242
Views
8
CrossRef citations to date
0
Altmetric
Articles

Secrecy analysis of a cooperative NOMA network using an EH untrusted relay

&
Pages 799-815 | Received 04 Feb 2018, Accepted 25 Nov 2018, Published online: 15 Feb 2019

References

  • Dai, L., Wang, B., Yuan, Y., Han, S., Chih-Lin, I., & Wang, Z. (2015). Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Communications Magazine, 53, 74–81.
  • Ding, Z., Adachi, F., & Poor, H. V. (2016). The application of MIMO to non-orthogonal multiple access. IEEE Transactions on Wireless Communications, 15, 537–552.
  • Ding, Z., Lei, X., Karagiannidis, G. K., Schober, R., Yuan, J., & Bhargava, V. (2017). A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends. IEEE Journal on Selected Areas in Communications, 35, 2181–2195.
  • Ding, Z., Liu, Y., Choi, J., Sun, Q., Elkashlan, M., & Poor, H. V. (2017). Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Communications Magazine, 55, 185–191.
  • Ding, Z., Peng, M., & Poor, H. V. (2015). Cooperative non-orthogonal multiple access in 5G systems. IEEE Communications Letters : A Publication of the IEEE Communications Society, 19, 1462–1465.
  • Ding, Z., Xu, M., Lu, J., & Liu, F. (2012). Improving wireless security for bidirectional communication scenarios. IEEE Transactions on Vehicular Technology, 61, 2842–2848.
  • Gradshteyn, I. S., & Ryzhik, I. M. (2014). Table of intergrals, series, and products (8th ed.). Academic Press (an Imprint of Elsevier).
  • He, X., & Yener, A. (2010). Cooperation with an untrusted relay: A secrecy perspective. IEEE Transactions on Information Theory, 56, 38073827.
  • Islam, S. R., Avazov, N., Dobre, O. A., & Kwak, K. S. (2017). Power-domain non-orthogonal multiple access (NOMA) in 5G Systems: Potentials and challenges. IEEE Communications Surveys & Tutorials, 19, 721–742.
  • Kader, M. F., Shahab, M. B., & Shin, S. Y. (2017). Exploiting non-orthogonal multiple access in cooperative relay sharing. IEEE Communications Letters : A Publication of the IEEE Communications Society, 21, 1159–1162.
  • Leung-Yan-Cheong, S., & Hellman, M. (1978). The gaussian wiretap channel. IEEE Transactions on Information Theory, 24, 451–456.
  • Liu, Y., Ding, Z., Elkashlan, M., & Poor, H. V. (2016). Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer. IEEE Journal on Selected Areas in Communications, 34, 938–953.
  • Liu, Y., Ding, Z., Elkashlan, M., & Yuan, J. (2016). Non-orthogonal multiple access in large-scale underlay cognitive radio networks. IEEE Transactions on Vehicular Technology, 65, 10152–10157.
  • Lv, L., Chen, J., & Ni, Q. (2016). Cooperative non-orthogonal multiple access in cognitive radio. IEEE Communications Letters : a Publication of the IEEE Communications Society, 20, 2059–2062.
  • Mamaghani, M. T., Mohammadi, A., Yeoh, P. L., & Kuhestani, A. (2017). Secure two-way communication via a wireless powered untrusted relay and friendly jammer. IEEE Global Communications Conference 2017 CISS, IEEE, Singapore.
  • Mattaiou, M., Papadogiannis, A., Bjornson, E., & Debbah, M. (2015). Two-way relaying under the presence of relay transceiver hardware impairments on IEEE communication letters, 17(6), 2013.
  • Nasir, A. A., Zhou, X., Durrani, S., & Kennedy, R. A. (2013). Relaying protocols for wireless energy harvesting and information processing. IEEE Transactions on Wireless Communications, 12(7), 3622–3636.
  • Oohama, Y. (2007). Relay channels with Confidential Messages. IEEE Transactions on Information Theory. Retrived from http://arxiv.org/abs/cs.IT/0611125
  • Paradiso, J. A., & Starner, T. (2005). Energy scavenging for mobile and wireless electronics. IEEE Pervasive Computing, 4, 18–27.
  • Tse, D., & Viswanath, P. (2004). Fundamentals of wireless communication. Cambridge: Cambridge University Press.
  • Tuan, V. P., & Kong, H. Y. (2017). Secure communication in untrusted relay selection networks with wireless energy harvesting. Wireless Networks Journal.
  • Varshney, L. R. (2008). Transporting information and energy simultaneously. Information Theory, ISIT, 2008, 1612–1616.
  • Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8).
  • Xing, H., Liu, L., & Zhang, R. (2016, January). Secrecy wireless information and power transfer in fading wiretap channel. IEEE Transactions on Vehicular Technology, 65(1).
  • Zabetian, N., Baghani, M., & Mohammadi, A. (2016). Rate optimization in NOMA cognitive radio networks. 2016 8th International Symposium on Telecommunications (IST), Tehran, Iran.
  • Zeng, M., Yadav, A., Dobre, O. A., Tsiropoulos, G. I., & Poor, H. V. (2017). Capacity comparison between MIMO-NOMA and MIMO-OMA with multiple users in a cluster. IEEE Journal on Selected Areas in Communications, 35, 2413–2424.
  • Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology, 61, 3693–3704.
  • Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015). Improving physical-layer security in wireless communications using diversity techniques. IEEE Network, 29, 42–48.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.