Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise
This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user w...
Ausführliche Beschreibung
Autor*in: |
Van-Long Nguyen [verfasserIn] Dac-Binh Ha [verfasserIn] Duc-Dung Tran [verfasserIn] Yoonill Lee [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2019 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - European Alliance for Innovation (EAI), 2019, 6(2019), 20 |
---|---|
Übergeordnetes Werk: |
volume:6 ; year:2019 ; number:20 |
Links: |
---|
DOI / URN: |
10.4108/eai.13-7-2018.159945 |
---|
Katalog-ID: |
DOAJ040820394 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ040820394 | ||
003 | DE-627 | ||
005 | 20230308041748.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230227s2019 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.4108/eai.13-7-2018.159945 |2 doi | |
035 | |a (DE-627)DOAJ040820394 | ||
035 | |a (DE-599)DOAJa0d8af7fb7ab4e6580d239e9d2373518 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TK7885-7895 | |
100 | 0 | |a Van-Long Nguyen |e verfasserin |4 aut | |
245 | 1 | 0 | |a Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise |
264 | 1 | |c 2019 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results. | ||
650 | 4 | |a non-orthogonal multiple access | |
650 | 4 | |a cooperative network | |
650 | 4 | |a decode and forward | |
650 | 4 | |a artificial noise | |
650 | 4 | |a secrecy outage probability | |
653 | 0 | |a Computer engineering. Computer hardware | |
653 | 0 | |a Systems engineering | |
653 | 0 | |a TA168 | |
700 | 0 | |a Dac-Binh Ha |e verfasserin |4 aut | |
700 | 0 | |a Duc-Dung Tran |e verfasserin |4 aut | |
700 | 0 | |a Yoonill Lee |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t EAI Endorsed Transactions on Industrial Networks and Intelligent Systems |d European Alliance for Innovation (EAI), 2019 |g 6(2019), 20 |w (DE-627)1685392733 |x 24100218 |7 nnns |
773 | 1 | 8 | |g volume:6 |g year:2019 |g number:20 |
856 | 4 | 0 | |u https://doi.org/10.4108/eai.13-7-2018.159945 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/a0d8af7fb7ab4e6580d239e9d2373518 |z kostenfrei |
856 | 4 | 0 | |u https://eudl.eu/pdf/10.4108/eai.13-7-2018.159945 |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2410-0218 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 6 |j 2019 |e 20 |
author_variant |
v l n vln d b h dbh d d t ddt y l yl |
---|---|
matchkey_str |
article:24100218:2019----::nacnpyialyreuiyocoeaieootooamlilacsn |
hierarchy_sort_str |
2019 |
callnumber-subject-code |
TK |
publishDate |
2019 |
allfields |
10.4108/eai.13-7-2018.159945 doi (DE-627)DOAJ040820394 (DE-599)DOAJa0d8af7fb7ab4e6580d239e9d2373518 DE-627 ger DE-627 rakwb eng TK7885-7895 Van-Long Nguyen verfasserin aut Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results. non-orthogonal multiple access cooperative network decode and forward artificial noise secrecy outage probability Computer engineering. Computer hardware Systems engineering TA168 Dac-Binh Ha verfasserin aut Duc-Dung Tran verfasserin aut Yoonill Lee verfasserin aut In EAI Endorsed Transactions on Industrial Networks and Intelligent Systems European Alliance for Innovation (EAI), 2019 6(2019), 20 (DE-627)1685392733 24100218 nnns volume:6 year:2019 number:20 https://doi.org/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/article/a0d8af7fb7ab4e6580d239e9d2373518 kostenfrei https://eudl.eu/pdf/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/toc/2410-0218 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2019 20 |
spelling |
10.4108/eai.13-7-2018.159945 doi (DE-627)DOAJ040820394 (DE-599)DOAJa0d8af7fb7ab4e6580d239e9d2373518 DE-627 ger DE-627 rakwb eng TK7885-7895 Van-Long Nguyen verfasserin aut Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results. non-orthogonal multiple access cooperative network decode and forward artificial noise secrecy outage probability Computer engineering. Computer hardware Systems engineering TA168 Dac-Binh Ha verfasserin aut Duc-Dung Tran verfasserin aut Yoonill Lee verfasserin aut In EAI Endorsed Transactions on Industrial Networks and Intelligent Systems European Alliance for Innovation (EAI), 2019 6(2019), 20 (DE-627)1685392733 24100218 nnns volume:6 year:2019 number:20 https://doi.org/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/article/a0d8af7fb7ab4e6580d239e9d2373518 kostenfrei https://eudl.eu/pdf/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/toc/2410-0218 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2019 20 |
allfields_unstemmed |
10.4108/eai.13-7-2018.159945 doi (DE-627)DOAJ040820394 (DE-599)DOAJa0d8af7fb7ab4e6580d239e9d2373518 DE-627 ger DE-627 rakwb eng TK7885-7895 Van-Long Nguyen verfasserin aut Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results. non-orthogonal multiple access cooperative network decode and forward artificial noise secrecy outage probability Computer engineering. Computer hardware Systems engineering TA168 Dac-Binh Ha verfasserin aut Duc-Dung Tran verfasserin aut Yoonill Lee verfasserin aut In EAI Endorsed Transactions on Industrial Networks and Intelligent Systems European Alliance for Innovation (EAI), 2019 6(2019), 20 (DE-627)1685392733 24100218 nnns volume:6 year:2019 number:20 https://doi.org/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/article/a0d8af7fb7ab4e6580d239e9d2373518 kostenfrei https://eudl.eu/pdf/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/toc/2410-0218 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2019 20 |
allfieldsGer |
10.4108/eai.13-7-2018.159945 doi (DE-627)DOAJ040820394 (DE-599)DOAJa0d8af7fb7ab4e6580d239e9d2373518 DE-627 ger DE-627 rakwb eng TK7885-7895 Van-Long Nguyen verfasserin aut Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results. non-orthogonal multiple access cooperative network decode and forward artificial noise secrecy outage probability Computer engineering. Computer hardware Systems engineering TA168 Dac-Binh Ha verfasserin aut Duc-Dung Tran verfasserin aut Yoonill Lee verfasserin aut In EAI Endorsed Transactions on Industrial Networks and Intelligent Systems European Alliance for Innovation (EAI), 2019 6(2019), 20 (DE-627)1685392733 24100218 nnns volume:6 year:2019 number:20 https://doi.org/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/article/a0d8af7fb7ab4e6580d239e9d2373518 kostenfrei https://eudl.eu/pdf/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/toc/2410-0218 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2019 20 |
allfieldsSound |
10.4108/eai.13-7-2018.159945 doi (DE-627)DOAJ040820394 (DE-599)DOAJa0d8af7fb7ab4e6580d239e9d2373518 DE-627 ger DE-627 rakwb eng TK7885-7895 Van-Long Nguyen verfasserin aut Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results. non-orthogonal multiple access cooperative network decode and forward artificial noise secrecy outage probability Computer engineering. Computer hardware Systems engineering TA168 Dac-Binh Ha verfasserin aut Duc-Dung Tran verfasserin aut Yoonill Lee verfasserin aut In EAI Endorsed Transactions on Industrial Networks and Intelligent Systems European Alliance for Innovation (EAI), 2019 6(2019), 20 (DE-627)1685392733 24100218 nnns volume:6 year:2019 number:20 https://doi.org/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/article/a0d8af7fb7ab4e6580d239e9d2373518 kostenfrei https://eudl.eu/pdf/10.4108/eai.13-7-2018.159945 kostenfrei https://doaj.org/toc/2410-0218 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 6 2019 20 |
language |
English |
source |
In EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 6(2019), 20 volume:6 year:2019 number:20 |
sourceStr |
In EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 6(2019), 20 volume:6 year:2019 number:20 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
non-orthogonal multiple access cooperative network decode and forward artificial noise secrecy outage probability Computer engineering. Computer hardware Systems engineering TA168 |
isfreeaccess_bool |
true |
container_title |
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems |
authorswithroles_txt_mv |
Van-Long Nguyen @@aut@@ Dac-Binh Ha @@aut@@ Duc-Dung Tran @@aut@@ Yoonill Lee @@aut@@ |
publishDateDaySort_date |
2019-01-01T00:00:00Z |
hierarchy_top_id |
1685392733 |
id |
DOAJ040820394 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ040820394</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308041748.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4108/eai.13-7-2018.159945</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ040820394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJa0d8af7fb7ab4e6580d239e9d2373518</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK7885-7895</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Van-Long Nguyen</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">non-orthogonal multiple access</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cooperative network</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">decode and forward</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">artificial noise</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">secrecy outage probability</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer engineering. Computer hardware</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Systems engineering</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">TA168</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Dac-Binh Ha</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Duc-Dung Tran</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Yoonill Lee</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">EAI Endorsed Transactions on Industrial Networks and Intelligent Systems</subfield><subfield code="d">European Alliance for Innovation (EAI), 2019</subfield><subfield code="g">6(2019), 20</subfield><subfield code="w">(DE-627)1685392733</subfield><subfield code="x">24100218</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:6</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:20</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4108/eai.13-7-2018.159945</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/a0d8af7fb7ab4e6580d239e9d2373518</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://eudl.eu/pdf/10.4108/eai.13-7-2018.159945</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2410-0218</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">6</subfield><subfield code="j">2019</subfield><subfield code="e">20</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Van-Long Nguyen |
spellingShingle |
Van-Long Nguyen misc TK7885-7895 misc non-orthogonal multiple access misc cooperative network misc decode and forward misc artificial noise misc secrecy outage probability misc Computer engineering. Computer hardware misc Systems engineering misc TA168 Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise |
authorStr |
Van-Long Nguyen |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)1685392733 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
TK7885-7895 |
illustrated |
Not Illustrated |
issn |
24100218 |
topic_title |
TK7885-7895 Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise non-orthogonal multiple access cooperative network decode and forward artificial noise secrecy outage probability |
topic |
misc TK7885-7895 misc non-orthogonal multiple access misc cooperative network misc decode and forward misc artificial noise misc secrecy outage probability misc Computer engineering. Computer hardware misc Systems engineering misc TA168 |
topic_unstemmed |
misc TK7885-7895 misc non-orthogonal multiple access misc cooperative network misc decode and forward misc artificial noise misc secrecy outage probability misc Computer engineering. Computer hardware misc Systems engineering misc TA168 |
topic_browse |
misc TK7885-7895 misc non-orthogonal multiple access misc cooperative network misc decode and forward misc artificial noise misc secrecy outage probability misc Computer engineering. Computer hardware misc Systems engineering misc TA168 |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems |
hierarchy_parent_id |
1685392733 |
hierarchy_top_title |
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)1685392733 |
title |
Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise |
ctrlnum |
(DE-627)DOAJ040820394 (DE-599)DOAJa0d8af7fb7ab4e6580d239e9d2373518 |
title_full |
Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise |
author_sort |
Van-Long Nguyen |
journal |
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems |
journalStr |
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2019 |
contenttype_str_mv |
txt |
author_browse |
Van-Long Nguyen Dac-Binh Ha Duc-Dung Tran Yoonill Lee |
container_volume |
6 |
class |
TK7885-7895 |
format_se |
Elektronische Aufsätze |
author-letter |
Van-Long Nguyen |
doi_str_mv |
10.4108/eai.13-7-2018.159945 |
author2-role |
verfasserin |
title_sort |
enhancing physical layer security for cooperative non-orthogonal multiple access networks with artificial noise |
callnumber |
TK7885-7895 |
title_auth |
Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise |
abstract |
This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results. |
abstractGer |
This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results. |
abstract_unstemmed |
This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
20 |
title_short |
Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise |
url |
https://doi.org/10.4108/eai.13-7-2018.159945 https://doaj.org/article/a0d8af7fb7ab4e6580d239e9d2373518 https://eudl.eu/pdf/10.4108/eai.13-7-2018.159945 https://doaj.org/toc/2410-0218 |
remote_bool |
true |
author2 |
Dac-Binh Ha Duc-Dung Tran Yoonill Lee |
author2Str |
Dac-Binh Ha Duc-Dung Tran Yoonill Lee |
ppnlink |
1685392733 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.4108/eai.13-7-2018.159945 |
callnumber-a |
TK7885-7895 |
up_date |
2024-07-03T16:55:49.255Z |
_version_ |
1803577720050810880 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ040820394</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308041748.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4108/eai.13-7-2018.159945</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ040820394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJa0d8af7fb7ab4e6580d239e9d2373518</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK7885-7895</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Van-Long Nguyen</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enhancing Physical Layer Security for Cooperative Non-Orthogonal Multiple Access Networks with Artificial Noise</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This paper does the study on the performance of the physical layer secrecy of nonorthogonal multiple access(NOMA) in downlink cooperative. The given system includes one source, multiple legitimate user pairs inthe form of an eavesdropper. By applying the decode-and-forward (DF) scheme, a good user will take theinformation from the source to send it to the bad user in every pair, we assume that the eavesdropper willspend effort to decode the message from the bad user. To enhance the secrecy performance of given system, the artificial noise cooperative transmission scheme named ANCOTRAS is suggested. To assess the performance of the suggested scheme, we obtained the lower bound and exact closed-form expressions of secrecy outage probability by implementing statistical characteristics of signal-to-noise ratio (SNR) and signalto-interferenceplus-noise ratio (SINR). Furthermore, the secrecy performance of given system is studied basing on key parameters (including the power allocation ratio), average transmit power and amount of user pair for verifying the suggested scheme. At the end, the accuracy of final analytical outcome is reassured by using the Monte-Carlo simulation results.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">non-orthogonal multiple access</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cooperative network</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">decode and forward</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">artificial noise</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">secrecy outage probability</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer engineering. Computer hardware</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Systems engineering</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">TA168</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Dac-Binh Ha</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Duc-Dung Tran</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Yoonill Lee</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">EAI Endorsed Transactions on Industrial Networks and Intelligent Systems</subfield><subfield code="d">European Alliance for Innovation (EAI), 2019</subfield><subfield code="g">6(2019), 20</subfield><subfield code="w">(DE-627)1685392733</subfield><subfield code="x">24100218</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:6</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:20</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4108/eai.13-7-2018.159945</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/a0d8af7fb7ab4e6580d239e9d2373518</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://eudl.eu/pdf/10.4108/eai.13-7-2018.159945</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2410-0218</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">6</subfield><subfield code="j">2019</subfield><subfield code="e">20</subfield></datafield></record></collection>
|
score |
7.4005013 |