2019
DOI: 10.3390/sym11030385
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance of Underlay Cooperative Cognitive Network Using Non-Orthogonal Multiple Access with Opportunistic Relay Selection

Abstract: In this paper, an underlay cooperative cognitive network using a non-orthogonal multiple access (UCCN-NOMA) system is investigated, in which the intermediate multiple relays help to decode and forward two signals x 1 and x 2 from a source node to two users D1 and D2, respectively, under wiretapping of an eavesdropper (E). We study the best relay selection strategies by three types of relay selection criteria: the first and second best relay selection is based on the maximum channel gain of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…The connection outage probability is defined as the probability that the spectral efficiency (channel capacity) of the UAV-SR link (C CR ) falls below the target transmission rate (R S1 ) [27]. Thus, the connection outage probability is expressed as…”
Section: Connection Outage Probabilitymentioning
confidence: 99%
“…The connection outage probability is defined as the probability that the spectral efficiency (channel capacity) of the UAV-SR link (C CR ) falls below the target transmission rate (R S1 ) [27]. Thus, the connection outage probability is expressed as…”
Section: Connection Outage Probabilitymentioning
confidence: 99%
“…The key concept of NOMA is successive interference cancellation (SIC) to decode transmitted messages and suppress interference at the receiver side [3]. Moreover, NOMA can also improve the throughput and secrecy performance in wireless communications [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…In [ 38 ], the source performs the jamming operation to enhance the security for dual-hop relaying networks using NOMA. In [ 39 , 40 ], secure NOMA transmission strategies in CRNs were proposed and analyzed. In [ 41 ], the trade-off between security and reliability of cooperative cognitive NOMA systems was evaluated via SOP and connection outage probability (COP).…”
Section: Introductionmentioning
confidence: 99%
“…Until now, there have been many published works concerned with performance analysis of diversity based secure communication using MIMO techniques, e.g., [ 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 ], and cooperative relaying methods [ 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 ]. However, to the best of our knowledge, several existing literatures studying secure transmission protocols using FCs have been reported.…”
Section: Introductionmentioning
confidence: 99%