Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Power optimization for enhancing secrecy of cooperative user relaying NOMA networks

Tools
- Tools
+ Tools

Cao, Yang, Wang, Shuai, Jin, Minglu, Xing, Chengwen, Chen, Yunfei, Zhao, Nan and Ding, Zhiguo (2020) Power optimization for enhancing secrecy of cooperative user relaying NOMA networks. IEEE Transactions on Vehicular Technology, 69 (7). pp. 8008-8012. doi:10.1109/TVT.2020.2992765 ISSN 0018-9545.

[img] PDF
engineering-150520-wrap--twoco.pdf - Submitted Version
Embargoed item. Restricted access to Repository staff only - Requires a PDF viewer.

Download (1145Kb)
Official URL: http://dx.doi.org/10.1109/TVT.2020.2992765

Request Changes to record.

Abstract

To enhance the secrecy of wireless transmission, we propose a cooperative user relaying NOMA scheme, in which the near user works in full-duplex mode by transmitting jamming signals and receiving desired signals in the first phase, and the base station sends jamming signals in the second phase. Two power allocation (PA) schemes between the legitimate and jamming signals are designed based on different knowledge of the eavesdropping channel state information (ECSI). The first scheme aims to jam the eavesdropping with highest power while meeting rate requirements without ECSI. In the second scheme, the closed-form expressions of secrecy outage probability (SOP) are first derived using the statistical ECSI. Then, the sum secrecy rate is maximized by optimizing the PA and redundant rate with SOP constraints. Simulation results are provided to show the effectiveness of the proposed schemes.

Item Type: Journal Article
Divisions: Faculty of Science, Engineering and Medicine > Engineering > Engineering
Journal or Publication Title: IEEE Transactions on Vehicular Technology
Publisher: IEEE
ISSN: 0018-9545
Official Date: July 2020
Dates:
DateEvent
July 2020Published
6 May 2020Available
4 May 2020Accepted
Volume: 69
Number: 7
Page Range: pp. 8008-8012
DOI: 10.1109/TVT.2020.2992765
Status: Peer Reviewed
Publication Status: Published
Reuse Statement (publisher, data, author rights): © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Access rights to Published version: Restricted or Subscription Access

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item
twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us