328 research outputs found

    Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks

    Get PDF
    Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e1, e2 from the source node S to User 1 (U-1) and User 2 (U-2), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U-1 and U-2. The transmission's security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system's secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U-1 was also compared to the secrecy performance of U-2. Finally, the simulation results matched the Monte Carlo simulations well.Web of Science203art. no. 89

    On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on TAS protocol

    Get PDF
    This study examined how to improve system performance by equipping multiple antennae at a base station (BS) and all terminal users/mobile devices instead of a single antenna as in previous studies. Experimental investigations based on three NOMA down-link models involved (1) a single-input-single-output (SISO) scenario in which a single antenna was equipped at a BS and for all users, (2) a multi-input-single-output (MISO) scenario in which multiple transmitter antennae were equipped at a BS and a single receiver antenna for all users and (3) a multi-input-multi-output (MIMO) scenario in which multiple transmitter antennae were equipped at a BS and multiple receiver antenna for all users. This study investigated and compared the outage probability (OP) and system throughput assuming all users were over Rayleigh fading channels. The individual scenarios also each had an eavesdropper. Secure system performance of the individual scenarios was therefore also investigated. In order to detect data from superimposed signals, successive interference cancellation (SIC) was deployed for users, taking into account perfect, imperfect and fully imperfect SICs. The results of analysis of users in these three scenarios were obtained in an approximate closed form by using the Gaussian-Chebyshev quadrature method. However, the clearly and accurately presented results obtained using Monte Carlo simulations prove and verify that the MIMO-NOMA scenario equipped with multiple antennae significantly improved system performance.Web of Science20201art. no. 1

    Improving performance of far users in cognitive radio: Exploiting NOMA and wireless power transfer

    Get PDF
    In this paper, we examine non-orthogonal multiple access (NOMA) and relay selection strategy to benefit extra advantage from traditional cognitive radio (CR) relaying systems. The most important requirement to prolong lifetime of such network is employing energy harvesting in the relay to address network with limited power constraint. In particular, we study such energy harvesting CR-NOMA using amplify-and-forward (AF) scheme to improve performance far NOMA users. To further address such problem, two schemes are investigated in term of number of selected relays. To further examine system performance, the outage performance needs to be studied for such wireless powered CR-NOMA network over Rayleigh channels. The accurate expressions for the outage probability are derived to perform outage comparison of primary network and secondary network. The analytical results show clearly that position of these nodes, transmit signal to noise ratio (SNR) and power allocation coefficients result in varying outage performance. As main observation, performance gap between primary and secondary destination is decided by both power allocation factors and selection mode of single relay or multiple relays. Numerical studies were conducted to verify our derivations.Web of Science1211art. no. 220

    Beamforming Techniques for Non-Orthogonal Multiple Access in 5G Cellular Networks

    Full text link
    In this paper, we develop various beamforming techniques for downlink transmission for multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) systems. First, a beamforming approach with perfect channel state information (CSI) is investigated to provide the required quality of service (QoS) for all users. Taylor series approximation and semidefinite relaxation (SDR) techniques are employed to reformulate the original non-convex power minimization problem to a tractable one. Further, a fairness-based beamforming approach is proposed through a max-min formulation to maintain fairness between users. Next, we consider a robust scheme by incorporating channel uncertainties, where the transmit power is minimized while satisfying the outage probability requirement at each user. Through exploiting the SDR approach, the original non-convex problem is reformulated in a linear matrix inequality (LMI) form to obtain the optimal solution. Numerical results demonstrate that the robust scheme can achieve better performance compared to the non-robust scheme in terms of the rate satisfaction ratio. Further, simulation results confirm that NOMA consumes a little over half transmit power needed by OMA for the same data rate requirements. Hence, NOMA has the potential to significantly improve the system performance in terms of transmit power consumption in future 5G networks and beyond.Comment: accepted to publish in IEEE Transactions on Vehicular Technolog

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    On outage probability and throughput performance of cognitive radio inspired NOMA relay system

    Get PDF
    To improve the throughput and the outage probability of the Cognitive Radio (CR) inspired system, a novel Non-Orthogonal Multiple Access (NOMA) can be deployed to adapt multiple services in 5G wireless communication. In this scheme, after the reception of the superposition coded symbol with a predefined power allocation factors from the primary source, the relay decodes and forwards with a new superposition coded symbol (i.e. allocating another power factors) to the destination. By employing twin antenna design at the relay, the bandwidth efficiency in such scheme will be improved. Assuming Rayleigh fading channels, the closed-form expressions in terms of throughput and the outage performance are derived. Through numerical results, they showed that the outage performance of the proposed scheme using a Single Antenna (SA) scheme at the relay is better than a Twin Antenna (TA) scheme because SA scheme is not affected by its own antenna interference

    Performance Analysis of SSK-NOMA

    Full text link
    In this paper, we consider the combination between two promising techniques: space-shift keying (SSK) and non-orthogonal multiple access (NOMA) for future radio access networks. We analyze the performance of SSK-NOMA networks and provide a comprehensive analytical framework of SSK-NOMA regarding bit error probability (BEP), ergodic capacity and outage probability. It is worth pointing out all analysis also stand for conventional SIMO-NOMA networks. We derive closed-form exact average BEP (ABEP) expressions when the number of users in a resource block is equal to i.e., L=3L=3. Nevertheless, we analyze the ABEP of users when the number of users is more than i.e., L3L\geq3, and derive bit-error-rate (BER) union bound since the error propagation due to iterative successive interference canceler (SIC) makes the exact analysis intractable. Then, we analyze the achievable rate of users and derive exact ergodic capacity of the users so the ergodic sum rate of the system in closed-forms. Moreover, we provide the average outage probability of the users exactly in the closed-form. All derived expressions are validated via Monte Carlo simulations and it is proved that SSK-NOMA outperforms conventional NOMA networks in terms of all performance metrics (i.e., BER, sum rate, outage). Finally, the effect of the power allocation (PA) on the performance of SSK-NOMA networks is investigated and the optimum PA is discussed under BER and outage constraints

    Study on outage performance gap of two destinations on CR-NOMA network

    Get PDF
    Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are promising for solving the severe spectral scarcity problem encountered by the next generation of wireless communication systems. This study aims to improve spectral efficiency at two secondary destinations by investigating a CR-NOMA network under situation of the perfect successive interference cancellation (SIC). We also derive the exact outage probability for secondary users. Furthermore, an approximate computation method is applied to indicate more insights. It is confirmed that the performance achieved together with performance gap among two users can be obtained due to different power allocation factors assigned to users
    corecore