2019
DOI: 10.1002/dac.4284
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating secrecy performance of cooperative NOMA networks under existence of relay link and direct link

Abstract: Summary The secrecy performance of a nonorthogonal multiple access (NOMA) system is examined in this study by employment of a dual‐hop decode‐and‐forward (DF) relay under existence of eavesdropper. Due to the fact that the relay is trusted or untrusted device and thus eavesdropper may wiretap information from the base station or the relay. In this regard, three scenarios related to trusted and untrusted relays are proposed, with different assumptions on the information overhearing ability of the eavesdropper; … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…In this case, the PDF and CDF of the user channel gain |ℎ | 2 can be expressed. The PDF and CDF of channel ℎ [24] are (9) And (10) respectively, where |ℎ | stands for channel transmitting from the BS to an arbitrary user. It is noted that those channels are unsorted channel gain.…”
Section: Performance Evaluation: Outage Probability and Throughput 3mentioning
confidence: 99%
See 3 more Smart Citations
“…In this case, the PDF and CDF of the user channel gain |ℎ | 2 can be expressed. The PDF and CDF of channel ℎ [24] are (9) And (10) respectively, where |ℎ | stands for channel transmitting from the BS to an arbitrary user. It is noted that those channels are unsorted channel gain.…”
Section: Performance Evaluation: Outage Probability and Throughput 3mentioning
confidence: 99%
“…To satisfy requirements of fifth-generation (5G) networks, many researchers have believed that NOMA can be implemented effectively to meet both user-experienced and network level data rate [7]. In recent research, possible applications together with point-to-point NOMA has been studied comprehensively in [8][9][10][11]. In [8], downlink NOMA with randomly deployed users is examined in terms of the outage performance and ergodic rate by invoking tool of stochastic geometry.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this study, secrecy performance is examined for both trusted and untrusted relay networks by varying target rates and power allocation factors. 22 In addition, SOP and secrecy capacity of a DF relay-assisted NOMA network is also examined in multi-relay scenario. 23,24 Further, to enhance the secrecy sum rate, in Garcia et al 25 the authors proposed particle swarm optimization (PSO)-based power allocation scheme for a NOMA network with DF relaying.…”
Section: Introductionmentioning
confidence: 99%