This paper investigates the security performance of two relay selection schemes for cooperative non-orthogonal multiple access (NOMA) systems, where K randomly distributed relays are employed with either decode-and-forward (DF) or amplify-and-forward (AF) protocols. More particularly, two-stage relay selection (TRS) and optimal relay selection (ORS) schemes are taken into consideration. To characterize the secrecy behaviors of these RS schemes, new closed-form expressions of both exact and asymptotic secrecy outage probability (SOP) are derived. We confirm that the SOP of the TRS scheme is equal to that of the ORS scheme for DF/AF-based NOMA systems. Based on the analytical results, the secrecy diversity orders achieved by the pair of RS schemes for the DF/AF-based NOMA systems are K , which are equal to the number of relays. It is shown that the secrecy diversity orders for the cooperative NOMA systems are determined by the number of the relays. The numerical results are presented to demonstrate that: 1) the secrecy performance of the AF-based NOMA system outperforms that of the DF-based NOMA system, when not all DF relays successfully decode the received information; 2) with the number of relays increasing, the SOP of these RS schemes for the DF-/AF-based NOMA systems becomes lower, and; 3) the TRS/ORS schemes are capable of achieving better secrecy outage behaviors compared with random RS and orthogonal multiple access-based RS schemes. INDEX TERMS Amplify-and-forward, decode-and-forward, non-orthogonal multiple access, physical layer security, relay selection.
In this paper, we investigate the performance of the non-orthogonal multiple access (NOMA) system with incremental relaying, where the relay is employed with amplify-and-forward (AF) or decode-and-forward (DF) protocols. To characterize the outage behaviors of the incremental cooperative NOMA (ICN) system, new closed-form expressions of both exact and asymptotic outage probability for two users are derived. In addition, the performance of the conventional cooperative NOMA (CCN) system is analyzed as a benchmark for the the purpose of comparison. We confirm that the outage performance of the distant user is enhanced when ICN system is employed. Numerical results are presented to demonstrate that (1) the near user of the ICN system achieves better outage behavior than that of the CCN system in the low signal-to-noise ratio (SNR) region; (2) the outage performance of distant user for the DF-based ICN system is superior to that of the AF-based ICN system when the system works in cooperative NOMA transmission mode; and (3) in the low SNR, the throughput of the ICN system is higher than that of the CCN system. authors of [9] have researched the performance of a downlink single-cell NOMA network when assuming imperfect channel state information (CSI) and second-order statistics. Furthermore, the authors in [10] consider the scenario that each user only feedback one bit of its CSI to a base station (BS) and analyzed the outage performance. Apart from these researches, there are a lot of studies on improving the secrecy performance of multiple users [11,12], where the external and internal eavesdropping scenarios have been considered. Up to now, NOMA has been extended to cooperative communication systems [13, 14], as the higher diversity and extended coverage can be obtained in wireless networks. The authors have analyzed the outage performance of NOMA system with decode and forward (DF) relay employing full-duplex (FD) and half-duplex (HD) mode, where the near user was selected as a relay to deliver information and improve transmission reliability of distance users [15]. Inspired by this, simultaneous wireless information and
Mobile edge computing (MEC) is a promising technique to meet the demands of computing-intensive and delay-sensitive applications by providing computation and storage capabilities in close proximity to mobile users. In this paper, we study energy-efficient resource allocation (EERA) schemes for hierarchical MEC architecture in heterogeneous networks. In this architecture, both small base station (SBS) and macro base station (MBS) are equipped with MEC servers and help smart mobile devices (SMDs) to perform tasks. Each task can be partitioned into three parts. The SMD, SBS, and MBS each perform a part of the task and form a three-tier computing structure. Based on this computing structure, an optimization problem is formulated to minimize the energy consumption of all SMDs subject to the latency constraints, where radio and computation resources are considered jointly. Then, an EERA mechanism based on the variable substitution technique is designed to calculate the optimal workload distribution, edge computation capability allocation, and SMDs’ transmit power. Finally, numerical simulation results demonstrate the energy efficiency improvement of the proposed EERA mechanism over the baseline schemes.
Network attacks show a trend of increased attack intensity, enhanced diversity, and more concealed attack methods, which put forward higher requirements for the performance of network security equipment. Unlike the SDN (software defined network) switch with a fixed-function data plane, switches with programmable data planes can help users realize more network protocols. Programming Protocol-independent Packet Processors (P4) is proposed to define the operations of the data plane and to implement user’s applications, e.g., data center networks, security, or 5G. This paper provides a review of research papers on solving network security problems with P4-based programmable data plane. The work can be organized into two parts. In the first part, the programming language P4, P4 program, architectures, P4 compilers, P4 Runtime, and P4 target are introduced according to the workflow model. The advantages of P4-based programmable switching in solving network security are analyzed. In the second part, the existing network security research papers are divided into four parts according to the perspectives of passive defense, active defense, and combination of multiple technologies. The schemes in each category are compared, and the core ideas and limitations are clarified. In addition, a detailed comparison is made for the research on the performance of P4 targets. Finally, trends and challenges related to the P4-based programmable data plane are discussed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.