In this paper, an Internet-of-Things (IoT) system containing a relay selection is studied as employing an emerging multiple access scheme, namely non-orthogonal multiple access (NOMA). This paper proposes a new scheme to consider secure performance, to be called relay selection NOMA (RS-NOMA). In particular, we consider metrics to evaluate secure performance in such an RS-NOMA system where a base station (master node in IoT) sends confidential messages to two main sensors (so-called NOMA users) under the influence of an external eavesdropper. In the proposed IoT scheme, both two NOMA sensors and an illegal sensor are served with different levels of allocated power at the base station. It is noticed that such RS-NOMA operates in two hop transmission of the relaying system. We formulate the closed-form expressions of secure outage probability (SOP) and the strictly positive secure capacity (SPSC) to examine the secrecy performance under controlling setting parameters such as transmit signal-to-noise ratio (SNR), the number of selected relays, channel gains, and threshold rates. The different performance is illustrated as performing comparisons between NOMA and orthogonal multiple access (OMA). Finally, the advantage of NOMA in secure performance over orthogonal multiple access (OMA) is confirmed both analytically and numerically.
In this paper, we investigate power domain division-based multiple access (PDMA) to support the base stations (BS) equipped with multiple antennas to serve mobile users. Such a system deploys multiple input single output (MISO)-based wireless transmission and a full-duplex (FD) scheme. Furthermore, such MISO PDMA system consists of BS employing transmit antenna selection to reduce complexity in signal processing at the receivers. We distinguish two kinds of mobile users, device-to-device (D2D) users and traditional users. In such MISO PDMA, there exists a trade-off between outage performance of each PDMA user and power allocation factors. Since the implementation of the FD scheme at PDMA users, bandwidth efficiency will be enhanced despite the existence of self-interference related to such FD. In particular, exact expressions of outage probability are derived to exhibit system performance with respect to D2D users. Finally, valuable results from the simulated parameters together with the analytical results show that MISO PDMA can improve its performance by increasing the number of transmit antennas at the BS.
The outage performance is a significant problem to implement the Cognitive Radio (CR) paradigm in the Vehicle to Everything (V2X) networks. Recently, more interest has focused on Non-Orthogonal Multiple Access (NOMA) in wireless-powered communication. In the conventional CR-enabled V2X-NOMA network, spectrum sensing and limited battery capacity at the Roadside Unit (RSU) may cause serious outage performance. In this study, RSU selection scheme is adopted. This paper presents an interesting model of a system with Simultaneous Wireless Information and Power Transfer (SWIPT) and a CR-enabled V2X-NOMA network. In the downlink, the RSU harvests wireless energy from Radio Frequency (RF) signals and senses the spectrum state at the same time. A CR-enabled V2X-NOMA system performance is presented by deriving exact expressions of outage probability of distant vehicles. In the overlay CR-enabled V2X-NOMA network, the constraints are transmit power and the number of designed RSU that make significant impacts on system performance. Simulation results show that the CR-enabled V2X-NOMA get benefits from energy harvesting and RSU selection scheme.
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.
Summary A new design of secure nonorthogonal multiple access (NOMA) deployed together with cooperative relaying network is investigated in two modes including direct link and relay link. This paper proposes a mathematical analysis under secrecy considerations of a downlink two‐user NOMA systems. In particular, physical layer security of NOMA is studied in two specific metrics to achieve secure performance analysis such as the secrecy outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). It should be further explored the situation as the illegal user which is assumed to be eavesdropper at the information level, it attempts to decode the information intended to legal users while NOMA scheme is employed for legal users. The transmission techniques of NOMA equipping relaying architecture (dual‐hop transmission) have proposed due to improving the spectrum efficiency greatly compared with the traditional single‐hop networks. Finally, this study shows the advantages of NOMA over the traditional orthogonal multiple access in the studied problems analytically and numerical analysis is further provided. As important achievement, new exact and closed‐form expressions of the SOP and SPSC are derived, and they will be confirmed by simulation, ie, Monte Carlo simulations are performed to verify the proposed analytical results. Ultimately, the effects of some critical factors are studied on secure performance through these simulation results.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.