2019
DOI: 10.1109/tcomm.2019.2916070
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes

Abstract: This paper considers the secrecy outage performance of a multiple-relay assisted non-orthogonal multiple access (NOMA) network over Nakagami-m fading channels. Two slots are utilized to transmit signals from the base station to destination. At the first slot, the base station broadcasts the superposition signal of the two users to all decode-and-forward relays by message mapping strategy. Then the selected relay transmits superposition signal to the two users via power-domain NOMA technology. Three relay selec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
69
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 121 publications
(70 citation statements)
references
References 52 publications
1
69
0
Order By: Relevance
“…Remark 3. Up on substituting (38) and (39) into (34), the secrecy diversity orders of the n-th user with ipSIC/pSIC for PD-NOMA are equal to zero and one, respectively.…”
Section: Secrecy Diversity Order Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Remark 3. Up on substituting (38) and (39) into (34), the secrecy diversity orders of the n-th user with ipSIC/pSIC for PD-NOMA are equal to zero and one, respectively.…”
Section: Secrecy Diversity Order Analysismentioning
confidence: 99%
“…In the presence of external eavesdroppers (Eves), the authors of [37] highlighted the security features of AF based two-way NOMA networks by exploiting subcarriers and user scheduling. In addition, the authors in [38] investigated the secrecy outage performance of multiple-relays assisted NOMA with invoking the relay selection schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, D m should first detect the signals from D j (j < m) before decoding its own signal. Hence, the SIDNR of D m when decoding D k 's message (k ≤ m) given in (23), as shown at the bottom of the previous page and the corresponding achievable data rate is evaluated as…”
Section: B Outage Performancementioning
confidence: 99%
“…In the same context, a more recent study [22] considered one source, two destination users and one eavesdropper in the analysis of secure performance under different antenna selection schemes. In addition, in [23], assuming the decode-and-forward (DF) protocol, different relay selection schemes were investigated to improve the secure outage performance. In [24], the secrecy outage probability over Rayleigh fading channels was analyzed for a 2 users cooperative NOMA system, considering both the amplify-and-forward (AF) and DF protocols.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [20] evaluated the security and reliability of downlink cooperative NOMA in cognitive networks. In view of the multiple-relay assisted NOMA system, there are three relay selection schemes, i.e., optimal single relay selection (OSRS) scheme, twostep single relay selection (TSRS) scheme and optimal dual relay selection (ODRS) scheme were proposed to studied the secrecy outage performance of the considered system [21]. In order to improve the secure performance of the system, the authors proposed a cooperative jamming strategy for confuse relays in [21], and verified that the transmission power and fading parameters have a certain impact on the secure performance.…”
Section: Introduction a Backgroundmentioning
confidence: 99%