118
Views
4
CrossRef citations to date
0
Altmetric
Review Articles

Secrecy Performance Analysis of Cooperative MISO NOMA Networks Over Nakagami-m Fading

, , &

References

  • C. Li, Y. Xu, J. Xia, and J. Zhao, “Protecting secure communication under UAV smart attack with imperfect channel estimation,” IEEE. Access., Vol. 6, no. 1, pp. 76395–76401, 2018. doi: 10.1109/ACCESS.2018.2880979
  • X. Lai, L. Fan, X. Lei, J. Li, N. Yang, and G. K. Karagiannidis, “Distributed secure switch-and-stay combining over correlated fading channels,” IEEE Trans. Inf. Forensics Security, Vol. 14, no. 8, pp. 2088–2101, Jan. 2019. doi: 10.1109/TIFS.2019.2891932
  • M. Bloch, J. Barros, M. R. Rodrigues, and S. W. Mclaughlin, “Wireless information-theoretic security,” IEEE Trans. Inform. Theory, Vol. 54, no. 6, pp. 2515–2534, 2008. doi: 10.1109/TIT.2008.921908
  • D.-D. Tran, N. S. Vo, T. L. Vo, and D.-B. Ha, “Physical layer secrecy performance of multi-hop decode-and-forward relay networks with multiple eavesdroppers,” in Proceedings International Conference on Advanced Information Network and Applied Workshops (WAINA), Gwangiu, South Korea, Mar. 2015.
  • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, “Transmit antenna selection for security enhancement in MIMO wiretap channels,” IEEE Trans. Commun., Vol. 61, no. 1, pp. 144–154, 2013. doi: 10.1109/TCOMM.2012.12.110670
  • D.-D. Tran, D.-B. Ha, V.-T. Ha, and E.-K. Hong, “Secrecy analysis with MRC/SC-based eavesdropper over heterogeneous channels,” IETE. J. Res., Vol. 61, no. 4, pp. 363–371, 2015. doi: 10.1080/03772063.2015.1021389
  • L. Dai, B. Wang, Y. Yuan, S. Han, and C.-L. I. Z. Wang, “Nonorthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends,” IEEE Commun. Mag., Vol. 53, no. 9, pp. 74–81, Sept. 2015. doi: 10.1109/MCOM.2015.7263349
  • Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, “Cooperative nonorthogonal multiple access with simultaneous wireless information and power transfer,” IEEE J. Sel. Areas Commun., Vol. 34, no. 4, pp. 938–953, Apr. 2016. doi: 10.1109/JSAC.2016.2549378
  • Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi. “Non-orthogonal multiple access (NOMA) for cellular future radio access,” in Proceedings Vehicle Technologies Conference (VTC Spring), pp. 1–5, Jun. 2013.
  • T. Shimojo, A. Umesh, D. Fujishima, and A. Minokuchi, “Special articles on 5G technologies toward 2020 deployment,” NTT DOCOMO Tech. J., Vol. 17, no. 4, pp. 50–59, 2016.
  • Y. Liu, Z. Qiu, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks,” IEEE Trans. Wireless Commun., Vol. 16, no. 3, pp. 1656–1672, 2017. doi: 10.1109/TWC.2017.2650987
  • H. Lei et al., “On secure NOMA systems with transmit antenna selection schemes,” IEEE. Access., Vol. 5, pp. 17450–17464, 2017. doi: 10.1109/ACCESS.2017.2737330
  • D.-D. Tran, D.-B. Ha, “Secrecy performance analysis of QoS-based non-orthogonal multiple access networks over nakagami-m fading,” in Proceedings International Conference Recent Advances in Signal Process, Telecommunications & Computing (SigTelCom), Ho Chi Minh City, Vietnam, Jan. 2018.
  • L. Lv, Z. Ding, Q. Ni, and J. Chen, “Secure MISO-NOMA transmission with artificial noise,” IEEE Trans. Veh. Technol., Vol. 67, no. 7, pp. 6700–6705, Jul. 2018. doi: 10.1109/TVT.2018.2811733
  • Z. Xiang, W. Yang, G. Pan, Y. Cai, and Y. Song, “Physical layer security in cognitive radio inspired NOMA network,” IEEE J. Sel. Topics Signal Process., Vol. 13, no. 3, pp. 700–714, Jun. 2019. doi: 10.1109/JSTSP.2019.2902103
  • B. Li, X. Qi, K. Huang, Z. Fei, F. Zhou, and R. Q. Hu, “Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks,” IEEE Trans. Commun., Vol. 67, no. 1, pp. 83–96, Jan. 2019. doi: 10.1109/TCOMM.2018.2873690
  • J. Chen, L. Yang, and M.-S. Alouini, “Physical layer security for cooperative NOMA systems,” IEEE Trans. Veh. Technol., Vol. 67, no. 5, pp. 4645–4649, May 2018. doi: 10.1109/TVT.2017.2789223
  • Z. Xiang, W. Yang, G. Pan, Y. Cai, and X. Sun, “Secure transmission in non-orthogonal multiple access networks with an untrusted relay,” IEEE Wireless Commun. Lett., Vol. 8, no. 3, pp. 905–908, Jun. 2019. doi: 10.1109/LWC.2019.2899309
  • W. Han, J. Ge, and J. Men, “Performance analysis for NOMA energy harvesting relaying networks with transmit antenna selection and maximal-ratio combining over Nakagami-m fading,” IET Commun., Vol. 10, no. 18, pp. 2687–2693, 2016. doi: 10.1049/iet-com.2016.0630
  • D.-D. Tran et al., “Performance analysis of DF/AF cooperative MISO wireless sensor networks with NOMA and SWIPT over Nakagami-m fading,” IEEE. Access., Vol. 6, pp. 56142–56161, Oct. 2018. doi: 10.1109/ACCESS.2018.2872935
  • I. Gradshteyn, and I. Ryzhik. Table of Integrals, Series, and Products. 7th ed. San Diego, CA: Academic Press, Mar. 2007.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.