2021
DOI: 10.3390/s21124180
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network

Abstract: This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper. We suppose a worst-case scenario that an eavesdropper has ideal user detection ability. In particular, we suggest an optimization-based beamforming scheme with MISO-NOMA to improve the security and outage probability of a cell-edge user while maintaining the quality of service of the near-user and deg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…2) Asymptotic SOP limit when γ → ∞: We can express the SOP asymptotic limit (when γ → ∞) for the far user vehicle V f under Scenario I by invoking (31). Moreover, the SOP asymptotic limit for near user vehicle V n under Scenario I can be obtained by setting (33).…”
Section: A All Mobile Nodes With No Ceementioning
confidence: 99%
See 2 more Smart Citations
“…2) Asymptotic SOP limit when γ → ∞: We can express the SOP asymptotic limit (when γ → ∞) for the far user vehicle V f under Scenario I by invoking (31). Moreover, the SOP asymptotic limit for near user vehicle V n under Scenario I can be obtained by setting (33).…”
Section: A All Mobile Nodes With No Ceementioning
confidence: 99%
“…Moreover, the authors in [27]- [30] have exploited the benefits of antenna selection at the base station to improve the secrecy performance of multiple-input-single-output (MISO) NOMA-enabled communication systems. Furthermore, the authors in [31] have proposed a secure beamforming strategy for MISO NOMA systems. Recently, the authors in [32] have designed a joint beamforming and power allocation scheme under Rayleigh fading channels to enhance the security of MISO NOMA system under multiple eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, a frequency hopping network based on non-orthogonal multiple access (NOMA) was proposed [14]. In the NOMA system, the probability that the attacker intercepts the FH signal can be reduced through the two-stage relay communication [15], the additive artificial noise method [16], and the optimization of the power allocation for the beamforming scheme [17]. However, this anti-interception capability is closely related to the outage probability of the NOMA users, closely related to the signal power.…”
Section: Introductionmentioning
confidence: 99%
“…The mask sequence, w, and d 3 are utilized to create d 4 . To obtain d 4 i ˛, the corresponding d 3 i ˛is complemented. If w i ˛= 1, or else it is not varied.…”
mentioning
confidence: 99%