2018
DOI: 10.1155/2018/2797824
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Opportunistic Scheduling for Physical‐Layer Security in Multitwo User NOMA Networks

Abstract: In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of one base station, multinear user, multifar user, and one eavesdropper. To improve the secrecy performance, we propose the users selection scheme, called best-secure-near-user best-secure-far-user (BSNBSF) scheme. The BSNBSF scheme aims to select the best near-far user pair, whose data transmission is the most robust against the overhearing of an eavesdropper. In order to facilitate the performance analysis of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
8
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 38 publications
1
8
0
Order By: Relevance
“…However, 1 gets out of order beyond 30 dB. This is because of the order of user decoding process as described in (29), (30), (31), and (32). These observations are consistent with the derived analytical and asymptotic expressions.…”
Section: Figure 19supporting
confidence: 85%
See 1 more Smart Citation
“…However, 1 gets out of order beyond 30 dB. This is because of the order of user decoding process as described in (29), (30), (31), and (32). These observations are consistent with the derived analytical and asymptotic expressions.…”
Section: Figure 19supporting
confidence: 85%
“…(3.351.3) the final CDF expression can be obtained as in (33). Likewise, following the same procedures as in (A1), the CDF expressions of (4), (5), (6), (9), (10), (11), (12), (15), (16), (17), (18), (19), (20), (21), (22), (25), (26), (27), (28), (29), (30), (31), and (32) can be calculated. However, because of space limitation, the derivation details of these CDF expressions are omitted.…”
Section: Appendix A: Proof Of Propositionmentioning
confidence: 99%
“…According to NOMA [7], [9], the cell-edge user does not require the SIC process since the power allocation coefficient of the cell-edge user is larger than that of the cell-center user. Thus, the cell-center user's message is regarded as the interference at the cell-edge user [9], [25], [37]. The received SINR at the cell-edge user to decode x F k can be expressed as…”
Section: ) At the Cell-center Usermentioning
confidence: 99%
“…In this scheme, the main and eavesdropper channels are jointly considered, thus, ONS scheme can achieve the most robust performance [33,39]. Since the ONS scheme utilizes both the main and eavesdropper channel to enhance secrecy performance, the selection criteria can be mathematically described as…”
Section: Optimal Node Selection Schemementioning
confidence: 99%