2019
DOI: 10.3390/sym11101260
|View full text |Cite
|
Sign up to set email alerts
|

Secure Beamforming in 5G-Based Cognitive Radio Network

Abstract: Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
(38 reference statements)
0
4
0
Order By: Relevance
“…The authors proposed a beamforming approach for secure data transmission is a 5G cognitive radio network [31]. The proposed beamforming approach includes two users: the primary user (PU) and the secondary user (SU).…”
Section: B Schemes For Beamformingmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors proposed a beamforming approach for secure data transmission is a 5G cognitive radio network [31]. The proposed beamforming approach includes two users: the primary user (PU) and the secondary user (SU).…”
Section: B Schemes For Beamformingmentioning
confidence: 99%
“…• The trust value of the vehicles in the network was computed by the fusion center by incorporating the TOPSIS Beamforming in ultra-dense network Reinforcement learning algorithm Insecure beamforming [31] Secure Beamforming Power allocation policy Insufficient beamforming security [32] Interference less Beamforming Bi-LSTM Inaccurate CSI [33] Multiuser Beamforming Deep Neural Network High Attack Threats Spectrum Sensing and Access [34] Dynamic spectrum access Proactive and reactive techniques Poor spectrum access [35] Spectrum allocation Deep reinforcement algorithm High spectrum allocation latency [36] Dynamic spectrum access and allocation QAM modulation and Lagrange method Low performance of spectrum allocation [37] QoS aware spectrum access ANN algorithm Poor spectrum access efficiency [38] Detection of false sensing Dempster-Shafer theory Partially overcome the malicious SUs method; however, it faced difficulties in maintaining the consistency of the decision.…”
Section: Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Further considered secondary user direction of arrival (DOA), it contains multiple input single output (MISO) and one receiving antenna for primary user and feedback based adaptive frequency algorithm. Non orthogonal multiple access [1] based cognitive radio network is used for secure beamforming to avoid interference in multiple input multiple output networks. In array sensors, estimation of number of channels is a problem and it is solved by considering direction of arrival in spectrum sensing method.…”
Section: Introductionmentioning
confidence: 99%