Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Security Aware Resource Allocation, Scheduling for Cognitive-NOMA Network

View through CrossRef
The demand of real-time wireless communication is increasing drastically where users demand for better Quality of Service (QoS) for various applications. In order to satisfy the communication requirement, communication spectrum must be utilized efficiently and all the available resource must be allocated appropriately. Recently, the cognitive radio network has gained attraction in this field of communication due to its efficient nature of spectrum sensing and sharing. However, the interference between primary and secondary user is a tedious task which can degrade the performance. Hence, multiple schemes are introduced and Non-Orthogonal Multiple Access (NOMA) is considered as most promising technique. Several models have been introduced based on the combined model of CR (Cognitive Radio) and NOMA but dynamic resource allocation, channel state information and eavesdropping are the challenging task in this field. Moreover, user scheduling is also an important parameter which improves the resource utilization. In this work, we have focused on downlink communication for CR-NOMA network and presented a new approach for resource allocation and user scheduling by presenting an optimization strategy. In order to address the eavesdropping attack, the secrecy transmission rate and secrecy capacity are introduced. Finally, simulation study is carried out and the performance of proposed approach is compared with the existing techniques which shows that the proposed approach achieves higher throughput and improve outage probability.
Title: Security Aware Resource Allocation, Scheduling for Cognitive-NOMA Network
Description:
The demand of real-time wireless communication is increasing drastically where users demand for better Quality of Service (QoS) for various applications.
In order to satisfy the communication requirement, communication spectrum must be utilized efficiently and all the available resource must be allocated appropriately.
Recently, the cognitive radio network has gained attraction in this field of communication due to its efficient nature of spectrum sensing and sharing.
However, the interference between primary and secondary user is a tedious task which can degrade the performance.
Hence, multiple schemes are introduced and Non-Orthogonal Multiple Access (NOMA) is considered as most promising technique.
Several models have been introduced based on the combined model of CR (Cognitive Radio) and NOMA but dynamic resource allocation, channel state information and eavesdropping are the challenging task in this field.
Moreover, user scheduling is also an important parameter which improves the resource utilization.
In this work, we have focused on downlink communication for CR-NOMA network and presented a new approach for resource allocation and user scheduling by presenting an optimization strategy.
In order to address the eavesdropping attack, the secrecy transmission rate and secrecy capacity are introduced.
Finally, simulation study is carried out and the performance of proposed approach is compared with the existing techniques which shows that the proposed approach achieves higher throughput and improve outage probability.

Related Results

Joint Channel and Interference Aware Cooperative Routing for Cognitive Radio Network
Joint Channel and Interference Aware Cooperative Routing for Cognitive Radio Network
Cognitive Radio based network technology provides a promising solution for various types of real-time wireless communication by offering better spectrum utilization and resource al...
Airline Crew Scheduling with Potts Neurons
Airline Crew Scheduling with Potts Neurons
A Potts feedback neural network approach for finding good solutions to resource allocation problems with a nonfixed topology is presented. As a target application, the airline crew...
Resource Allocation in Cloud Computing Environment using AHP Technique
Resource Allocation in Cloud Computing Environment using AHP Technique
Cloud Computing has changed the strategy of the way of providing different services to business and government agent as well as to sole users. Cloud Computing provides scalable and...
Demographic resource for data analysis and visualization
Demographic resource for data analysis and visualization
The demographic resource is designed to visualize demographic data in the Internet. The article provides a brief description of the database structure and examples of reporting for...
EMPLOYABILITY IN BFSI SECTOR - A STUDY OF MANAGEMENT GRADUATES IN BANGALORE
EMPLOYABILITY IN BFSI SECTOR - A STUDY OF MANAGEMENT GRADUATES IN BANGALORE
Management Education in India is more than half a century old. In the last twenty years, the growth of management education in India has been phenomenal. Students look at managemen...
Implementing Security in IOT Systems Via Blockchain
Implementing Security in IOT Systems Via Blockchain
With today’s day and age rapidly going digital, the emergence of Internet of Things has become prominent and IoT systems are now being applied to almost every field. IoT systems ca...
Cognitive Animation Theory: A Process-Based Reading of Animation and Human Cognition
Cognitive Animation Theory: A Process-Based Reading of Animation and Human Cognition
This article considers both animation and human cognition in terms of process philosophy, and articulates some common ground between the processes of animation and the processes of...
Russian Bases Abroad: Security Policy or Power Projection?
Russian Bases Abroad: Security Policy or Power Projection?
After the collapse of the bipolar system, the Soviet Union, and then its heir, the Russian Federation, lost its position as a global player in favour of US hegemony. The arms race ...

Back to Top