SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 20, No. 4, August 2022, pp. 699∼706
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v20i4.20934 ❒ 699
Secure transmission for uplink and downlink
non-orthogonal multiple access system with imperfect
channel state information
Dinh-Thuan Do, Minh-Sang Van Nguyen
Department of Electronics and Telecommunications, Faculty of Electronics Technology, Industrial University of Ho Chi Minh City
(IUH), Ho Chi Minh 70000, Vietnam
Article Info
Article history:
Received June 20, 2021
Revised May 21, 2022
Accepted June 01, 2022
Keywords:
NOMA
Physical layer security
SPSC
ABSTRACT
In this paper, we design a secure transmission scheme in uplink and downlink of non-
orthogonal multiple access (NOMA) system. In this scenario, two pairs of base station-
user can operate under the presence of eavesdropper. The relay plays an important
role to forward signals from group of base stations to serve distant users. However,
the eavesdropper can overhear signal which leads to secure performance need be re-
considered. To provide secure performance, we derive the closed-form expressions
for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge
coverage area. The channel conditions meet imperfect channel state information (CSI)
which shows degraded secure performance. Results confirm the relationship between
transmit power at the source and and SPSC how many main parameters affecting se-
cure performance metric. Furthermore, simulation results show that the uplink and
downlink NOMA technique improves secure performance in the low SPSC region.
We further conduct analysis by using Monte-Carlo simulations.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Minh-Sang Van Nguyen
Department of Electronics and Telecommunications, Faculty of Electronics Technology
Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh 70000, Vietnam
Email: nguyenvanminhsang@iuh.edu.vn
1. INTRODUCTION
The massive evolution in wireless devices and information transfer in wireless communications has
increased the requirement for massive connectivity and spectrum availability in wireless networks such as
5G communications [1]-[3]. Deployment of heterogenous networks (HetNet) has become the primary feature
to increase the spectrum usage and allocate more users to the spectrum [4]-[6]. To deliver increased-data-
rate services, in HetNet, numerous affordable low-power small base stations (SBSs) are installed [7]. The
main work of SBSs is to get rid of data traffic from micro-base-stations (MBSs), thereby, solving the high
traffic issue and increasing the spectral efficiency of the communicating networks. Furthermore, the SBSs
also work similarly to relays to increase the data transmission in the networks between the users [8],[9]. To
tackle these issues, the HetNets were introduced to work with device-to-device (D2D), non-orthogonal multiple
access (NOMA) communications [10]-[13]. With the utilization of D2D communications, the data traffic
can be reduced since there is no need of any base station (BS) involvement, thereby, establishing the direct
connection between the devices. Meanwhile, these devices can also work as D2D relay nodes (DRN) to enhance
Journal homepage: http://telkomnika.uad.ac.id
700 ❒ ISSN: 1693-6930
the communication for the faded users [14], [15]. It is also found that the D2D communications are easier
to be installed and also utilizes less infrastructure. Since the D2D applications of reducing data traffic is
interesting, studies have been performed to understand these applications more deeply in [16], [17]. In [16],
the data contents are saved by the cached users and shared among the other devices, whereas, in [17], NOMA
is deployed to improve network connectivity and capacity, and D2D exhibits spectrum efficiency. In [18]-[20],
deployment of uplink and downlink of NOMA is studied to prove its advantage compared with orthogonal
multiple access (OMA) techniques.
Recently, physical layer security (PLS) techniques can eliminate difficulties of secure guarantee at
upper layer. Such PLS can combine in current NOMA systems. In [21], a PLS uplink NOMA system was
studied to allow one base station to serve many destinations in the presence of one eavesdropper. To get
benefits from NOMA, uplink transmission of two users are processed opportunistically. In this system, idle
users is used to operate as a friendly jammer which relies on artificial noise to reduce or refuse services to the
eavesdropper. However, lack of works considered uplink downlink NOMA, which motivates us to examine
secure performance of two pairs of base stations and destinations.
2. SYSTEM MODEL
In Figure 1, we consider uplink and downlink to allow two base stations BS1, BS2 serving two
destinations via a relay R. The wireless channels are assumed to follow flat slow Rayleigh fading. We denote
links BS1 → R, BS2 → R, R → D1, R → D2 and R → E correspond to channels h1, h2, h3, h4
and he, respectively. Accordingly, the corresponding channel power gains follow the distributions as |h1|
2
∼
CN (0, ϖ1), |h2|
2
∼ CN (0, ϖ2), |h3|
2
∼ CN (0, ϖ3), |h4|
2
∼ CN (0, ϖ4) and |he|
2
∼ CN (0, ϖe),
respectively. q1, q2 are signals proceeded from two corresponding base stations with respect to decoding at
destinations.
Figure 1. System model
Before computing received signals at destinations and the intermediate device, we denote Pbsi as the
transmit power at base stations BSi, i = 1, 2. It is noted that interference following the additive white Gaussian
noise (AWGN) at R, namely εR corresponding its distribution εR ∼ CN (0, N0). The base stations want to get
signals qi for each destination Di. By conducting NOMA scheme, power allocation factors assigned to users,
namely δi which satisfies two conditions δ1 + δ2 = 1 and δ1 > δ2 (based on how far user connects to relay, the
far user needs higher power factor). The intermediate device first receives signals from the two base stations,
hence we can formulate such received signal [22].
yS→R =

h1 + b
h1
 p
δ1Pbs1q1 +

h2 + b
h2
 p
δ2Pbs2q2 + εR (1)
Where b
hi stands for error term which is considered as a complex Gaussian distributed random variable with
CN 0, ℘2
ui

. We adopt the case of ℘2
ui as constant [23].
Since the received signal-to-interference-plus-noise ratio (SINR) needs to be computed to detect sep-
arated signal at the intermediate device, we set order of signal detection based on channel gains. That means
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022 : 699 – 706
TELKOMNIKA Telecommun Comput El Control ❒ 701
two signals q1, q2 can be detected following the way that treating q2 as noise to detect q1 and a successive
interference cancellation (SIC) is adopted to detect signal q2. Particularly, we have SINRs:
γu
q1
=
δ1ρbs1|h1|
2
δ2ρbs2|h2|
2
+ δ1ρbs1℘2
u1 + δ2ρbs2℘2
u2 + 1
, γu
q2
=
δ2ρbs2|h2|
2
δ1ρbs1℘2
u1 + δ2ρbs2℘2
u2 + 1
(2)
Where:
ρbs1 = Pbs1
N0
ρbs2 = Pbs2
N0
At the second hop, signal can be forwarded by the intermediate device to corresponding destinations.
Specifically, the relay first transmits a superimposed composite signal, regenerated from qi, to Di. We charac-
terize the AWGN term, namely εx at user Di as εx ∼ CN (0, N0). The destination Di can achieve the received
signal [24], [25].
yR→Di
=

hx + b
hx
 p
δ1PRq1 +
p
δ2PRq2

+ εx, (x = 3, 4) (3)
Where PR denote the transmit power at R, b
hx is the error term, which is typically modeled as a complex
Gaussian distributed random variable with CN 0, ℘2
di

.
After receiving signal from R, by considering the noise term is signal q2 for user D2 , D1 can detect
its signal q1 by computing SINR as:
γd
q1
=
δ1ρR|h3|
2
δ2ρR|h3|
2
+ ρR℘2
d1 + 1
(4)
Where ρR = PR
N0
.
Simultaneously, D2 have similar signal detection to achieve noise term q1 and then its own signal q2.
This is just possible with help of SIC. The expressions of SINR to detect signal q1 and q2 at D2 are formulated
respectively as:
γd
1→2 =
δ1ρR|h4|
2
δ2ρR|h4|
2
+ ρR℘2
d2 + 1
, γd
q2
=
δ2ρR|h4|
2
ρR℘2
d2 + 1
(5)
We deal with threat situation when the main signal is likely stolen by illegal user. Also, the received
signal at eavesdropper could be considered with assumption it can obtain parameter of channel. The eaves-
dropper E wants to overhear signal transmitted from the intermediate device R and the received signal is:
yE = he
p
δ1PRq1 +
p
δ2PRq2

+ ne (6)
In next step, we compute SINR as the second thing that is necessary to consider secure performance.
We leverage the parallel interference cancellation (PIC) to detect signal for eavesdropper. More importantly,
the eavesdropper possesses the received SINR to detect Di’s and the related received signal is expressed by
Zhang et al. [24].
γe
qi
= aiρe|he|
2
(7)
Where ρe = PR
ne
.
Before evaluating secure performance, secrecy rate of each user must be computed. Then, we evaluate
the relationship of secrecy rates between intended user and eavesdropper. Following above steps, the achievable
secrecy rates can be computed for pairs of users BS1 − D1, BS2 − D2 respectively [25].
Ψ1 =
1
2

log2 min
1 + γu
q1
1 + γe
q1
,
1 + γd
q1
1 + γe
q1
!#+
(8)
and
Ψ2 =
1
2

log2 min
1 + γu
q2
1 + γe
q2
,
1 + γd
1→2
1 + γe
q2
,
1 + γd
q2
1 + γe
q2
!#+
(9)
In which [x]
+
= max {0, x}.
Secure transmission for uplink and downlink non-orthogonal multiple access ... (Dinh-Thuan Do)
702 ❒ ISSN: 1693-6930
3. STRICTLY POSITIVE SECRECY CAPACITY (SPSC) ANALYSIS
3.1. SPSC for BS1 − D1
We examine SPSC performance to highlight secrecy performance. We compute such performance to
exhibit the probability of existence of secrecy capacity [24], [26]. Thus, the SPSC for the base station - D1 can
be given by:
SPSCBS1
D1
= Pr (Ψ1  0)
= Pr γu
q1
≥ γe
q1

| {z }
∂1
Pr γd
q1
≥ γe
q1

| {z }
∂2
(10)
Proposition 1. The exact expression of the SPSC BS1 − D1 is:
SPSCBS1
D1
= −
η3β3
ϖe
exp (β3β4) Ei (−β3β4) (11)
Where:
Θ1 = δ1ρbs1℘2
u1 + δ2ρbs2℘2
u2 + 1
Θ2 = ρR℘2
d1 + 1
β3 = ρbs1ϖ1
δ2ρbs2ρeϖ2ϖe
β4 = Θ1ρe
ρbs1ϖ1
+ 1
ϖe
η3 =
R ∞
0
exp

− Θ2δ1ρex
(1−δ2ρex)δ1ρRϖ3
− x
ϖe

dx
Proof: from (10), ∂1 can:
∂1 = Pr γu
q1
≥ γe
q1

= Pr

|h1|
2
≥ δ1δ2ρbs2ρe|he|2
|h2|2
+Θ1δ1ρe|he|2
δ1ρbs1

=
R ∞
0
R ∞
0

1 − F|h1|2

δ1δ2ρbs2ρexy+Θ1δ1ρey
δ1ρbs1

f|h2|2 (x) f|he|2 (y) dxdy
= 1
ϖ2
1
ϖe
R ∞
0
R ∞
0
exp

−

δ1δ2ρbs2ρey
δ1ρbs1ϖ1
+ 1
ϖ2

x

exp

−

Θ1δ1ρe
δ1ρbs1ϖ1
+ 1
ϖe

y

dxdy
= 1
ϖe
R ∞
0
δ1ρbs1ϖ1
δ1δ2ρbs2ρeϖ2y+δ1ρbs1ϖ1
exp

−

Θ1δ1ρe
δ1ρbs1ϖ1
+ 1
ϖe

y

dxdy
(12)
Based on [27] Eq. (3.352.4) and applying some polynomial expansion manipulations, ∂1 can given by:
∂1 = −β3 exp (β3β4) Ei (−β3β4) (13)
Where:
β3 = ρbs1ϖ1
δ2ρbs2ρeϖ2ϖe
β4 = Θ1ρe
ρbs1ϖ1
+ 1
ϖe
From (10), ∂2 can be calculated as:
∂2 = Pr γd
q1
≥ γe
q1

= Pr

|h3|
2
≥ Θ2δ1ρe|he|2
(1−δ2ρe|he|2
)δ1ρR

=
R ∞
0

1 − F|h3|2

Θ2δ1ρex
(1−δ2ρex)δ1ρR

f|he|2 (x) dx
= 1
ϖe
R ∞
0
exp

− Θ2δ1ρex
(1−δ2ρex)δ1ρRϖ3
− x
ϖe

dx
(14)
Substituting (13) and (14) into (10), we can obtain (11). It completes the proof.
3.2. SPSC for BS2 − D2
Similar to BS1 − D2, the SPSC for BS2 − D2 case can be expressed as [24]:
SPSCBS2
D2
= Pr (Ψ2  R2)
= Pr γu
q2
≥ γe
q2

| {z }
ξ1
Pr γd
1→2 ≥ γe
q2

| {z }
ξ2
Pr γd
q2
≥ γe
q2

| {z }
ξ3
(15)
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022 : 699 – 706
TELKOMNIKA Telecommun Comput El Control ❒ 703
Proposition 2. The exact expression of the SPSC BS2 − D2 is given by:
SPSCBS2
D2
=
δ2ρbs2ϖ2
Θ1δ2ρeϖe + δ2ρbs2ϖ2
δ2ρRϖ4η4
(Θ3δ2ρeϖe + δ2ρRϖ4) ϖe
(16)
Where:
Θ3 = ρR℘2
d2 + 1
η4 =
R ∞
0
exp

− Θ3δ2ρex
(δ1−δ2δ2ρex)ρRϖ4
− x
ϖe

dx
Proof: from (15), ξ1 can be calculated as:
ξ1 = Pr γu
q2
≥ γe
q2

= Pr |h2|
2
≥
Θ1δ2ρe|he|
2
δ2ρbs2
!
=
Z ∞
0

1 − F|h2|2

Θ1δ2ρex
δ2ρbs2

f|he|2 (x) dx
=
1
ϖe
Z ∞
0
exp

−

Θ1δ2ρe
δ2ρbs2ϖ2
+
1
ϖe

x

dx
=
δ2ρbs2ϖ2
Θ1δ2ρeϖe + δ2ρbs2ϖ2
(17)
Next, ξ2 can be calculated as:
ξ2 = Pr γd
1→2 ≥ γe
q2

= Pr

|h4|
2
≥
Θ3δ2ρe|he|
2

δ1 − δ2δ2ρe|he|
2

ρR


=
Z ∞
0

1 − F|h4|2

Θ3δ2ρex
(δ1 − δ2δ2ρex) ρR

f|he|2 (x) dx
=
1
ϖe
Z ∞
0
exp

−
Θ3δ2ρex
(δ1 − δ2δ2ρex) ρRϖ4
−
x
ϖe

dx
(18)
From (15), ξ3 can be calculated as:
ξ3 = Pr γd
q2
≥ γe
q2

= Pr |h4|
2
≥
Θ3δ2ρe|he|
2
δ2ρR
!
=
Z ∞
0

1 − F|h4|2

Θ3δ2ρex
δ2ρR

f|he|2 (x) dx
=
1
ϖe
Z ∞
0
exp

−

Θ3δ2ρe
δ2ρRϖ4
+
1
ϖe

x

dx
=
δ2ρRϖ4
Θ3δ2ρeϖe + δ2ρRϖ4
(19)
The proof is completed.
4. SIMULATION RESULTS
In this section, we simulate the system with these parameters ρ = ρbs1 = ρbs2 = ρR, ℘ = ℘2
u1 =
℘2
u2 = ℘2
d1 = ℘2
d2. The SPSC performance is evaluated via Monte-Carlo and analytical simulations. Then, we
expect that these simulations provide good match in term of values of numerical simulations.
Secure transmission for uplink and downlink non-orthogonal multiple access ... (Dinh-Thuan Do)
704 ❒ ISSN: 1693-6930
-15 -10 -5 0 5 10
ρ (dB)
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
SPSC
BS1 − D1 ana.
BS2 − D2 ana.
ρe= -15 (dB) sim.
ρe= -14 (dB) sim.
ρe= -13 (dB) sim.
Figure 2. SPSC for BS1 − D1 and BS2 − D2 versus ρ as
changing ρe with δ1 = 0.9, ℘ = 0.001, ϖ1 = ϖ2 = 1, ϖ3 = 10,
ϖ4 = 2, ϖe = 1
-10 -5 0 5 10 15
ρ (dB)
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
SPSC
BS1 − D1 ana.
BS2 − D2 ana.
℘= 0.001 sim.
℘= 0.5 sim.
℘= 1 sim.
Figure 3. SPSC for BS1 − D1 and BS2 − D2 versus ρ as
changing ℘ with δ1 = 0.9, ϖ1 = ϖ2 = 1, ϖ3 = 10, ϖ4 = 2,
ϖe = 1, ρe = −12 (dB)
-15 -10 -5 0 5 10
ρ (dB)
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
SPSC
BS1 − D1 ana.
BS2 − D2 ana.
̟1 = ̟2= 1 sim.
̟1 = ̟2= 2 sim.
̟1 = ̟2= 3 sim.
Figure 4. SPSC for BS1 − D1 and BS2 − D2 versus ρ as
changing ϖ1 = ϖ2 with δ1 = 0.9, ℘ = 0.001, ϖ3 = 10, ϖ4 = 2,
ϖe = 1, ρe = −12 (dB)
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022 : 699 – 706
TELKOMNIKA Telecommun Comput El Control ❒ 705
Figure 2 demonstrates that the SPSC of two pairs of users is decided by varying impact of eaves-
dropper ρe. More importantly, two destinations exhibit different performance since power allocation factors
are different too. The impact of imperfect (channel state information) CSI ℘ leads to variance in considera-
tion of SPSC, shown in Figure 3. Therefore, by controlling CSI we can remain the stable operation of secure
performance. Similarly, Figure 4 indicates that SPSC relies on how strong channels are. We employ the sim-
ulation with three cases of channel gains, ϖ1 = ϖ2 = 1, ϖ1 = ϖ2 = 2, ϖ1 = ϖ2 = 3. Two pairs of base
station-destination still show their performance gaps.
5. CONCLUSION
In this paper, two pairs of base station-destination are studied to exhibit secure performance. We de-
ploy NOMA to allow base station increase spectrum efficiency and to reduce risk of attack from eavesdroppers.
In this circumstance, we consider two pair of users from the base stations to destinations to evaluate secure
performance once an eavesdropper also wants to overhear the main signal is being processing at main links.
The main results are represented in terms of closed-form formulas for the SPSC and main parameters can be
determined to know how SPSC can be changed. The uplink and downlink scenario in this paper can be ap-
plied to lots of applications for Internet of Things. The results are useful guidelines for engineers who can
performance secure uplink and downlink NOMA systems.
REFERENCES
[1] X. Chen, D. W. K. Ng, W. Yu, E. G. Larsson, N. Al-Dhahir, and R. Schober, “Massive Access for 5G and Beyond,” in IEEE Journal
on Selected Areas in Communications, vol. 39, no. 3, pp. 615-637, Mar. 2021, doi: 10.1109/JSAC.2020.3019724.
[2] C. Zhang, Y. -L. Ueng, C. Studer, and A. Burg, “Artificial Intelligence for 5G and Beyond 5G: Implementations, Algorithms, and
Optimizations,” in IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 10, no. 2, pp. 149-163, Jun. 2020,
doi: 10.1109/JETCAS.2020.3000103.
[3] A. Ghosh, A. Maeder, M. Baker, and D. Chandramouli, “5G Evolution: A View on 5G Cellular Technology Beyond 3GPP Release
15,” in IEEE Access, vol. 7, pp. 127639-127651, Sep. 2019, doi: 10.1109/ACCESS.2019.2939938.
[4] K. Lei, H. Ye, Y. Liang, J. Xiao, and P. Chen, “Towards a Translation-Based Method for Dynamic Heterogeneous Network Embed-
ding,” ICC 2021 - IEEE International Conference on Communications, 2021, pp. 1-6, doi: 10.1109/ICC42927.2021.9500303.
[5] M. Gerasimenko et al., “Cooperative Radio Resource Management in Heterogeneous Cloud Radio Access Networks,” in IEEE
Access, vol. 3, pp. 397-406, 2015, doi: 10.1109/ACCESS.2015.2422266.
[6] A. Al-Saadi, R. Setchi, and Y. Hicks, “Semantic Reasoning in Cognitive Networks for Heterogeneous Wireless Mesh Sys-
tems,” in IEEE Transactions on Cognitive Communications and Networking, vol. 3, no. 3, pp. 374-389, Sep. 2017, doi:
10.1109/TCCN.2017.2712136.
[7] B. Banerjee, R. C. Elliott, W. A. Krzymień, and J. Melzer, “Correlated Placement of Small Cell Base Stations: A Coverage En-
riched HetNet with Massive MIMO,” 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp. 1-6, 2020, doi:
10.1109/VTC2020-Spring48590.2020.9128531.
[8] R. Li, X. Liu, K. Luo, T. Jiang, and S. Jin, “Decoupled Access in HetNets With Backhaul Constrained Small Base Stations,” in
IEEE Access, vol. 6, pp. 27028-27038, 2018, doi: 10.1109/ACCESS.2018.2833889.
[9] K. Wen, Y. Chen, and Y. Hu, “A resource allocation method for D2D and small cellular users in HetNet,” 2017 3rd IEEE Interna-
tional Conference on Computer and Communications (ICCC), 2017, pp. 628-632, doi: 10.1109/CompComm.2017.8322620.
[10] D. Liu et al., “User association in 5G networks: A survey and an outlook,” IEEE Communication Surveys Tutorials, vol. 18, no. 2,
pp. 1018–1044, 2016, doi: 10.1109/COMST.2016.2516538.
[11] D. -T. Do, T. -T. T. Nguyen, C. -B. Le, M. Voznak, Z. Kaleem, and K. M. Rabie, “UAV Relaying Enabled NOMA Network With Hy-
brid Duplexing and Multiple Antennas,” in IEEE Access, vol. 8, pp. 186993-187007, 2020, doi: 10.1109/ACCESS.2020.3030221.
[12] D. -T. Do, A. -T. Le, Y. Liu, and A. Jamalipour, “User Grouping and Energy Harvesting in UAV-NOMA System With AF/DF Relay-
ing,” in IEEE Transactions on Vehicular Technology, vol. 70, no. 11, pp. 11855-11868, Nov. 2021, doi: 10.1109/TVT.2021.3116101.
[13] D. -T. Do, T. -T. T. Nguyen, T. N. Nguyen, X. Li, and M. Voznak, “Uplink and Downlink NOMA Transmission Using Full-Duplex
UAV,” in IEEE Access, vol. 8, pp. 164347-164364, 2020, doi: 10.1109/ACCESS.2020.3023163.
[14] D. Feng et al., “Mode Switching for Energy-Efficient Device-to-Device Communications in Cellular Networks,” in IEEE Transac-
tions on Wireless Communications, vol. 14, no. 12, pp. 6993-7003, Dec. 2015, doi: 10.1109/TWC.2015.2463280.
[15] B. Cho, K. Koufos, R. Jäntti, Z. Li, and M. A. Uusitalo, “Spectrum allocation for multi-operator device-to-device communication,”
2015 IEEE International Conference on Communications (ICC), 2015, pp. 5454-5459, doi: 10.1109/ICC.2015.7249191.
[16] L. Zhang, M. Xiao, G. Wu, and S. Li, “Efficient Scheduling and Power Allocation for D2D-Assisted Wireless Caching Networks,”
in IEEE Transactions on Communications, vol. 64, no. 6, pp. 2438-2452, Jun. 2016, doi: 10.1109/TCOMM.2016.2552164.
[17] Y. Dai, M. Sheng, J. Liu, N. Cheng, X. Shen, and Q. Yang, “Joint Mode Selection and Resource Allocation for D2D-Enabled
NOMA Cellular Networks,” in IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 6721-6733, Jul. 2019, doi:
10.1109/TVT.2019.2916395.
[18] M. Pischella and D. Le Ruyet, “NOMA-Relevant Clustering and Resource Allocation for Proportional Fair Uplink Communica-
tions,” in IEEE Wireless Communications Letters, vol. 8, no. 3, pp. 873-876, Jun. 2019, doi: 10.1109/LWC.2019.2897796.
[19] A. Krishnamoorthy and R. Schober, “Uplink and Downlink MIMO-NOMA With Simultaneous Triangularization,” in IEEE Trans-
actions on Wireless Communications, vol. 20, no. 6, pp. 3381-3396, Jun. 2021, doi: 10.1109/TWC.2021.3049594.
Secure transmission for uplink and downlink non-orthogonal multiple access ... (Dinh-Thuan Do)
706 ❒ ISSN: 1693-6930
[20] M. Salehi, H. Tabassum, and E. Hossain, “Meta Distribution of SIR in Large-Scale Uplink and Downlink NOMA Networks,” in
IEEE Transactions on Communications, vol. 67, no. 4, pp. 3009-3025, Apr. 2019, doi: 10.1109/TCOMM.2018.2889484.
[21] K. Cao, B. Wang, H. Ding, L. Lv, J. Tian, and F. Gong, “On the Security Enhancement of Uplink NOMA Systems With Jammer Se-
lection,” in IEEE Transactions on Communications, vol. 68, no. 9, pp. 5747-5763, Sep. 2020, doi: 10.1109/TCOMM.2020.3003665.
[22] S. Arzykulov, T. A. Tsiftsis, G. Nauryzbayev, and M. Abdallah, “Outage Performance of Cooperative Underlay CR-NOMA With
Imperfect CSI,” in IEEE Communications Letters, vol. 23, no. 1, pp. 176-179, Jan. 2019, doi: 10.1109/LCOMM.2018.2878730.
[23] Z. Yang, Z. Ding, P. Fan, and G. K. Karagiannidis, “On the Performance of Non-orthogonal Multiple Access Systems
With Partial Channel Information,” in IEEE Transactions on Communications, vol. 64, no. 2, pp. 654-667, Feb. 2016, doi:
10.1109/TCOMM.2015.2511078.
[24] C. Zhang, F. Jia, Z. Zhang, J. Ge, and F. Gong, “Physical Layer Security Designs for 5G NOMA Systems With a Stronger Near-
End Internal Eavesdropper,” in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13005-13017, Nov. 2020, doi:
10.1109/TVT.2020.3018234.
[25] Y. Feng, S. Yan, C. Liu, Z. Yang, and N. Yang, “Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-
Orthogonal Multiple Access,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1670-1683, Jun.
2019, doi: 10.1109/TIFS.2018.2883273.
[26] X. Liu, “Probability of Strictly Positive Secrecy Capacity of the Rician-Rician Fading Channel,” in IEEE Wireless Communications
Letters, vol. 2, no. 1, pp. 50-53, Feb. 2013, doi: 10.1109/WCL.2012.101812.120660.
[27] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 6th ed. New York, NY, USA: Academic Press, 2000.
[Online]. Available: http://fisica.ciens.ucv.ve/ svincenz/TISPISGIMR.pdf
BIOGRAPHIES OF AUTHORS
Dinh-Thuan Do (Senior Member, IEEE) received the M.Eng., and Ph.D. degrees in
communications engineering from Vietnam National University (VNU-HCM), in 2007 and 2013,
respectively. His research interests include signal processing in wireless communications networks,
cooperative communications, non-orthogonal multiple access, full-duplex transmission, and energy
harvesting. He has served as a guest editor for eight prominent SCIE journals. He can be contacted
at email: dodinhthuan@iuh.edu.vn.
Minh-Sang Van Nguyen Minh-Sang Van Nguyen was born in Ben Tre, Vietnam. He
received a B.S. from the Industrial University of Ho Chi Minh City (IUH) in 2019. He is currently
pursuing the master’s degree in wireless communications. He has worked with the Industrial Uni-
versity of Ho Chi Minh City, Vietnam. He has authored or co-authored over 22 technical papers
published in peer-reviewed international journals (SCIE), one book chapter and one conference pa-
per. His research interests include electronic design, signal processing in wireless communications
networks, non-orthogonal multiple access, reconfgurable intelligent surfaces and physical layer se-
curity. He was a Reviewer for WCNC Conferences, IEEE Access, International Journal Of Electron-
ics, Eurasip Journal On Wireless Communications And Networking. He can be contacted at email:
nguyenvanminhsang@iuh.edu.vn.
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022 : 699 – 706

More Related Content

Similar to 1. 20934.pdf

Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...journalBEEI
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...TELKOMNIKA JOURNAL
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
 
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...journalBEEI
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
 
Multi-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfMulti-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfYAAKOVSOLOMON1
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...cscpconf
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136IJRAT
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...IRJET Journal
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Channel state information estimation for reconfigurable intelligent surfaces ...
Channel state information estimation for reconfigurable intelligent surfaces ...Channel state information estimation for reconfigurable intelligent surfaces ...
Channel state information estimation for reconfigurable intelligent surfaces ...IJECEIAES
 
Full-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple accessFull-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple accessTELKOMNIKA JOURNAL
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...TELKOMNIKA JOURNAL
 

Similar to 1. 20934.pdf (20)

Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
 
Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...Outage and throughput performance of cognitive radio based power domain based...
Outage and throughput performance of cognitive radio based power domain based...
 
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper Coding
 
Multi-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdfMulti-slot Coded ALOHA with Irregular Degree.pdf
Multi-slot Coded ALOHA with Irregular Degree.pdf
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Scheme
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Channel state information estimation for reconfigurable intelligent surfaces ...
Channel state information estimation for reconfigurable intelligent surfaces ...Channel state information estimation for reconfigurable intelligent surfaces ...
Channel state information estimation for reconfigurable intelligent surfaces ...
 
Full-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple accessFull-duplex user-centric communication using non-orthogonal multiple access
Full-duplex user-centric communication using non-orthogonal multiple access
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

1. 20934.pdf

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 20, No. 4, August 2022, pp. 699∼706 ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v20i4.20934 ❒ 699 Secure transmission for uplink and downlink non-orthogonal multiple access system with imperfect channel state information Dinh-Thuan Do, Minh-Sang Van Nguyen Department of Electronics and Telecommunications, Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh 70000, Vietnam Article Info Article history: Received June 20, 2021 Revised May 21, 2022 Accepted June 01, 2022 Keywords: NOMA Physical layer security SPSC ABSTRACT In this paper, we design a secure transmission scheme in uplink and downlink of non- orthogonal multiple access (NOMA) system. In this scenario, two pairs of base station- user can operate under the presence of eavesdropper. The relay plays an important role to forward signals from group of base stations to serve distant users. However, the eavesdropper can overhear signal which leads to secure performance need be re- considered. To provide secure performance, we derive the closed-form expressions for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge coverage area. The channel conditions meet imperfect channel state information (CSI) which shows degraded secure performance. Results confirm the relationship between transmit power at the source and and SPSC how many main parameters affecting se- cure performance metric. Furthermore, simulation results show that the uplink and downlink NOMA technique improves secure performance in the low SPSC region. We further conduct analysis by using Monte-Carlo simulations. This is an open access article under the CC BY-SA license. Corresponding Author: Minh-Sang Van Nguyen Department of Electronics and Telecommunications, Faculty of Electronics Technology Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh 70000, Vietnam Email: nguyenvanminhsang@iuh.edu.vn 1. INTRODUCTION The massive evolution in wireless devices and information transfer in wireless communications has increased the requirement for massive connectivity and spectrum availability in wireless networks such as 5G communications [1]-[3]. Deployment of heterogenous networks (HetNet) has become the primary feature to increase the spectrum usage and allocate more users to the spectrum [4]-[6]. To deliver increased-data- rate services, in HetNet, numerous affordable low-power small base stations (SBSs) are installed [7]. The main work of SBSs is to get rid of data traffic from micro-base-stations (MBSs), thereby, solving the high traffic issue and increasing the spectral efficiency of the communicating networks. Furthermore, the SBSs also work similarly to relays to increase the data transmission in the networks between the users [8],[9]. To tackle these issues, the HetNets were introduced to work with device-to-device (D2D), non-orthogonal multiple access (NOMA) communications [10]-[13]. With the utilization of D2D communications, the data traffic can be reduced since there is no need of any base station (BS) involvement, thereby, establishing the direct connection between the devices. Meanwhile, these devices can also work as D2D relay nodes (DRN) to enhance Journal homepage: http://telkomnika.uad.ac.id
  • 2. 700 ❒ ISSN: 1693-6930 the communication for the faded users [14], [15]. It is also found that the D2D communications are easier to be installed and also utilizes less infrastructure. Since the D2D applications of reducing data traffic is interesting, studies have been performed to understand these applications more deeply in [16], [17]. In [16], the data contents are saved by the cached users and shared among the other devices, whereas, in [17], NOMA is deployed to improve network connectivity and capacity, and D2D exhibits spectrum efficiency. In [18]-[20], deployment of uplink and downlink of NOMA is studied to prove its advantage compared with orthogonal multiple access (OMA) techniques. Recently, physical layer security (PLS) techniques can eliminate difficulties of secure guarantee at upper layer. Such PLS can combine in current NOMA systems. In [21], a PLS uplink NOMA system was studied to allow one base station to serve many destinations in the presence of one eavesdropper. To get benefits from NOMA, uplink transmission of two users are processed opportunistically. In this system, idle users is used to operate as a friendly jammer which relies on artificial noise to reduce or refuse services to the eavesdropper. However, lack of works considered uplink downlink NOMA, which motivates us to examine secure performance of two pairs of base stations and destinations. 2. SYSTEM MODEL In Figure 1, we consider uplink and downlink to allow two base stations BS1, BS2 serving two destinations via a relay R. The wireless channels are assumed to follow flat slow Rayleigh fading. We denote links BS1 → R, BS2 → R, R → D1, R → D2 and R → E correspond to channels h1, h2, h3, h4 and he, respectively. Accordingly, the corresponding channel power gains follow the distributions as |h1| 2 ∼ CN (0, ϖ1), |h2| 2 ∼ CN (0, ϖ2), |h3| 2 ∼ CN (0, ϖ3), |h4| 2 ∼ CN (0, ϖ4) and |he| 2 ∼ CN (0, ϖe), respectively. q1, q2 are signals proceeded from two corresponding base stations with respect to decoding at destinations. Figure 1. System model Before computing received signals at destinations and the intermediate device, we denote Pbsi as the transmit power at base stations BSi, i = 1, 2. It is noted that interference following the additive white Gaussian noise (AWGN) at R, namely εR corresponding its distribution εR ∼ CN (0, N0). The base stations want to get signals qi for each destination Di. By conducting NOMA scheme, power allocation factors assigned to users, namely δi which satisfies two conditions δ1 + δ2 = 1 and δ1 > δ2 (based on how far user connects to relay, the far user needs higher power factor). The intermediate device first receives signals from the two base stations, hence we can formulate such received signal [22]. yS→R = h1 + b h1 p δ1Pbs1q1 + h2 + b h2 p δ2Pbs2q2 + εR (1) Where b hi stands for error term which is considered as a complex Gaussian distributed random variable with CN 0, ℘2 ui . We adopt the case of ℘2 ui as constant [23]. Since the received signal-to-interference-plus-noise ratio (SINR) needs to be computed to detect sep- arated signal at the intermediate device, we set order of signal detection based on channel gains. That means TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022 : 699 – 706
  • 3. TELKOMNIKA Telecommun Comput El Control ❒ 701 two signals q1, q2 can be detected following the way that treating q2 as noise to detect q1 and a successive interference cancellation (SIC) is adopted to detect signal q2. Particularly, we have SINRs: γu q1 = δ1ρbs1|h1| 2 δ2ρbs2|h2| 2 + δ1ρbs1℘2 u1 + δ2ρbs2℘2 u2 + 1 , γu q2 = δ2ρbs2|h2| 2 δ1ρbs1℘2 u1 + δ2ρbs2℘2 u2 + 1 (2) Where: ρbs1 = Pbs1 N0 ρbs2 = Pbs2 N0 At the second hop, signal can be forwarded by the intermediate device to corresponding destinations. Specifically, the relay first transmits a superimposed composite signal, regenerated from qi, to Di. We charac- terize the AWGN term, namely εx at user Di as εx ∼ CN (0, N0). The destination Di can achieve the received signal [24], [25]. yR→Di = hx + b hx p δ1PRq1 + p δ2PRq2 + εx, (x = 3, 4) (3) Where PR denote the transmit power at R, b hx is the error term, which is typically modeled as a complex Gaussian distributed random variable with CN 0, ℘2 di . After receiving signal from R, by considering the noise term is signal q2 for user D2 , D1 can detect its signal q1 by computing SINR as: γd q1 = δ1ρR|h3| 2 δ2ρR|h3| 2 + ρR℘2 d1 + 1 (4) Where ρR = PR N0 . Simultaneously, D2 have similar signal detection to achieve noise term q1 and then its own signal q2. This is just possible with help of SIC. The expressions of SINR to detect signal q1 and q2 at D2 are formulated respectively as: γd 1→2 = δ1ρR|h4| 2 δ2ρR|h4| 2 + ρR℘2 d2 + 1 , γd q2 = δ2ρR|h4| 2 ρR℘2 d2 + 1 (5) We deal with threat situation when the main signal is likely stolen by illegal user. Also, the received signal at eavesdropper could be considered with assumption it can obtain parameter of channel. The eaves- dropper E wants to overhear signal transmitted from the intermediate device R and the received signal is: yE = he p δ1PRq1 + p δ2PRq2 + ne (6) In next step, we compute SINR as the second thing that is necessary to consider secure performance. We leverage the parallel interference cancellation (PIC) to detect signal for eavesdropper. More importantly, the eavesdropper possesses the received SINR to detect Di’s and the related received signal is expressed by Zhang et al. [24]. γe qi = aiρe|he| 2 (7) Where ρe = PR ne . Before evaluating secure performance, secrecy rate of each user must be computed. Then, we evaluate the relationship of secrecy rates between intended user and eavesdropper. Following above steps, the achievable secrecy rates can be computed for pairs of users BS1 − D1, BS2 − D2 respectively [25]. Ψ1 = 1 2 log2 min 1 + γu q1 1 + γe q1 , 1 + γd q1 1 + γe q1 !#+ (8) and Ψ2 = 1 2 log2 min 1 + γu q2 1 + γe q2 , 1 + γd 1→2 1 + γe q2 , 1 + γd q2 1 + γe q2 !#+ (9) In which [x] + = max {0, x}. Secure transmission for uplink and downlink non-orthogonal multiple access ... (Dinh-Thuan Do)
  • 4. 702 ❒ ISSN: 1693-6930 3. STRICTLY POSITIVE SECRECY CAPACITY (SPSC) ANALYSIS 3.1. SPSC for BS1 − D1 We examine SPSC performance to highlight secrecy performance. We compute such performance to exhibit the probability of existence of secrecy capacity [24], [26]. Thus, the SPSC for the base station - D1 can be given by: SPSCBS1 D1 = Pr (Ψ1 0) = Pr γu q1 ≥ γe q1 | {z } ∂1 Pr γd q1 ≥ γe q1 | {z } ∂2 (10) Proposition 1. The exact expression of the SPSC BS1 − D1 is: SPSCBS1 D1 = − η3β3 ϖe exp (β3β4) Ei (−β3β4) (11) Where: Θ1 = δ1ρbs1℘2 u1 + δ2ρbs2℘2 u2 + 1 Θ2 = ρR℘2 d1 + 1 β3 = ρbs1ϖ1 δ2ρbs2ρeϖ2ϖe β4 = Θ1ρe ρbs1ϖ1 + 1 ϖe η3 = R ∞ 0 exp − Θ2δ1ρex (1−δ2ρex)δ1ρRϖ3 − x ϖe dx Proof: from (10), ∂1 can: ∂1 = Pr γu q1 ≥ γe q1 = Pr |h1| 2 ≥ δ1δ2ρbs2ρe|he|2 |h2|2 +Θ1δ1ρe|he|2 δ1ρbs1 = R ∞ 0 R ∞ 0 1 − F|h1|2 δ1δ2ρbs2ρexy+Θ1δ1ρey δ1ρbs1 f|h2|2 (x) f|he|2 (y) dxdy = 1 ϖ2 1 ϖe R ∞ 0 R ∞ 0 exp − δ1δ2ρbs2ρey δ1ρbs1ϖ1 + 1 ϖ2 x exp − Θ1δ1ρe δ1ρbs1ϖ1 + 1 ϖe y dxdy = 1 ϖe R ∞ 0 δ1ρbs1ϖ1 δ1δ2ρbs2ρeϖ2y+δ1ρbs1ϖ1 exp − Θ1δ1ρe δ1ρbs1ϖ1 + 1 ϖe y dxdy (12) Based on [27] Eq. (3.352.4) and applying some polynomial expansion manipulations, ∂1 can given by: ∂1 = −β3 exp (β3β4) Ei (−β3β4) (13) Where: β3 = ρbs1ϖ1 δ2ρbs2ρeϖ2ϖe β4 = Θ1ρe ρbs1ϖ1 + 1 ϖe From (10), ∂2 can be calculated as: ∂2 = Pr γd q1 ≥ γe q1 = Pr |h3| 2 ≥ Θ2δ1ρe|he|2 (1−δ2ρe|he|2 )δ1ρR = R ∞ 0 1 − F|h3|2 Θ2δ1ρex (1−δ2ρex)δ1ρR f|he|2 (x) dx = 1 ϖe R ∞ 0 exp − Θ2δ1ρex (1−δ2ρex)δ1ρRϖ3 − x ϖe dx (14) Substituting (13) and (14) into (10), we can obtain (11). It completes the proof. 3.2. SPSC for BS2 − D2 Similar to BS1 − D2, the SPSC for BS2 − D2 case can be expressed as [24]: SPSCBS2 D2 = Pr (Ψ2 R2) = Pr γu q2 ≥ γe q2 | {z } ξ1 Pr γd 1→2 ≥ γe q2 | {z } ξ2 Pr γd q2 ≥ γe q2 | {z } ξ3 (15) TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022 : 699 – 706
  • 5. TELKOMNIKA Telecommun Comput El Control ❒ 703 Proposition 2. The exact expression of the SPSC BS2 − D2 is given by: SPSCBS2 D2 = δ2ρbs2ϖ2 Θ1δ2ρeϖe + δ2ρbs2ϖ2 δ2ρRϖ4η4 (Θ3δ2ρeϖe + δ2ρRϖ4) ϖe (16) Where: Θ3 = ρR℘2 d2 + 1 η4 = R ∞ 0 exp − Θ3δ2ρex (δ1−δ2δ2ρex)ρRϖ4 − x ϖe dx Proof: from (15), ξ1 can be calculated as: ξ1 = Pr γu q2 ≥ γe q2 = Pr |h2| 2 ≥ Θ1δ2ρe|he| 2 δ2ρbs2 ! = Z ∞ 0 1 − F|h2|2 Θ1δ2ρex δ2ρbs2 f|he|2 (x) dx = 1 ϖe Z ∞ 0 exp − Θ1δ2ρe δ2ρbs2ϖ2 + 1 ϖe x dx = δ2ρbs2ϖ2 Θ1δ2ρeϖe + δ2ρbs2ϖ2 (17) Next, ξ2 can be calculated as: ξ2 = Pr γd 1→2 ≥ γe q2 = Pr  |h4| 2 ≥ Θ3δ2ρe|he| 2 δ1 − δ2δ2ρe|he| 2 ρR   = Z ∞ 0 1 − F|h4|2 Θ3δ2ρex (δ1 − δ2δ2ρex) ρR f|he|2 (x) dx = 1 ϖe Z ∞ 0 exp − Θ3δ2ρex (δ1 − δ2δ2ρex) ρRϖ4 − x ϖe dx (18) From (15), ξ3 can be calculated as: ξ3 = Pr γd q2 ≥ γe q2 = Pr |h4| 2 ≥ Θ3δ2ρe|he| 2 δ2ρR ! = Z ∞ 0 1 − F|h4|2 Θ3δ2ρex δ2ρR f|he|2 (x) dx = 1 ϖe Z ∞ 0 exp − Θ3δ2ρe δ2ρRϖ4 + 1 ϖe x dx = δ2ρRϖ4 Θ3δ2ρeϖe + δ2ρRϖ4 (19) The proof is completed. 4. SIMULATION RESULTS In this section, we simulate the system with these parameters ρ = ρbs1 = ρbs2 = ρR, ℘ = ℘2 u1 = ℘2 u2 = ℘2 d1 = ℘2 d2. The SPSC performance is evaluated via Monte-Carlo and analytical simulations. Then, we expect that these simulations provide good match in term of values of numerical simulations. Secure transmission for uplink and downlink non-orthogonal multiple access ... (Dinh-Thuan Do)
  • 6. 704 ❒ ISSN: 1693-6930 -15 -10 -5 0 5 10 ρ (dB) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SPSC BS1 − D1 ana. BS2 − D2 ana. ρe= -15 (dB) sim. ρe= -14 (dB) sim. ρe= -13 (dB) sim. Figure 2. SPSC for BS1 − D1 and BS2 − D2 versus ρ as changing ρe with δ1 = 0.9, ℘ = 0.001, ϖ1 = ϖ2 = 1, ϖ3 = 10, ϖ4 = 2, ϖe = 1 -10 -5 0 5 10 15 ρ (dB) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SPSC BS1 − D1 ana. BS2 − D2 ana. ℘= 0.001 sim. ℘= 0.5 sim. ℘= 1 sim. Figure 3. SPSC for BS1 − D1 and BS2 − D2 versus ρ as changing ℘ with δ1 = 0.9, ϖ1 = ϖ2 = 1, ϖ3 = 10, ϖ4 = 2, ϖe = 1, ρe = −12 (dB) -15 -10 -5 0 5 10 ρ (dB) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SPSC BS1 − D1 ana. BS2 − D2 ana. ̟1 = ̟2= 1 sim. ̟1 = ̟2= 2 sim. ̟1 = ̟2= 3 sim. Figure 4. SPSC for BS1 − D1 and BS2 − D2 versus ρ as changing ϖ1 = ϖ2 with δ1 = 0.9, ℘ = 0.001, ϖ3 = 10, ϖ4 = 2, ϖe = 1, ρe = −12 (dB) TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022 : 699 – 706
  • 7. TELKOMNIKA Telecommun Comput El Control ❒ 705 Figure 2 demonstrates that the SPSC of two pairs of users is decided by varying impact of eaves- dropper ρe. More importantly, two destinations exhibit different performance since power allocation factors are different too. The impact of imperfect (channel state information) CSI ℘ leads to variance in considera- tion of SPSC, shown in Figure 3. Therefore, by controlling CSI we can remain the stable operation of secure performance. Similarly, Figure 4 indicates that SPSC relies on how strong channels are. We employ the sim- ulation with three cases of channel gains, ϖ1 = ϖ2 = 1, ϖ1 = ϖ2 = 2, ϖ1 = ϖ2 = 3. Two pairs of base station-destination still show their performance gaps. 5. CONCLUSION In this paper, two pairs of base station-destination are studied to exhibit secure performance. We de- ploy NOMA to allow base station increase spectrum efficiency and to reduce risk of attack from eavesdroppers. In this circumstance, we consider two pair of users from the base stations to destinations to evaluate secure performance once an eavesdropper also wants to overhear the main signal is being processing at main links. The main results are represented in terms of closed-form formulas for the SPSC and main parameters can be determined to know how SPSC can be changed. The uplink and downlink scenario in this paper can be ap- plied to lots of applications for Internet of Things. The results are useful guidelines for engineers who can performance secure uplink and downlink NOMA systems. REFERENCES [1] X. Chen, D. W. K. Ng, W. Yu, E. G. Larsson, N. Al-Dhahir, and R. Schober, “Massive Access for 5G and Beyond,” in IEEE Journal on Selected Areas in Communications, vol. 39, no. 3, pp. 615-637, Mar. 2021, doi: 10.1109/JSAC.2020.3019724. [2] C. Zhang, Y. -L. Ueng, C. Studer, and A. Burg, “Artificial Intelligence for 5G and Beyond 5G: Implementations, Algorithms, and Optimizations,” in IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 10, no. 2, pp. 149-163, Jun. 2020, doi: 10.1109/JETCAS.2020.3000103. [3] A. Ghosh, A. Maeder, M. Baker, and D. Chandramouli, “5G Evolution: A View on 5G Cellular Technology Beyond 3GPP Release 15,” in IEEE Access, vol. 7, pp. 127639-127651, Sep. 2019, doi: 10.1109/ACCESS.2019.2939938. [4] K. Lei, H. Ye, Y. Liang, J. Xiao, and P. Chen, “Towards a Translation-Based Method for Dynamic Heterogeneous Network Embed- ding,” ICC 2021 - IEEE International Conference on Communications, 2021, pp. 1-6, doi: 10.1109/ICC42927.2021.9500303. [5] M. Gerasimenko et al., “Cooperative Radio Resource Management in Heterogeneous Cloud Radio Access Networks,” in IEEE Access, vol. 3, pp. 397-406, 2015, doi: 10.1109/ACCESS.2015.2422266. [6] A. Al-Saadi, R. Setchi, and Y. Hicks, “Semantic Reasoning in Cognitive Networks for Heterogeneous Wireless Mesh Sys- tems,” in IEEE Transactions on Cognitive Communications and Networking, vol. 3, no. 3, pp. 374-389, Sep. 2017, doi: 10.1109/TCCN.2017.2712136. [7] B. Banerjee, R. C. Elliott, W. A. Krzymień, and J. Melzer, “Correlated Placement of Small Cell Base Stations: A Coverage En- riched HetNet with Massive MIMO,” 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp. 1-6, 2020, doi: 10.1109/VTC2020-Spring48590.2020.9128531. [8] R. Li, X. Liu, K. Luo, T. Jiang, and S. Jin, “Decoupled Access in HetNets With Backhaul Constrained Small Base Stations,” in IEEE Access, vol. 6, pp. 27028-27038, 2018, doi: 10.1109/ACCESS.2018.2833889. [9] K. Wen, Y. Chen, and Y. Hu, “A resource allocation method for D2D and small cellular users in HetNet,” 2017 3rd IEEE Interna- tional Conference on Computer and Communications (ICCC), 2017, pp. 628-632, doi: 10.1109/CompComm.2017.8322620. [10] D. Liu et al., “User association in 5G networks: A survey and an outlook,” IEEE Communication Surveys Tutorials, vol. 18, no. 2, pp. 1018–1044, 2016, doi: 10.1109/COMST.2016.2516538. [11] D. -T. Do, T. -T. T. Nguyen, C. -B. Le, M. Voznak, Z. Kaleem, and K. M. Rabie, “UAV Relaying Enabled NOMA Network With Hy- brid Duplexing and Multiple Antennas,” in IEEE Access, vol. 8, pp. 186993-187007, 2020, doi: 10.1109/ACCESS.2020.3030221. [12] D. -T. Do, A. -T. Le, Y. Liu, and A. Jamalipour, “User Grouping and Energy Harvesting in UAV-NOMA System With AF/DF Relay- ing,” in IEEE Transactions on Vehicular Technology, vol. 70, no. 11, pp. 11855-11868, Nov. 2021, doi: 10.1109/TVT.2021.3116101. [13] D. -T. Do, T. -T. T. Nguyen, T. N. Nguyen, X. Li, and M. Voznak, “Uplink and Downlink NOMA Transmission Using Full-Duplex UAV,” in IEEE Access, vol. 8, pp. 164347-164364, 2020, doi: 10.1109/ACCESS.2020.3023163. [14] D. Feng et al., “Mode Switching for Energy-Efficient Device-to-Device Communications in Cellular Networks,” in IEEE Transac- tions on Wireless Communications, vol. 14, no. 12, pp. 6993-7003, Dec. 2015, doi: 10.1109/TWC.2015.2463280. [15] B. Cho, K. Koufos, R. Jäntti, Z. Li, and M. A. Uusitalo, “Spectrum allocation for multi-operator device-to-device communication,” 2015 IEEE International Conference on Communications (ICC), 2015, pp. 5454-5459, doi: 10.1109/ICC.2015.7249191. [16] L. Zhang, M. Xiao, G. Wu, and S. Li, “Efficient Scheduling and Power Allocation for D2D-Assisted Wireless Caching Networks,” in IEEE Transactions on Communications, vol. 64, no. 6, pp. 2438-2452, Jun. 2016, doi: 10.1109/TCOMM.2016.2552164. [17] Y. Dai, M. Sheng, J. Liu, N. Cheng, X. Shen, and Q. Yang, “Joint Mode Selection and Resource Allocation for D2D-Enabled NOMA Cellular Networks,” in IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 6721-6733, Jul. 2019, doi: 10.1109/TVT.2019.2916395. [18] M. Pischella and D. Le Ruyet, “NOMA-Relevant Clustering and Resource Allocation for Proportional Fair Uplink Communica- tions,” in IEEE Wireless Communications Letters, vol. 8, no. 3, pp. 873-876, Jun. 2019, doi: 10.1109/LWC.2019.2897796. [19] A. Krishnamoorthy and R. Schober, “Uplink and Downlink MIMO-NOMA With Simultaneous Triangularization,” in IEEE Trans- actions on Wireless Communications, vol. 20, no. 6, pp. 3381-3396, Jun. 2021, doi: 10.1109/TWC.2021.3049594. Secure transmission for uplink and downlink non-orthogonal multiple access ... (Dinh-Thuan Do)
  • 8. 706 ❒ ISSN: 1693-6930 [20] M. Salehi, H. Tabassum, and E. Hossain, “Meta Distribution of SIR in Large-Scale Uplink and Downlink NOMA Networks,” in IEEE Transactions on Communications, vol. 67, no. 4, pp. 3009-3025, Apr. 2019, doi: 10.1109/TCOMM.2018.2889484. [21] K. Cao, B. Wang, H. Ding, L. Lv, J. Tian, and F. Gong, “On the Security Enhancement of Uplink NOMA Systems With Jammer Se- lection,” in IEEE Transactions on Communications, vol. 68, no. 9, pp. 5747-5763, Sep. 2020, doi: 10.1109/TCOMM.2020.3003665. [22] S. Arzykulov, T. A. Tsiftsis, G. Nauryzbayev, and M. Abdallah, “Outage Performance of Cooperative Underlay CR-NOMA With Imperfect CSI,” in IEEE Communications Letters, vol. 23, no. 1, pp. 176-179, Jan. 2019, doi: 10.1109/LCOMM.2018.2878730. [23] Z. Yang, Z. Ding, P. Fan, and G. K. Karagiannidis, “On the Performance of Non-orthogonal Multiple Access Systems With Partial Channel Information,” in IEEE Transactions on Communications, vol. 64, no. 2, pp. 654-667, Feb. 2016, doi: 10.1109/TCOMM.2015.2511078. [24] C. Zhang, F. Jia, Z. Zhang, J. Ge, and F. Gong, “Physical Layer Security Designs for 5G NOMA Systems With a Stronger Near- End Internal Eavesdropper,” in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13005-13017, Nov. 2020, doi: 10.1109/TVT.2020.3018234. [25] Y. Feng, S. Yan, C. Liu, Z. Yang, and N. Yang, “Two-Stage Relay Selection for Enhancing Physical Layer Security in Non- Orthogonal Multiple Access,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1670-1683, Jun. 2019, doi: 10.1109/TIFS.2018.2883273. [26] X. Liu, “Probability of Strictly Positive Secrecy Capacity of the Rician-Rician Fading Channel,” in IEEE Wireless Communications Letters, vol. 2, no. 1, pp. 50-53, Feb. 2013, doi: 10.1109/WCL.2012.101812.120660. [27] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 6th ed. New York, NY, USA: Academic Press, 2000. [Online]. Available: http://fisica.ciens.ucv.ve/ svincenz/TISPISGIMR.pdf BIOGRAPHIES OF AUTHORS Dinh-Thuan Do (Senior Member, IEEE) received the M.Eng., and Ph.D. degrees in communications engineering from Vietnam National University (VNU-HCM), in 2007 and 2013, respectively. His research interests include signal processing in wireless communications networks, cooperative communications, non-orthogonal multiple access, full-duplex transmission, and energy harvesting. He has served as a guest editor for eight prominent SCIE journals. He can be contacted at email: dodinhthuan@iuh.edu.vn. Minh-Sang Van Nguyen Minh-Sang Van Nguyen was born in Ben Tre, Vietnam. He received a B.S. from the Industrial University of Ho Chi Minh City (IUH) in 2019. He is currently pursuing the master’s degree in wireless communications. He has worked with the Industrial Uni- versity of Ho Chi Minh City, Vietnam. He has authored or co-authored over 22 technical papers published in peer-reviewed international journals (SCIE), one book chapter and one conference pa- per. His research interests include electronic design, signal processing in wireless communications networks, non-orthogonal multiple access, reconfgurable intelligent surfaces and physical layer se- curity. He was a Reviewer for WCNC Conferences, IEEE Access, International Journal Of Electron- ics, Eurasip Journal On Wireless Communications And Networking. He can be contacted at email: nguyenvanminhsang@iuh.edu.vn. TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022 : 699 – 706