2020
DOI: 10.1109/tvt.2020.3027868
|View full text |Cite
|
Sign up to set email alerts
|

Research on Cognitive Power Allocation for Secure Millimeter-Wave NOMA Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…The authors in [17] investigated the cognitive power allocation scheme to evaluate the reliability and secrecy performance of the secondary user in mmWave NOMA networks, where a base station (BS) provided primary and secondary users services. In [18], the authors proposed a downlink cascaded transmitting zero-forcing-beamforming technique to secure communications in a two-cell multiple-input multiple-output NOMA-based CRN, where they also considered that a BS serves for primary and secondary users concurrently, the similar model was also considered in [19], [20].…”
Section: A Related Workmentioning
confidence: 99%
“…The authors in [17] investigated the cognitive power allocation scheme to evaluate the reliability and secrecy performance of the secondary user in mmWave NOMA networks, where a base station (BS) provided primary and secondary users services. In [18], the authors proposed a downlink cascaded transmitting zero-forcing-beamforming technique to secure communications in a two-cell multiple-input multiple-output NOMA-based CRN, where they also considered that a BS serves for primary and secondary users concurrently, the similar model was also considered in [19], [20].…”
Section: A Related Workmentioning
confidence: 99%
“…The authors in [16] considered the downlink transmission in a mmWave NOMA network and proposed a minimal angle-difference user paring scheme and two maximum ratio transmission beamforming schemes to enhance the network security. In [17], a cognitive mmWave NOMA network was introduced, where each resource block is shared by a user pair consisting of a primary user and a secondary user. The security and reliability performances of the secondary users were investigated under a power allocation scheme that prioritizes the security and QoS requirements of the primary users.…”
Section: B Mmwave Noma Systemsmentioning
confidence: 99%
“…The performance of the CRNs studied widely in [4][5][6][7][8][9][10][11][12] while the performance of FCs was investigated in [13][14][15][16][17][18][19]. Particularly, authors in [4] addressed the channel estimation problem in the overlay CRNs based on the state transition probability method.…”
Section: Introductionmentioning
confidence: 99%
“…More precisely, the SUs operate either in the overlay or underlay protocols depending on the quality-of-service (QoS) of the primary networks. The secure performance of non-orthogonal multiple access (NOMA) cognitive radio networks with mmWave was given in [11] while the performance of CRNs with the assistance of reconfigurable intelligent surfaces (RISs) was investigated in [12].…”
Section: Introductionmentioning
confidence: 99%