Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e1, e2 from the source node S to User 1 (U1) and User 2 (U2), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U1 and U2. The transmission’s security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system’s secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate coo...
Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Acce...
Funding Information: This work was supported in part by the Air Force Office of Scientific Research ...
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal multip...
In this paper, an underlay cooperative cognitive network using a non-orthogonal multiple access (UCC...
In this letter, we propose a novel cooperative non-orthogonal multiple access (NOMA) scheme to guara...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogo...
Different system models utilizing Non-orthogonal multiple access (NOMA) have been successfully studi...
As an important partner of fifth generation (5G) communication, the internet of things (IoT) is wide...
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cogniti...
Three relay selection techniques, aiming at achieving secure non-orthogonal multiple access in coope...
hree relay selection techniques, aiming at achieving secure non-orthogonal multiple access in cooper...
Different system models utilizing Non-orthogonal multiple access (NOMA) have been successfully studi...
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental c...
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering...
Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Acce...
Funding Information: This work was supported in part by the Air Force Office of Scientific Research ...
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal multip...
In this paper, an underlay cooperative cognitive network using a non-orthogonal multiple access (UCC...
In this letter, we propose a novel cooperative non-orthogonal multiple access (NOMA) scheme to guara...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogo...
Different system models utilizing Non-orthogonal multiple access (NOMA) have been successfully studi...
As an important partner of fifth generation (5G) communication, the internet of things (IoT) is wide...
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cogniti...
Three relay selection techniques, aiming at achieving secure non-orthogonal multiple access in coope...
hree relay selection techniques, aiming at achieving secure non-orthogonal multiple access in cooper...
Different system models utilizing Non-orthogonal multiple access (NOMA) have been successfully studi...
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental c...
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering...
Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Acce...
Funding Information: This work was supported in part by the Air Force Office of Scientific Research ...
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal multip...