + p 3 P T max ,
p r P R max ,
E 3 ( 1 ) ξ ,
where p c T and p c R are circuit power consumption, ξ is the minimum required energy harvested by U3, and ϕ 1 and ϕ 2 are the minimum required data rates for U1 and U2, respectively. P T max and P R max are the maximum power permitted at the transmitter and relay, respectively, to avoid interference with the primary user.
To guarantee that the power level from the transmitter and the relay will not interfere with the primary user, the maximum transmission power at the transmitter and at the relay, respectively, are constrained as indicated in (12) and (13):
P T max = min I max h T p 2 , P T ,
where I max is the power level of the maximum permissible interference with the primary user, P T is the maximum available power at the BS, and h T p is the channel coefficient from the secondary transmitter to the primary user; and:
P R max = min I max g R p 2 , P R ,
where g R p is the channel coefficient from the relay to the primary user, and P R is the maximum available power at the relay.
To solve problem (11), we propose a low-complexity algorithm based on PSO [15]. First, we define the boundaries of the variables p 1 , p 2 , p 3 and p r based on the constraints in problem (11). Then, the minimum transmit power for Message 1 is calculated based on (11b) and (11f), the minimum transmit power of Message 2 at the transmitter is calculated based on (11c) and (11f), the minimum transmit power intended for the EH user is calculated based on (11f), and the minimum transmit power of the relay is calculated based on (11c), as follows:
p 1 min = max 2 2 ϕ 1 1 σ 1 2 h T u 1 2 , α ,
p 2 min = max γ 1 , γ 2 , α ,
p 3 min = max 0 , α ,
p r min = max δ 1 , δ 2 ,
in which γ 1 = 2 2 ϕ 2 1 p 1 min h T R + σ R 2 h T R , δ 1 = 2 2 ϕ 2 1 σ u 2 2 g R u 2 2 , γ 2 = 2 2 ϕ 2 1 P R max g R u 1 σ u 1 2 p 1 min h T u 1 + σ u 1 2 h T u 1 , δ 2 = 2 2 ϕ 2 1 P T max h T u 1 p 1 min h T u 1 + σ u 1 2 σ u 1 2 g R u 1 , and α = 2 ξ h T u 3 2 P T max .
The overall algorithm of the proposed scheme using PSO is described in Algorithm 1. Let I t max , S, w, c 1 , and c 2 , respectively, denote the maximum number of iterations, the total number of particles, the inertia weight parameter, and the acceleration coefficients. Each particle’s position represents a vector of four elements ( p 1 , p 2 , p 3 , p r ) for which the boundaries are p 1 min , P T max , p 2 min , P T max , p 3 min , P T max and p r min , P R max , respectively. Let x n , v n , and p b e s t n define the position, velocity, and local best position of particle n, respectively.
In addition, the global best position of all particles is defined by g b e s t . We use a penalty function to deal with the constraints, where we define fitness function f x n = f p 1 , p 2 , p 3 , p r based on the objective function of problem (11), as follows:
f x n = R u 1 + R u 2 1 2 p 1 + p 2 + p 3 + p c T + 1 2 p r + p c R ρ i = 1 5 δ g i ,
where ρ is the penalty value, g i is the i-th constraint of problem (11), and δ g i = 0 if g i is satisfied and δ g i = 1 otherwise. Note that if all the constraints are satisfied (feasible point), f x n is the objective function (11a) without penalty.
Algorithm 1: The proposed PSO algorithm to solve SEE problem (11).
Applsci 10 03630 i001
Under the presence of more users, the proposed system model can be utilized by applying a user grouping scheme. For instance, a user grouping for a downlink NOMA system is proposed in [16]. In the paper, the authors considered a grouping scheme where two users are selected for each group (strong user and weak user), and the different groups use orthogonal resources by avoiding interference between groups. In [17], the authors proposed a NOMA-TDMA scheme by considering an uplink industrial IoT scenario composed of several sensors and one sink. The first step is to sort the channel gains and divide the total time into several time slots. Then, an optimization problem is formulated to allocate the power with NOMA and define the duration of the time slots, where the system allows a maximum of two users in each group, and the different groups are assigned different time slots. Based on the previous studies on many users, therefore we can group the users according to their channel gains, where each time slot is assigned to each group. In this case, there is no interference between users in different groups, and an extension of the proposed scheme can be applied to allocate the power to maximize the SEE with NOMA in each group. However, it is noteworthy that the proposed scheme considers that there is no direct link to the secondary user 2 because of path obstruction so that a cooperative relay is needed to consider. In the case of a user grouping scheme, there exist some groups where the distant secondary user has poor channel conditions. In that case, our proposed scheme based on a cooperative relay can be utilized efficiently.
In the case of multiple relays, the development of a relay selection algorithm is needed, where a simple solution is an exhaustive search among the possible relays. That is to say, we can perform the power allocation while considering each relay and choose the relay that achieves the highest SEE. However, an efficient solution with multiple relays needs a joint optimization of the power variables and relay selection, which may be topics for future research. On the other hand, the case of multiple eavesdroppers can be addressed by considering just the eavesdropper with the highest SINR to compute the secrecy rate with small modifications in (2) and (5), following the approach proposed in [18].

4. Energy Efficiency Maximization in the Baseline CR-OMA Scheme with Cooperative Relaying and an EH User

In this section, we describe the baseline scheme for the energy efficiency maximization problem in OMA with cooperative relaying and an EH user. In OMA, the messages are sent to each user in different time slots. Accordingly, the transmission of each message from the transmitter to its respective secondary user in the OMA scheme involves three phases, which are detailed as follows.
In Phase 1, the transmitter sends message x 1 to U1. Therefore, the rate of Message 1 at U1 can be expressed as
R x 1 , T u 1 _ O M A = 1 3 log 2 ( 1 + p 1 h T u 1 σ u 1 2 ) .
The rate of Message 1 at the eavesdropper is:
R x 1 , T E _ O M A = 1 3 log 2 ( 1 + p 1 h T E σ E v 2 ) .
Accordingly, the secrecy rate of Message 1 is given by
R u 1 _ O M A = R x 1 , T u 1 _ O M A R x 1 , T E _ O M A + .
In Phase 2, the transmitter sends Message 2 to the relay. Then, the rate of Message 2 at the relay is as follows:
R x 2 , T R _ O M A = 1 3 log 2 ( 1 + p 2 h T R σ R 2 ) .
In Phase 3, the relay forwards Message 2 to U2. Then, the rate of Message 2 at User 2 is
R x 2 , R u 2 _ O M A = 1 3 log 2 ( 1 + p r g R u 2 σ u 2 2 ) .
The achievable rate for Message 2 is defined by the rate observed at U2 and the relay, as follows:
R u 2 , min _ O M A = min ( R x 2 , T R _ O M A , R x 2 , R u 2 _ O M A ) .
The rate for Message 2 at the eavesdropper is given as follows:
R x 2 , E _ O M A = 1 3 log 2 ( 1 + p 2 h T E σ E 2 + p r g R E σ E 2 ) ,
Therefore, the secrecy rate of Message 2 is defined as:
R u 2 _ O M A = R u 2 , min _ O M A R x 2 , E _ O M A + .
To improve the OMA scheme, the transmitter does not send an energy signal to User 3, because it involves an extra period of time to send that signal; instead, we assume that User 3 stores the energy that comes to U1 from the transmitter during Phase 1 plus the energy that comes from the transmitter to the relay during Phase 2. In that way, it is possible to take advantage of the energy used by the transmitter when it sends the messages of secondary users. Accordingly, the energy stored by User 3 is given by
E 3 _ O M A = h T u 3 p 1 + p 2 3 .
Our goal is to maximize the secrecy energy efficiency, to guarantee the QoS requirement of the minimum rate at each secondary user, minimum requered energy and to guarantee maximum permitted power at the relay and transmitter. Accordingly, the problem can be formulated as follows:
max p 1 , p 2 , p r R u 1 _ O M A + R u 2 _ O M A 1 3 p 1 + p c T 1 + 1 3 p 2 + p c T 2 + 1 3 p r + p c R 1
s . t . R x 1 , T u 1 _ O M A ϕ 1 ,
R u 2 , min _ O M A ϕ 2 ,
p 1 P T max ,
p 2 P T max ,
p r P R max ,
E 3 _ O M A ξ ,
where p c T 1 , p c T 2 and p c R 1 are circuit power consumption during the phase 1, phase 2 and phase 3 at the transmitter and at the relay, respectively,
Similar to the proposed solution to P1, secrecy energy efficiency maximization problem P2 for CR-OMA is solved by using the PSO algorithm. Therefore, we need to establish the boundaries for power allocation variables p 1 , p 2 , and p r to be optimized. In this sense, the minimum transmit power, p 1 min _ O M A , is calculated based on constraints (28b) and (28g), with p 2 min _ O M A calculated based on (28c) and (28g), and with p r min _ O M A calculated based on constraint (28c), as follows:
p 1 min _ O M A = max 2 3 ϕ 1 1 σ u 1 2 h T u 1 , ω ,
p 2 min _ O M A = 2 3 ϕ 2 1 σ R 2 h T R , ω ,
p r min _ O M A = 2 3 ϕ 2 1 σ u 2 2 g R u 2 ,
where ω = 3 ξ h T u 3 P T max .
Accordingly, the boundaries of each particle’s position for the power allocation variables in the PSO algorithm are p 1 min _ O M A , P T max , p 2 min _ O M A , P T max and p r min _ O M A , P R max .

5. Simulation Results

In this section, we numerically evaluate the performance of our proposed PSO-based algorithm in the CR-NOMA network with cooperative relaying and an EH user, as illustrated in Figure 1, in comparison with the CR-OMA approach and with the baseline exhaustive search (ES) method. In the simulations, the channels are modeled as h ˜ T u 1 C N 0 , d T u 1 v , h ˜ T u 3 C N 0 , d T u 3 v , h ˜ T R C N 0 , d T R v , h ˜ T E C N 0 , d T E v , g ˜ R u 1 C N 0 , d R u 1 v , g ˜ R u 2 C N 0 , d R u 2 v , g ˜ R E C N 0 , d R E v , h ˜ T p C N 0 , d T p v , and g ˜ R p C N 0 , d R p v , where d i j is the distance between device i and j, and the path loss exponent is defined by v. We evaluated the proposed algorithm with the following parameters: v = 4 , σ 2 = 60 dBm, w = 0.7 , and c 1 = c 2 = 1.494 . The simulations were carried out on a computer with 16 GB of RAM and an Intel Core i7-6700K CPU by using Matlab.
The distance from the transmitter to the EH user is set as d T u 3 = 10 m. This distance needs to be small since the RF signal is attenuated as the distance increases and there exists a minimum energy harvesting requirement. In addition, it is common to find in the literature distances of 10 m or less for an EH user. For instance, we can refer to [11], where the authors used a distance of four meters from the secondary BS to the secondary EH users.
On the hard, depending on the scenario, the distances of the secondary users can be small. For example, picocells consider a maximum range of 200 m [19]. In the literature, common distances assumed to NOMA users are in the range of 10 to 80 m [2,6,20]. In addition, the objective of the proposed optimization problem is to maximize the SEE of the secondary network, which has relatively small distances since the transmission power is constrained with a maximum permissible interference with the primary users. In this paper, therefore we consider the distances from the secondary transmitter to User 1, the relay, the PU, and the eavesdropper as d T u 1 = 30 , d T R = 50 , d T p = 60 , and d T E = 50 in meters, respectively. The distances from the relay to User1, User2, the PU, and the eavesdropper are defined as d R u 1 = 30 , d R u 2 = 50 , d R p = 50 and d R E = 30 in meters, respectively.
With respect to the maximum permissible interference power with the PU, Tuan et al. [21] studied the effects of the maximum permissible interference power in a range from −30 dBm to −90 dBm. In addition, the trade-off between the interference power and throughput of the cognitive network was investigated in [22], where the authors considered a range from −10 dBm to −40 dBm for the maximum permissible interference power. It is noteworthy that as we increase the maximum interference power value, we obtain a wider feasible domain of the problem. Then, to analyze the worst scenario, we select I max = 60 dBm.
To define the number of particles in the proposed PSO-based algorithm, we analyze the relative change of the objective function, i.e., SEE, for several numbers of particles, S. The relative change can be defined as f g b e s t i 1 f g b e s t i f g b e s t i 1 f g b e s t i f g b e s t i 1 f g b e s t i 1 , where f g b e s t i 1 is the fitness function of the global best particle at iteration i 1 and f g b e s t i is the fitness function of the global best particle at the current iteration i. We present in Figure 2 the relative change of the SEE when the number of particles are equal to 25, 20 and 15, respectively. The values of the minimum rates at the secondary users are ϕ 1 = ϕ 2 = 1 ( bit / s / Hz ) , the minimum energy harvested by the EH user is ξ = 18 dBm , and the transmit power at both the transmitter and the relay is P T = P R = 30 dBm . In addition, Table 2 shows the comparison of a different number of particles when the number of iterations was selected to satisfy a tolerance of 10 4 in the relative change of the SEE. The absolute error is evaluated by taking into account the SEE obtained by exhaustive search. We can observe that the absolute error is very small for all the cases with a small value in the computational time. The case with S = 10 archives the lowest computational time, however, the small number of particles in PSO can lead to a local optimal solution, which should be avoided. Therefore, in the paper, we had selected S = 20 particles to be used in the rest of the simulations.
Figure 3 shows the convergence behavior of the proposed algorithm given in Algorithm 1 for an average of several channel realizations. The value of the minimum rates at the secondary users are ϕ 1 = ϕ 2 = 0.5 , 1 , 1.5 (bits/s/Hz), the minimum energy harvested by the EH user is ξ = 18 dBm and the maximum available transmission power at the transmitter and the relay is P T = P R = 30 dBm. We can see that the SEE is enhanced as the iteration index is increased, and its convergence reaches a stable value from iteration index 50. However, from Table 2, we observe that we need at least 90 iterations to achieve a tolerance of 10 4 . Then, we consider I t max = 70 for further simulations, which is a trade-off between accuracy and computational time. We also observed that the SEE increases when decreasing the minimum data rate requirement of the secondary users. The reason for this is that the transmitter and the relay should deliver low transmission power to satisfy the low required rate of the secondary users. Consequently, the eavesdropper hardly trap the messages transmitted from the transmitter and the relay.
Note that if a lower computational time is needed, we can reduce the number of particles and iterations with a consequent reduction in the accuracy of the solution. For instance, at 40 iterations, the tolerance value is around 0.03 with an absolute error of around 0.0008 in the case of S = 20 and ϕ 1 = ϕ 2 = 1 ( bits / s / Hz ) .
In this paper, we analyze the computational cost based on the number of equations that the PSO-based algorithm needs to compute in each iteration, where a detailed study of the operations involved in each equation is omitted since it includes simple operations that just uses real values and do not have matrix operations. In addition, it is assumed that the secondary transmitter has high computational capabilities.
The computational cost for a complete iteration of the proposed PSO-based algorithm depends on the evaluation of the objective function and constraints in the problem (11), and the computations needed to update the velocity and position of the particles. First, from the problem (11), the algorithm needs to evaluate the expressions of the rates and the energy harvested for the current particle position, which requires the evaluation of 10 equations involving just real numbers. To estimate the objective function and constraints, it is also necessary to evaluate 8 equations and one additional equation for obtaining the fitness function in (18). Second, for each particle, we require to calculate two random numbers and evaluate 8 equations for the velocity update and position update since we have four variables. Third, we limit the position of the particle and find the local and best positions by computing six equations. Then, for each particle n, we need to execute around 35 equations. Since the algorithm repeats the process for a total of I t max iterations, the total number of equations to be evaluated is 35 × S × I t max , which can be mathematically expressed as the computational complexity of O S × I t max .
In the case of the exhaustive search method, the complexity depends on the range of the variables which is based on numerical precision. Let us define ζ as the steps used for the power variables, then the total possible values for the variable p 1 are Υ p 1 = P T max p 1 min + ζ P T max p 1 min + ζ ζ ζ , where the same procedure is applied to the other variables to obtain Υp2, Υp3 and Υpr. Then, for the ES method, we need to evaluate the objective function and constraints a total number of Υp1 × Υp2 × Υp3 × Υpr times. We can observe that the proposed PSO-based scheme permits a huge reduction in the computational complexity compared with the exhaustive search. For instance, in the case of ϕ1 = ϕ2 = 1 (bits/s/Hz) and = −18 dBm with a step of ξ = 1, the computational time of ES is around 72,4492 (s), which increases exponentially by reducing the value of ξ, i.e., with more numerical precision. By contrast, the PSO-based algorithm achieves a computational time of 18.92 (ms) with a number of particles equal to 20 and 90 iterations as we can see in Table 2.
Figure 4 shows a comparison of SEE performance between our proposal using NOMA and the conventional OMA scheme in accordance with the SEE objective function versus the minimum data rate at the secondary users when the minimum energy harvested by the EH user is ξ = 15 dBm, when the maximum available transmission power at the transmitter and the relay is P T = P R = 30 dBm. From Figure 4, we can see that the NOMA scheme significantly outperforms the traditional OMA. This is because, under NOMA, the location of both users is exploited to simultaneously transmit to User 1 and User 2, in which the power allocated for the distant user is higher, compared to the power allocated for the closer user. This strategy is complemented with SIC in which the closer user first decodes the message of the distant user, where the SINR is high since it has the higher power, and it then subtracts that contribution to easily decode its own message (the message for the closer user). For the distant user, the interference from the message of the closer user is low, since the power allocated to this message is not high. On the other hand, the OMA scheme does not use SIC and the transmitter needs different periods of time to send each message to each intended user. Then, the transmission under the NOMA scheme is completed in two phases, as shown in Figure 1, while the transmission under OMA is completed in three phases. Therefore, because NOMA uses the resources more efficiently, it achieves better performance than the OMA scheme.
Moreover, we can see that the result obtained by our proposed PSO-based method achieves performance very close to that obtained by the exhaustive search method, but with lower complexity. The reason is that the PSO-based method iteratively updates the global and local particles’ positions to search for the optimal solution, instead of systematically evaluating all possibilities to find its optimal solution, as the exhaustive search method does.
Figure 5 and Figure 6 show that the proposed CR-NOMA scheme outperforms the baseline OMA scheme, and this finding confirms the outcomes obtained in the simulation results seen in Figure 3. From Figure 5, we can see that the SEE decreases when increasing the minimum required harvested energy at User 3. This is because the transmitter needs to send more power to satisfy the requirement of the EH user, and this fact requires p 3 to increase, which is inversely proportional to the maximization of the objective function (11a). Moreover, as the values of the data rate requirement increase, the SEE performance decreases, since more power must be delivered by the transmitter and the relay in order to satisfy the data rate requirements, which makes it easier for the eavesdropper to catch the messages. Figure 6 shows a comparison of SEE performance between our proposal using NOMA versus the minimum energy harvested by User 3 when the minimum data rates at the secondary users are ϕ 1 = ϕ 2 = 0.5 , 1 , 1.5 (bit/s/Hz), when the maximum available transmission power at the transmitter and the relay is P T = P R = 30 dBm. From Figure 6, we verify that the performance under NOMA is superior to OMA, and we can see that when the values of energy harvested and for data rate requirements increase, the values of the SEE start to decay.

6. Conclusions

This paper proposes a low-complexity PSO-based algorithm to maximize the SEE in a cooperative relay CR-NOMA network with an EH user. The power allocation variables for each user are optimized to achieve SEE maximization under the following constraints: a minimum data rate for secondary users, a minimum level of harvested energy for the EH user, and the maximum permitted transmission power at both the secondary transmitter and the relay (based on a threshold for interference with the primary user). To validate the outcomes of the proposed solution, we compared the performance of our proposed PSO-based algorithm with the exhaustive search method. We confirmed that PSO achieves near-optimal performance compared to that obtained by the high computational–complexity exhaustive search method. Moreover, we studied SEE maximization in a cooperative relaying CR-OMA network with an EH user and compared it with our proposed scheme using the NOMA transmission strategy. The experimental results confirm the advantage of the proposed NOMA method compared to the OMA scheme, where an improvement in the SEE of around 40% to more than 100% is achieved by NOMA compared with OMA in the scenario varying the minimum energy harvested at user 3.

Author Contributions

C.E.G. conceived and proposed the research idea. All authors designed the experiments. C.E.G. performed the experiments. M.R.C. and I.K. analyzed the experimental results. C.E.G. wrote the paper under the supervision of I.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Research Foundation of Korea (NRF) through the Korean Government and the Ministry of Science and ICT (MSIT) under Grant NRF-2018R1A2B6001714.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wan, D.; Wen, M.; Ji, F.; Yu, H.; Chen, F. Non-Orthogonal Multiple Access for Cooperative Communications: Challenges, Opportunities, and Trends. IEEE Wirel. Commun. 2018, 25, 109–117. [Google Scholar] [CrossRef] [Green Version]
  2. Wang, R.; Liu, G.; Zhang, H.; Kang, W.; Tsiftsis, T.; Leung, V.C.M. Resource Allocation for Energy-Efficient NOMA Network Based on Super-Modular Game. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018. [Google Scholar]
  3. Wang, D.; Men, S. Secure Energy Efficiency for NOMA Based Cognitive Radio Networks With Nonlinear Energy Harvesting. IEEE Access 2018, 6, 62707–62716. [Google Scholar] [CrossRef]
  4. Liu, Q.; Tan, F.; Lv, T.; Gao, H. Energy efficiency and spectral-efficiency tradeoff in downlink NOMA systems. In Proceedings of the 2017 IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France, 21–25 May 2017. [Google Scholar]
  5. Zhang, M.; Cumanan, K.; Thiyagalingam, J.; Wang, W.; Burr, A.G.; Ding, Z.; Dobre, O.A. Energy Efficiency Optimization for Secure Transmission in MISO Cognitive Radio Network With Energy Harvesting. IEEE Access 2019, 7, 126234–126252. [Google Scholar] [CrossRef]
  6. Zhang, Y.; Wang, H.-M.; Yang, Q.; Ding, Z. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access. IEEE Commun. Lett. 2016, 20, 930. [Google Scholar] [CrossRef] [Green Version]
  7. Tang, J.; Dai, T.; Cui, M.; Zhang, X.Y.; Shojaeifard, A.; Wong, K.-K.; Li, Z. Optimization for Maximizing Sum Secrecy Rate in SWIPT-Enabled NOMA Systems. IEEE Access 2018, 6, 43440–43449. [Google Scholar] [CrossRef]
  8. Garcia, C.E.; Camana, M.R.; Koo, I.; Rahman, M.A. Particle Swarm Optimization-Based Power Allocation Scheme for Secrecy Sum Rate Maximization in NOMA with Cooperative Relaying. In Proceedings of the 2019 International Conference on Intelligent Computing (ICIC), Nanchang, China, 3–6 August 2019. [Google Scholar]
  9. Yao, R.; Yao, L.; Zuo, X.; Qi, N.; Liu, Y.; Xu, J. Secrecy Energy Efficiency Maximization in a NOMA System. In Proceedings of the 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, 12–15 June 2019. [Google Scholar]
  10. Garcia, C.E.; Tuan, P.V.; Camana, M.R.; Koo, I. Optimized Power Allocation for a Cooperative NOMA System with SWIPT and an Energy-Harvesting User. Int. J. Electron. 2020, accepted. [Google Scholar] [CrossRef]
  11. Mao, S.; Leng, S.; Hu, J.; Yang, K. Power Minimization Resource Allocation for Underlay MISO-NOMA SWIPT Systems. IEEE Access 2019, 7, 17247–17255. [Google Scholar] [CrossRef]
  12. Wu, Q.; Li, G.Y.; Chen, W.; Ng, D.W.K.; Schober, R. An Overview of Sustainable Green 5G Networks. IEEE Wirel. Commun. 2017, 24, 72–80. [Google Scholar] [CrossRef] [Green Version]
  13. Camana, M.R.; Tuan, P.V.; Garcia, C.E.; Koo, I. Joint power allocation and power splitting for MISO SWIPT RSMA systems with energy-constrained users. Wirel. Netw. 2020, 26, 2241–2254. [Google Scholar] [CrossRef]
  14. Song, M.; Zheng, M. Energy Efficiency Optimization For Wireless Powered Sensor Networks With Nonorthogonal Multiple Access. IEEE Sens. Lett. 2018, 2, 1–4. [Google Scholar] [CrossRef]
  15. Zhang, Y.; Wang, S.; Ji, G. A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications. Math. Probl. Eng. 2015, 2015, 931256. [Google Scholar] [CrossRef] [Green Version]
  16. Kang, J.-M.; Kim, I.-M. Optimal User Grouping for Downlink NOMA. IEEE Wirel. Commun. Lett. 2018, 7, 724–727. [Google Scholar] [CrossRef]
  17. Sun, Y.; Guo, Y.; Li, S.; Wu, D.; Wang, B. Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things. Sensors 2018, 18, 1572. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  18. Feng, Y.; Yan, S.; Liu, C.; Yang, Z.; Yang, N. Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1670–1683. [Google Scholar] [CrossRef]
  19. Mukherjee, A.; Bhattacherjee, S.; Pal, S.; De, D. Femtocell based green power consumption methods for mobile network. Comput. Netw. 2013, 57, 162–178. [Google Scholar] [CrossRef]
  20. Al-Obiedollah, H.M.; Cumanan, K.; Thiyagalingam, J.; Burr, A.G.; Ding, Z.; Dobre, O.A. Energy Efficient Beamforming Design for MISO Non-Orthogonal Multiple Access Systems. IEEE Trans. Commun. 2019, 67, 4117–4131. [Google Scholar] [CrossRef] [Green Version]
  21. Tuan, P.V.; Koo, I. Optimal Multiuser MISO Beamforming for Power-Splitting SWIPT Cognitive Radio Networks. IEEE Access 2017, 5, 14141–14153. [Google Scholar] [CrossRef]
  22. Le, T.A.; Navaie, K. On the Interference Tolerance of the Primary System in Cognitive Radio Networks. IEEE Wirel. Commun. Lett. 2015, 4, 281–284. [Google Scholar] [CrossRef]
Figure 1. Underlying CR-NOMA system with a cooperative relay and an EH user.
Figure 1. Underlying CR-NOMA system with a cooperative relay and an EH user.
Applsci 10 03630 g001
Figure 2. The relative change of the SEE versus the number of iterations in PSO.
Figure 2. The relative change of the SEE versus the number of iterations in PSO.
Applsci 10 03630 g002
Figure 3. The convergence behavior of the proposed PSO-based algorithm with different minimum rates at the secondary users.
Figure 3. The convergence behavior of the proposed PSO-based algorithm with different minimum rates at the secondary users.
Applsci 10 03630 g003
Figure 4. SSE performance comparison between the exhaustive search method, CR-NOMA with cooperative relaying, and CR-OMA with cooperative relaying, based on the minimum data rate requirements for the secondary users.
Figure 4. SSE performance comparison between the exhaustive search method, CR-NOMA with cooperative relaying, and CR-OMA with cooperative relaying, based on the minimum data rate requirements for the secondary users.
Applsci 10 03630 g004
Figure 5. SSE performance comparison between CR-NOMA and CR-OMA according to the minimum harvested energy at User 3 and the minimum rates at secondary User 1 ϕ 1 and secondary User 2 ϕ 2 .
Figure 5. SSE performance comparison between CR-NOMA and CR-OMA according to the minimum harvested energy at User 3 and the minimum rates at secondary User 1 ϕ 1 and secondary User 2 ϕ 2 .
Applsci 10 03630 g005
Figure 6. SSE performance comparison between CR-NOMA and CR-OMA according to the minimum harvested energy at User 3 with three different values for the data rate requirements at secondary User 1 ϕ 1 and secondary User 2 ϕ 2 .
Figure 6. SSE performance comparison between CR-NOMA and CR-OMA according to the minimum harvested energy at User 3 with three different values for the data rate requirements at secondary User 1 ϕ 1 and secondary User 2 ϕ 2 .
Applsci 10 03630 g006
Table 1. Nomenclature.
Table 1. Nomenclature.
AbbreviationTermAbbreviationTerm
NOMAnon-orthogonal multiple accessPSOparticle swarm optimization
OMAorthogonal multiple accessQoSquality of service
SICsuccessive interference cancellationTDMAtime-division multiple access
PLSphysical layer securityU1nearby secondary user
SEEsecrecy energy efficiencyU2distant secondary user
Table 2. Effects of the number of particles in PSO.
Table 2. Effects of the number of particles in PSO.
Number of Particles3025201510
N. of iterations80859090100
Absolute error6.25 × 10 6 1.39 × 10 5 3.13 × 10 5 0.0003530.001005
Time (ms)22.5431620.9609618.9160213.082869.843146

Share and Cite

MDPI and ACS Style

Garcia, C.E.; Camana, M.R.; Koo, I. Secrecy Energy Efficiency Maximization in an Underlying Cognitive Radio–NOMA System with a Cooperative Relay and an Energy-Harvesting User. Appl. Sci. 2020, 10, 3630. https://0-doi-org.brum.beds.ac.uk/10.3390/app10103630

AMA Style

Garcia CE, Camana MR, Koo I. Secrecy Energy Efficiency Maximization in an Underlying Cognitive Radio–NOMA System with a Cooperative Relay and an Energy-Harvesting User. Applied Sciences. 2020; 10(10):3630. https://0-doi-org.brum.beds.ac.uk/10.3390/app10103630

Chicago/Turabian Style

Garcia, Carla E., Mario R. Camana, and Insoo Koo. 2020. "Secrecy Energy Efficiency Maximization in an Underlying Cognitive Radio–NOMA System with a Cooperative Relay and an Energy-Harvesting User" Applied Sciences 10, no. 10: 3630. https://0-doi-org.brum.beds.ac.uk/10.3390/app10103630

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop