All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

On Secure QoS-based NOMA Networks with Multiple Antennas and Eavesdroppers over Nakagami-m Fading

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F20%3A10245933" target="_blank" >RIV/61989100:27240/20:10245933 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.tandfonline.com/doi/full/10.1080/03772063.2019.1610088?scroll=top&needAccess=true" target="_blank" >https://www.tandfonline.com/doi/full/10.1080/03772063.2019.1610088?scroll=top&needAccess=true</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1080/03772063.2019.1610088" target="_blank" >10.1080/03772063.2019.1610088</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    On Secure QoS-based NOMA Networks with Multiple Antennas and Eavesdroppers over Nakagami-m Fading

  • Original language description

    In this paper, we study the physical layer security of a downlink multi-input single-output non-orthogonal multiple access (NOMA) system, in which transmit antenna selection (TAS) scheme, users&apos; quality of service (QoS) requirements, Nakagami-m fading channel, and user selection solution are considered for secure NOMA transmission. Specifically, we investigate the scenario that a base station (BS) (source) communicates with two legitimate user (LU) clusters with different priority depending on their QoS requirements in the presence of multiple passive eavesdroppers over Nakagami-m fading. To enhance the secrecy performance, we examine a TAS scheme and a user selection method. In this context, prior to transmission, a transmit antenna and a user in high-priority LU cluster are jointly selected to maximize the channel quality of the link from the BS to the selected user. Furthermore, together with the selected high-priority user, a user in low-priority LU cluster, which has the best channel condition, is chosen for performing two-user NOMA. In order to evaluate the secrecy performance, tight and asymptotic closed-form expressions of secrecy outage probability for selected LUs and overall system are derived. Our theoretical results confirmed by Monte-Carlo simulation show that in QoS-based NOMA system, high-priority users cause the higher effects on the overall secrecy performance in comparison with low-priority users. Finally, these results also indicate that our proposed communication protocol achieves the secrecy performance greater than conventional protocol. (C) 2019, (C) 2019 IETE.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>SC</sub> - Article in a specialist periodical, which is included in the SCOPUS database

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2020

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    IETE JOURNAL OF RESEARCH

  • ISSN

    0377-2063

  • e-ISSN

  • Volume of the periodical

    Neuveden

  • Issue of the periodical within the volume

    2019

  • Country of publishing house

    US - UNITED STATES

  • Number of pages

    13

  • Pages from-to

  • UT code for WoS article

  • EID of the result in the Scopus database

    2-s2.0-85065222021