2018
DOI: 10.1109/access.2018.2876970
|View full text |Cite
|
Sign up to set email alerts
|

Secure Energy Efficiency for NOMA Based Cognitive Radio Networks With Nonlinear Energy Harvesting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(35 citation statements)
references
References 39 publications
0
35
0
Order By: Relevance
“…In other context of NOMA, the strong primary user (PU) communicates confidential signal with multiple uniformly distributed PUs as external eavesdroppers are randomly located and they provided tractable formula to analyze the security and the reliability performance [36]. By exploiting the practical non-linear EH scheme from the RF signals, the secondary users are be able to harvest energy to securely transmit the secondary privacy information [37]. The authors in [38] presented distributed sequential coalition formation (DSCF) paradigm to solve the user grouping problem, where the primary user's spectrum band can be shared with multiple cognitive users within a group while achieving requirement of the primary user with respect to a minimum rate.…”
Section: A Related Workmentioning
confidence: 99%
“…In other context of NOMA, the strong primary user (PU) communicates confidential signal with multiple uniformly distributed PUs as external eavesdroppers are randomly located and they provided tractable formula to analyze the security and the reliability performance [36]. By exploiting the practical non-linear EH scheme from the RF signals, the secondary users are be able to harvest energy to securely transmit the secondary privacy information [37]. The authors in [38] presented distributed sequential coalition formation (DSCF) paradigm to solve the user grouping problem, where the primary user's spectrum band can be shared with multiple cognitive users within a group while achieving requirement of the primary user with respect to a minimum rate.…”
Section: A Related Workmentioning
confidence: 99%
“…By substituting (20) and (21) into (A1), and analyzing the independent elements in P 2 and P 3 , we can rewrite P 2 as the follows…”
Section: Discussionmentioning
confidence: 99%
“…To maximize the sum secrecy rate of this system, a strategy for optimizing NOMA power-allocation factors was proposed. The authors of [20] studied secrecy energy efficient in a CR-NOMA system with NLEH. This work focused on developing strategies to find the optimal transmit powers of WEH secondary transmitters for given conditions of energy channels.…”
Section: Introductionmentioning
confidence: 99%
“…Then, an algorithm using Sequential Convex Approximation (SCA) method was proposed to solve the non-convex fractional programming problem. In [37], a CR-NOMA system model was presented to maximize the minimum secrecy EE considering the practical nonlinear energy harvesting and information security simultaneously. Reference [38] focused on the EE optimization for NOMA based heterogeneous cloud CR network and elaborated promising 5G technologies such as massive MIMO, millimeter-wave communications and Device-to-Device (D2D) communications.…”
Section: Several Wireless Communication System Models Focusing On Ee mentioning
confidence: 99%