2019
DOI: 10.1109/tvt.2019.2919873
|View full text |Cite
|
Sign up to set email alerts
|

Secure Primary Transmission Assisted by a Secondary Full-Duplex NOMA Relay

Abstract: In this correspondence, secure primary transmission is proposed by using a multi-antenna secondary full-duplex nonorthogonal multiple access (NOMA) relay in cognitive radio (CR) networks. First, the primary signal is transmitted from the primary transmitter to the relay. Artificial noise is generated by using part of the antennas at the relay to disrupt eavesdropping, without affecting the primary transmission. Then, superimposed signals are transmitted from the relay to the primary receiver (PR) and secondary… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
40
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 54 publications
(43 citation statements)
references
References 15 publications
0
40
0
Order By: Relevance
“…where p SIC is the error probability that U1 detects the signal of U2, p c,1 is the BER of U1 under the condition that the signal of U2 is correctly detected, and p e,1 denotes the BER of U1 when errors occur in SIC. Let us denote v = ∥e k x n − ekxn∥ 2 , where e k is the kth row of an N -dimensional unit matrix. Consequently, the formulation of p SIC can be given by [19]…”
Section: B Ber Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…where p SIC is the error probability that U1 detects the signal of U2, p c,1 is the BER of U1 under the condition that the signal of U2 is correctly detected, and p e,1 denotes the BER of U1 when errors occur in SIC. Let us denote v = ∥e k x n − ekxn∥ 2 , where e k is the kth row of an N -dimensional unit matrix. Consequently, the formulation of p SIC can be given by [19]…”
Section: B Ber Performance Analysismentioning
confidence: 99%
“…where p R is the error probability that the relay detects the signal of U2, p c,2 is the BER of U2 when the signal of U2 is correctly detected at the relay and p e,2 denotes the BER when the relay forwards an erroneous signal. According to (2) and (6), both in the BS-to-relay and relayto-U2 links, the SM symbol is used to carry the information of U2. In addition, N − 1 antennas are used to receive the information at the relay.…”
Section: B Ber Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Secure communication is also a critical issue for cooperative CR NOMA networks. Recently, physical layer security has been proposed in [21][22][23][24][25][26][27] for cooperative CR NOMA networks, where the security performance of communication networks can be greatly improved by the cooperation of the relay node (i.e., SU). e authors in [21] studied the physical layer security in a cooperative CR NOMA network where all the nodes had a single antenna and the SU employed amplify-and-forward (AF) relaying to forward the PU's signal, aiming to analyze the security performance of the PU and throughput of the SU.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, in this work, we will primarily focus on the physical layer secrecy performance of an underlay CRN. In an effort to further improve PLS of wireless transmissions, several techniques were proposed, such as collaborative zero-forcing beamforming (ZFB) [7]- [9], cooperative relays [4], [10]- [11] and full-duplex (FD) techniques [12]- [13]. First, for a CRN, beamforming can be used not only to eliminate the interference from the secondary transmitter to the PU, but also to improve the secrecy performance of the system due to the more concentrated power to the secondary destination.…”
Section: Introductionmentioning
confidence: 99%