2020
DOI: 10.3390/app10103630
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Energy Efficiency Maximization in an Underlying Cognitive Radio–NOMA System with a Cooperative Relay and an Energy-Harvesting User

Abstract: Security is considered a critical issue in the deployment of 5G networks because of the vulnerability of information that can be intercepted by eavesdroppers in wireless transmission environments. Thus, physical layer security has emerged as an alternative for the secure enabling of 5G technologies and for tackling this security issue. In this paper, we study the secrecy energy efficiency (SEE) in a downlink underlying cognitive radio (CR)—non-orthogonal multiple access (NOMA) system with a cooperative relay. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…Thus, high-band technology has been adopted for mmWave communications [15]. Different concepts and strategies have been proposed in recent studies to improve the capacity of wireless transmissions, such as beamforming designs, resource allocation schemes, and multiple antenna-based schemes [16][17][18].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, high-band technology has been adopted for mmWave communications [15]. Different concepts and strategies have been proposed in recent studies to improve the capacity of wireless transmissions, such as beamforming designs, resource allocation schemes, and multiple antenna-based schemes [16][17][18].…”
Section: Related Workmentioning
confidence: 99%
“…The noise present on the channel is modeled as additive white Gaussian noise. The spread signal is sent through the two paths mentioned above to reach the base station [53,54], thus the signal received by relay from the source , , , 1,2,...,…”
Section: Relay Transmissionmentioning
confidence: 99%
“…Hs n , The spread signal is sent through the two paths mentioned above to reach the base station [53,54], thus the signal received by relay from the source…”
Section: Relay Transmissionmentioning
confidence: 99%
“…In the literature, PSO is considered a powerful optimization method since it has demonstrated high performance in solving optimization problems. For instance, in our previous works [1,18], the PSO technique has been investigated and applied for maximizing the secrecy sum rate and the secrecy energy efficiency of a cooperative NOMA network, respectively. In both cases, the results showed that the proposed PSO-based method accomplished yield very close to that obtained by the optimal exhaustive search method, but with the benefit of low computational complexity.…”
Section: Introductionmentioning
confidence: 99%
“…This motivated us to introduce PSO as a potential optimization solution in an innovative wireless-powered NOMA-enabled MEC system with a practical non-linear EH user. Different from the works in [1,18], where the downlink transmission from the transmitter to the receivers is only considered to carry messages, in this paper an uplink-downlink transmission scheme is studied where the AP integrates a MEC server to alieve the burden of the users. Moreover, the AP provides the WPT service and practical nonlinear EH and PB are integrated into the network.…”
Section: Introductionmentioning
confidence: 99%