Secure transmission design in cooperative NOMA networks: Orienting toward user requirements
Abstract This paper presents a full‐duplex and multi‐antenna relay‐aided transmission scheme for the user‐oriented perspective in cooperative non‐orthogonal multiple access (NOMA) systems. Relying on the service requirements, two legitimate users with security demands (SU) and quality of service (Qo...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2024-12-01
|
| Series: | IET Communications |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/cmu2.12779 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850250686622597120 |
|---|---|
| author | Dan Jiang Yuanyuan Gao Guoxin Li Nan Sha Jihao Cai ChengFei Ding |
| author_facet | Dan Jiang Yuanyuan Gao Guoxin Li Nan Sha Jihao Cai ChengFei Ding |
| author_sort | Dan Jiang |
| collection | DOAJ |
| description | Abstract This paper presents a full‐duplex and multi‐antenna relay‐aided transmission scheme for the user‐oriented perspective in cooperative non‐orthogonal multiple access (NOMA) systems. Relying on the service requirements, two legitimate users with security demands (SU) and quality of service (QoS) demands (QU) are paired for NOMA execution. The security of SU is enhanced through inverse power allocation of the conventional NOMA. The QoS requirements for QU are guaranteed, simultaneously. Then, the precoding design at the multi‐antenna relay has been exploited to improve the reliability demands of SU. Closed‐form expressions for SU's outage probability (OP) and intercepted probability, as well as QU's OP, are derived. The security–reliability trade‐off is also presented. Additionally, performance analysis under the half‐duplex and multi‐antenna scheme is provided as a benchmark for comparison. Finally, numerical simulations are performed to confirm the accuracy of the theoretical derivations under different schemes. Results demonstrate the superiority of the proposed scheme over benchmark schemes in terms of improving the security and reliability of SU, as well as saving power consumption of the system. |
| format | Article |
| id | doaj-art-4dbc9c5ccf1a43b18a222b2343fdcdc8 |
| institution | OA Journals |
| issn | 1751-8628 1751-8636 |
| language | English |
| publishDate | 2024-12-01 |
| publisher | Wiley |
| record_format | Article |
| series | IET Communications |
| spelling | doaj-art-4dbc9c5ccf1a43b18a222b2343fdcdc82025-08-20T01:58:08ZengWileyIET Communications1751-86281751-86362024-12-0118201956196610.1049/cmu2.12779Secure transmission design in cooperative NOMA networks: Orienting toward user requirementsDan Jiang0Yuanyuan Gao1Guoxin Li2Nan Sha3Jihao Cai4ChengFei Ding5Troops Huizhou ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaAbstract This paper presents a full‐duplex and multi‐antenna relay‐aided transmission scheme for the user‐oriented perspective in cooperative non‐orthogonal multiple access (NOMA) systems. Relying on the service requirements, two legitimate users with security demands (SU) and quality of service (QoS) demands (QU) are paired for NOMA execution. The security of SU is enhanced through inverse power allocation of the conventional NOMA. The QoS requirements for QU are guaranteed, simultaneously. Then, the precoding design at the multi‐antenna relay has been exploited to improve the reliability demands of SU. Closed‐form expressions for SU's outage probability (OP) and intercepted probability, as well as QU's OP, are derived. The security–reliability trade‐off is also presented. Additionally, performance analysis under the half‐duplex and multi‐antenna scheme is provided as a benchmark for comparison. Finally, numerical simulations are performed to confirm the accuracy of the theoretical derivations under different schemes. Results demonstrate the superiority of the proposed scheme over benchmark schemes in terms of improving the security and reliability of SU, as well as saving power consumption of the system.https://doi.org/10.1049/cmu2.127795G mobile communicationantennasinformation theoryinterference (signal)multi‐access systemsnumerical analysis |
| spellingShingle | Dan Jiang Yuanyuan Gao Guoxin Li Nan Sha Jihao Cai ChengFei Ding Secure transmission design in cooperative NOMA networks: Orienting toward user requirements IET Communications 5G mobile communication antennas information theory interference (signal) multi‐access systems numerical analysis |
| title | Secure transmission design in cooperative NOMA networks: Orienting toward user requirements |
| title_full | Secure transmission design in cooperative NOMA networks: Orienting toward user requirements |
| title_fullStr | Secure transmission design in cooperative NOMA networks: Orienting toward user requirements |
| title_full_unstemmed | Secure transmission design in cooperative NOMA networks: Orienting toward user requirements |
| title_short | Secure transmission design in cooperative NOMA networks: Orienting toward user requirements |
| title_sort | secure transmission design in cooperative noma networks orienting toward user requirements |
| topic | 5G mobile communication antennas information theory interference (signal) multi‐access systems numerical analysis |
| url | https://doi.org/10.1049/cmu2.12779 |
| work_keys_str_mv | AT danjiang securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements AT yuanyuangao securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements AT guoxinli securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements AT nansha securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements AT jihaocai securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements AT chengfeiding securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements |