Loading

Security Aware Resource Allocation, Scheduling for Cognitive-NOMA Network
Shyleshchandra Gudihatti K. N.1, Tanuja R.2, S. H. Manjula3, Venugopal K. R.4

1Shyleshchandra Gudihatti K. N.*, Department of CSE, University Visvesvaraya College of Engg, Bangalore University, Bangalore, India.
2Tanuja R., Department of CSE, University Visvesvaraya College of Engg, Bangalore University, Bangalore, India.
3S. H. Manjula, Department of CSE, University Visvesvaraya College of Engg, Bangalore University, Bangalore, India.
4Venugopal K. R., Vice Chancellor, Bangalore University, Bangalore, India.
Manuscript received on January 13, 2020. | Revised Manuscript received on January 20, 2020. | Manuscript published on February 10, 2020. | PP: 35-44 | Volume-9 Issue-4, February 2020. | Retrieval Number: C8180019320/2020©BEIESP | DOI: 10.35940/ijitee.C8180.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The demand of real-time wireless communication is increasing drastically where users demand for better Quality of Service (QoS) for various applications. In order to satisfy the communication requirement, communication spectrum must be utilized efficiently and all the available resource must be allocated appropriately. Recently, the cognitive radio network has gained attraction in this field of communication due to its efficient nature of spectrum sensing and sharing. However, the interference between primary and secondary user is a tedious task which can degrade the performance. Hence, multiple-access schemes are introduced and Non-Orthogonal Multiple Access (NOMA) is considered as most promising technique. Several models have been introduced based on the combined model of CR (Cognitive Radio) and NOMA but dynamic resource allocation, channel state information and eavesdropping are the most challenging task in this field. Moreover, user scheduling is also an important parameter which improves the resource utilization. In this work, we have focused on downlink communication for CR-NOMA network and presented a new approach for resource allocation and user scheduling by presenting an optimization strategy. In order to address the eavesdropping attack, the secrecy transmission rate and secrecy capacity are introduced. Finally, simulation study is carried out and the performance of proposed approach is compared with the existing techniques which shows that the proposed approach achieves higher throughput and improve outage probability. 
Keywords: Cognitive Radio, NOMA, Resource Allocation, Scheduling, Security.
Scope of the Article: Cloud Resources Utilization in IoT