On secure QoS-based NOMA networks with multiple antennas and eavesdroppers over Nakagami-m fading
| dc.contributor.author | Kieu, Tam Nguyen | |
| dc.contributor.author | Tran, Duc-Dung | |
| dc.contributor.author | Ha, Dac-Binh | |
| dc.contributor.author | Vozňák, Miroslav | |
| dc.date.accessioned | 2019-07-22T07:20:40Z | |
| dc.date.available | 2019-07-22T07:20:40Z | |
| dc.date.issued | 2019 | |
| dc.description.abstract | In this paper, we study the physical layer security of a downlink multi-input single-output non-orthogonal multiple access (NOMA) system, in which transmit antenna selection (TAS) scheme, users' quality of service (QoS) requirements, Nakagami-m fading channel, and user selection solution are considered for secure NOMA transmission. Specifically, we investigate the scenario that a base station (BS) (source) communicates with two legitimate user (LU) clusters with different priority depending on their QoS requirements in the presence of multiple passive eavesdroppers over Nakagami-m fading. To enhance the secrecy performance, we examine a TAS scheme and a user selection method. In this context, prior to transmission, a transmit antenna and a user in high-priority LU cluster are jointly selected to maximize the channel quality of the link from the BS to the selected user. Furthermore, together with the selected high-priority user, a user in low-priority LU cluster, which has the best channel condition, is chosen for performing two-user NOMA. In order to evaluate the secrecy performance, tight and asymptotic closed-form expressions of secrecy outage probability for selected LUs and overall system are derived. Our theoretical results confirmed by Monte-Carlo simulation show that in QoS-based NOMA system, high-priority users cause the higher effects on the overall secrecy performance in comparison with low-priority users. Finally, these results also indicate that our proposed communication protocol achieves the secrecy performance greater than conventional protocol. | cs |
| dc.description.source | Web of Science | cs |
| dc.identifier.citation | IETE Journal of Research. 2019. | cs |
| dc.identifier.doi | 10.1080/03772063.2019.1610088 | |
| dc.identifier.issn | 0377-2063 | |
| dc.identifier.issn | 0974-780X | |
| dc.identifier.uri | http://hdl.handle.net/10084/137814 | |
| dc.identifier.wos | 000470431200001 | |
| dc.language.iso | en | cs |
| dc.publisher | Taylor & Francis | cs |
| dc.relation.ispartofseries | IETE Journal of Research | cs |
| dc.relation.uri | https://doi.org/10.1080/03772063.2019.1610088 | cs |
| dc.subject | NOMA | cs |
| dc.subject | physical layer security | cs |
| dc.subject | secrecy capacity | cs |
| dc.subject | secrecy outage probability | cs |
| dc.subject | SIC | cs |
| dc.subject | TAS | cs |
| dc.title | On secure QoS-based NOMA networks with multiple antennas and eavesdroppers over Nakagami-m fading | cs |
| dc.type | article | cs |
| dc.type.status | Peer-reviewed | cs |
Files
License bundle
1 - 1 out of 1 results
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: