Next Article in Journal
Activity-Aware Vital Sign Monitoring Based on a Multi-Agent Architecture
Previous Article in Journal
Fabrication and Characterization of Non-Equilibrium Plasma-Treated PVDF Nanofiber Membrane-Based Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network

1
Telecommunication and Networking (TeleCoN) Research Center, GIK Institute of Engineering Sciences and Technology, Topi 23640, Pakistan
2
Faculty of Electrical Engineering, GIK Institute of Engineering Sciences and Technology, Topi 23640, Pakistan
3
Faculty of Computer Sciences and Engineering, GIK Institute of Engineering Sciences and Technology, Topi 23640, Pakistan
4
Department of Computer Science, University of Sharjah, Sharjah P.O. Box 27272, United Arab Emirates
5
School of Computer Science and Mathematics, Liverpool John Moores University, Liverpool L3 3AF, UK
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(12), 4180; https://doi.org/10.3390/s21124180
Submission received: 5 May 2021 / Revised: 8 June 2021 / Accepted: 16 June 2021 / Published: 18 June 2021
(This article belongs to the Section Communications)

Abstract

:
This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper. We suppose a worst-case scenario that an eavesdropper has ideal user detection ability. In particular, we suggest an optimization-based beamforming scheme with MISO-NOMA to improve the security and outage probability of a cell-edge user while maintaining the quality of service of the near-user and degrading the performance of the eavesdropper. To this end, power allocation coefficients are adjusted with the help of target data rates of both the users by utilizing a simultaneous wireless information and power transfer with time switching/power splitting protocol, where the near-user is used to forward the information to cell-edge user. The analytical results demonstrate that our beamformer analysis can achieve reduced outage probability of cell-edge user in the presence of the eavesdropper. Moreover, the provided simulation results validate our theoretical analysis and show that our approach improves the overall performance of a two-user cooperative MISO-NOMA system.

1. Introduction

Non-orthogonal multiple-access (NOMA) has been suggested as the emerging candidate technology to improve spectral efficiency by mapping multiple users on resource domains (e.g., frequency and time) in order to enable 5G and future generation data networks, also known as future communication networks [1]. Recently, the research community is taking great interest in the integration of wireless power transmission and NOMA communication [2]. The motivation behind this technique is its potential in the improvement of energy efficiency as well as the spectral performance in these wireless networks. The need for low latency traffic and high spectral performance has resulted from an increased convergence, and it has prompted recent advancements in wireless technology [3]. NOMA stands out for its dominance in meeting the criteria of vast convergence, effectively reducing transmission latency, and improving spectral efficiency [4]. The common resource across various power levels for all superposed transmit signals is the main characteristics of NOMA. To completely exploit the advantages of NOMA, a successive interference cancellation (SIC) detector having low complexity is used on the receiving side [5]. The user, having strong channel conditions, named as a near-user, initially decodes the message of far-user that has weaker channel conditions and then eliminates the interference from the far-user by using SIC [6]. Information of the far-user is easily detected by considering all other messages as noise, given that both the users will utilize complete resource block [7].
As both the near- and far-users coexist in any communication network, the authors of [8] suggested and evaluated a novel cooperative NOMA algorithm to increase the far-user’s reliability. The fundamental theory behind this cooperative transmitting technique is that users having higher channel gains are used as relays and they assist far-users having bad channel conditions. Furthermore, based on the available limited energy storage capability at the relay nodes, compensation usually exist between information receiving and forwarding, particularly to meet internet of things (IoT) accessibility requirements [9]. As a result, multiple attempts are recorded to deploy energy harvesting (EH) wireless networks, which provide self-sustainability and the ability to share energy among nodes. The authors of [10] investigated wireless-powered NOMA networks in which energy-constrained users collect energy from the base station for conducting NOMA transmission.
By using NOMA’s power-domain multiplexing, users must consume marginal energy to power their SIC decoders [11]. This essentially prevents NOMA from being used in energy-constrained IoT. The simultaneous wireless information and power transmission (SWIPT) has recently been lauded as a promising strategy for solving the power usage challenge in wireless networks [12]. The SWIPT has been widely investigated in previous studies, and can be split into two groups on the basis of EH model, named as a linear and a nonlinear EH model. The optimum resource allocation was developed in [13] relying on the linear EH model to fulfill various performance criteria, e.g., energy consumption, throughput, and data rate fairness among others. In [14], first nonlinear EH model was developed on the basis of data measurement to delineate the nonlinear function of the energy harvester. The nonlinear EH model was used to establish the optimal resource scheduling and interference management for cognitive SWIPT networks in [15]. In [16], the authors built on their previous work to incorporate a situation of incomplete channel state information (CSI). The problem of acquiring CSI and suppressing the direct-link interference through a cloud radio access network architecture was discussed in [17], where primary and secondary users are connected to a cloud processor. A store and transmit (SaT) scheme was proposed in [18] to perform information transmitting and energy storing in a two-user NOMA communication system by using a nonlinear EH relay.
On the other hand, there is a security drawback due to the broadcast existence of wireless networks [19]. Such as, if the eavesdropper is successful in intercepting message signal of a user in a NOMA setup, then the eavesdropper would be able to collect multiple users’ information [20]. However, in the NOMA scheme, the security problem is more challenging. Physical layer security (PLS) can provide a potential defense against a malicious user’s attack. Moreover, the message will be conveyed in confidence if the legitimate user’s channel and the eavesdropper channel can be managed in such a way that the message is not intercepted. To avoid eavesdropping attacks, PLS is a forefront security technique in wireless communication [21,22]. The PLS offers keyless knowledge authentication with information-theoretic assurances, as opposed to traditional cryptography techniques that use the phenomenon of secret key exchange at both transmitter and receiver and it also depends on the decipherer’s restricted computation capacity to safeguard the information [23]. The PLS follows the Shannon theory concept, which protects the physical layer by using the inherent randomness of wireless networks [24].
The cooperative NOMA systems with PLS have recently increased researchers’ interest in this area. The authors of [25] developed closed-form secure outage probability (SOP) expressions of cooperative NOMA systems in amplify-and-forward (AF) and decode-and-forward (DF) relay modes, demonstrating that using the optimum power allocation parameters will enhance the system’s secure performance. To make a secure communication system, jamming phenomenon in NOMA cooperative system was proposed in [26]. The cooperative NOMA’s reliability and security in downlink scenario cognitive networks was evaluated by the authors in [27]. In [28], the authors suggested a cooperative jamming technique to confuse relays and indicated that fading parameters and transmission power affect secure efficiency. For secure communication connection from eavesdropping, two-stage protected relay selection strategy at both sender and receiver using NOMA was suggested in [29] to increase the ability among users. In addition, artificial noise can be used to enhance transmitting information security. Therefore, the artificial noise technique in [30] was used to increase the secrecy efficiency of multiple antenna NOMA networks. The authors of [28] studied the secrecy outage possibility (SOP) of NOMA networks via multiple relays using PLS and cooperative communication. A framework with imperfect channel estimation was used in [31] to analyze the secrecy performance of an artificial noise-aided massive multiple-input multiple-output non-orthogonal multiple-access (MIMO-NOMA) network. In particular, the asymptotic expressions and ergodic secrecy rates for users were derived in this work. A joint power allocation scheme was used in [32] for the secrecy performance analysis of a massive MIMO-NOMA network in the presence of a multiple-antenna eavesdropper. The authors in [33] analyzed the large-scale NOMA systems in the domain of PLS and characterized the SOP using homogeneous Poisson point processes (HPPPs) to spread legitimate users (LUs) and eavesdroppers (Eves). In addition, the authors of [34] looked at the PLS of an uplink NOMA where the Eves are distributed randomly, and stochastic geometry approach was used for the performance evaluation.
Despite the fact that cooperative NOMA systems with SWIPT have been considered in the literature, no research is conducted to investigate the outage probability minimization problem in such a way to design an energy-efficient beamforming strategy in a nonlinear EH model to minimize the outage probability of far-user and also degrade the performance of Eve for a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) communication.

Contributions

The future deployment criteria—energy efficiency, minimum cost, and low power—implied in the application of a MISO antenna design all motivated us to explore optimized beamforming design in cooperative MISO-NOMA with SWIPT. A general MISO-NOMA system is considered here by using the SWIPT protocol where Alice (user-A), Bob (user-B), and an eavesdropper (Eve) are deployed in such a way that user-B and Eve are at the cell-edge. The decode-and-forward SWIPT architecture with EH receiver is employed at user-A using time switching/power splitting (TS/PS) protocol. User-A plays the role of a relay to forward the message signal of user-B. To this end, a cooperative scheme, where BS and each user are equipped with N number of antennas and single antenna, respectively, is proposed in this paper. Furthermore, the selection combining technique is employed at user-B and Eve. The main contributions of this paper are summarized as follows.
  • For the general channel model, we incorporate the beamforming at the transmitter side and use the indefinite quadratic form (IQF) approach to build a signal-to-interference-plus-noise ratio (SINR) in a canonical quadratic formulation for both direct and relaying transmissions.
  • The exact closed-form outage probability expressions of the legitimate users (user-A and user-B), and the Eve are derived and validated under several design parameters.
  • The analysis of beamformer is performed. More precisely, the proposed beamforming finds reduced outage probability of user-B, and further degrades the performance of Eve while maintaining quality-of-service (QoS) of user-A.
The remaining part of the paper is sectionalized as follows. In Section 2, the system model and the SINR formulation of direct and relaying transmission are presented. The optimal analysis strategy and outage probability expressions of user-A, user-B, and Eve are presented in Section 3. The system model is validated in Section 4 through simulation results, while Section 5 concludes the paper.

2. System Model

We consider a downlink MISO-NOMA system consisting of one near-user i.e., user-A, one far-user i.e., user-B, a passive Eve, and a BS consisting of N antennas, as shown in Figure 1. Let h A , h B , and  h E denote the channel vectors from BS to user-A, user-B, and Eve, respectively. Similarly, the channels from user-A to user-B, and user-A to Eve are denoted by h AB and h A E , respectively. Rayleigh flat fading is assumed in all wireless channels and considered as Gaussian random variables having zero mean. Additionally, n A ( n ) and n B ( n ) represent the additive white Gaussian noise (AWGN) with zero mean at user-A and user-B, respectively, having variance σ a 2 and  σ c 2 . Furthermore, the channel gain is written as E [ | h AB | 2 ] = β d x y / d o ϵ , where β is the power attenuation, ϵ denotes the path loss exponent, d x y is the distance between two nodes, and  d o is the reference distance.
In the proposed model, user-A acts as a hybrid TS/PS relay where the time switching block T is split into three parts: In the first time block, user-A harvests the energy from the BS utilizing the time duration α T . In the second time block, i.e.,  ( 1 α ) T 2 , power splitting takes place, where the user-A utilizes a power fraction ρ of the received power for energy harvesting and the remaining power fraction 1 ρ to decode information simultaneously. In the third time block having ( 1 α ) T 2 time duration the relaying transmission takes place where user-A utilizes its harvested energy to power the relaying operation. The ranges of power splitting and time switching parameters are 0 < ρ < 1 and 0 < α < 1 , respectively. Presence of rectifier circuits in a system imposes nonlinearity in the power conversion. Furthermore, the harvesting power circuit shows zero response if the input power falls below a sensitivity threshold ( P S sen ). If the input power is between the sensitivity and saturation threshold ( P S sat ), the harvested power is a continuous, nonlinear, and increasing function of the input power. For the input power above saturation, the output power of the harvester is saturated as discussed in [35,36]. Therefore, the harvested power at the output of the harvesting circuit is
p ( x ) = 0 , x [ 0 , P S sen ] , E A ( x ) · x , x [ P S sen , P S sat ] , E A ( P S sat ) · P S sat , x [ P S sat , ] ,
where E A ( · ) is the harvesting efficiency which is a function of input power. The hybrid SWIPT TS/PS protocol is shown in Figure 2. Here, we assume that Eve is assumed to be located close to the cell-edge. SINR is elaborated in the following stages.

2.1. First Time Slot

In the first time slot, information is transmitted from BS to user-A, user-B, and Eve. The message signals s B and s A of user-B and user-A, respectively, are superposed as w p A s A + p B s B and then broadcast towards all the users through N number of transmit antennas of BS, where p A and p B are the power allocations coefficients. Furthermore, following the principle of NOMA, it is assumed that p A + p B = 1, and  0 < p A < p B . The information received during first time slot is divided as follows.

2.1.1. From BS to User-A

The information received at user-A is written as
y A = w h A H p A P S s A + p B P S s B + n A ( n ) ,
where the first term is the user-A’s desired message, the second term is the interference for user-A, and the remaining term is denoted as AWGN. Here, h A is the channel of order N × 1 between BS to user-A.
Now, the energy harvested by user-A using hybrid SWIPT TS/PS protocol also takes place in the first time slot as follows:
E A = η P s | h A H w | 2 α T + η ρ P s | h A H w | 2 ( 1 α ) T / 2 = | | h A | | w w H ( η P s α T + η ρ P s ( 1 α ) T / 2 ) 2 ,
where we achieve the second equality by quadratic formulation (The quadratic formulation for any matrix X is written as | | h | | X 2 h H X h .), and the energy conversion efficiency denoted by η having the range 0 < η < 1 is used to decode the information.
Now, the SIC receiver is applied at user-A, and following the scheme of NOMA and superposition principle, user-A first decodes the message signal of user-B, i.e., s B and then detects its own message s A by subtracting the user-B’s decoded message.
Now, the SINR at user-A to decode the message signal of user-B is written as   
Γ A B = ( 1 ρ ) p B P s | h A H w | 2 ( 1 ρ ) p A P s | h A H w | 2 + ( 1 ρ ) σ a 2 + σ c 2 = | | h A | | w w H ( ( 1 ρ ) p B P s ) 2 | | h A | | w w H ( ( 1 ρ ) p A P s ) 2 + ( 1 ρ ) σ a 2 + σ c 2 = | | h ¯ A | | U 2 | | h ¯ A | | U ˜ 2 + ( 1 ρ ) σ a 2 + σ c 2 .
In (3), by using the the quadratic formulation we achieve the second equality, and by means of whitened transformation, i.e.,  h ¯ A from relation (5) in [37] we achieve the third equality. Furthermore, h ¯ A = R A H 2 h A , where h A CN ( 0 , R A ) h ¯ N CN ( 0 , I ) . Moreover, for simplification, U = R A 1 2 w w H R A H 2 ( 1 ρ ) p B P s and U ˜ = R A 1 2 w w H R A H 2 ( 1 ρ ) p A P s are considered as the weight matrices of user-B and user-A, respectively, while σ a 2 and σ c 2 are the variance terms at the receiving antennas.
Now, after subtracting the message signal of user-B from the composite signal, user-A can easily decode its own message without facing interference. Therefore, at user-A the received SNR to decode its own message s A , denoted as Γ A A , can be expressed as
Γ A A = | | h ¯ A | | U 2 ( 1 ρ ) σ a 2 + σ c 2 .

2.1.2. From BS to User-B

During the direct transmission stage, the SNR at user-B is characterized given that the user-B has higher transmit power, and SIC is applied at user-A. Therefore, user-B deals the interference due to user-A as noise. Thus, the SNR at user-B to decode its own message is written as
Γ B B = p B P s | h B H w | 2 p A P s | h B H w | 2 + σ a 2 + σ c 2 = | | h ¯ B | | V 2 | | h ¯ B | | V ˜ 2 + σ a 2 + σ c 2 ,
where the channel in the second equality is achieved as h ¯ B = R B H 2 h B , where h B CN ( 0 , R B ) h ¯ B CN ( 0 , I ) . Furthermore, V = R B 1 2 w w H R B H 2 ( p B P s ) is the desired weight matrix and V ˜ = R B 1 2 w w H R B H 2 ( p A P s ) is the noise weight matrix for user-B.

2.1.3. From BS to Eve

The information signal received at Eve is written as
y E = w h E H p A P s s A + p B P s s B + n E ( n ) .
The first term in (6) is the message signal of user-A which Eve taps from the BS, while the second term is the message signal of user-B that Eve can listen from the BS.
Now, we consider that Eve has the capability to differentiate message signals of both users. Therefore, the SINR for Eve to wiretap the information of user-A is expressed as
Γ Eve A = p A P s | h E H w | 2 p B P s | h E H w | 2 + σ a 2 + σ c 2 = | | h ¯ E | | E 2 | | h ¯ E | | E ˜ 2 + σ a 2 + σ c 2 ,
where in the first equality h E is the channel link from BS to Eve. In the second equality, h ¯ E is achieved by using the transformation h ¯ E = R E H 2 h E . Moreover, the matrix E = R E 1 2 w w H R E H 2 p A P S , and  E ˜ = R E 1 2 w w H R E H 2 p B P S are the desired and noise weight matrices, respectively, for Eve.
Similarly, SINR for Eve to wiretap the information of user-B is written as
Γ Eve B = | | h ¯ E | | E ˜ 2 | | h ¯ E | | E 2 + σ a 2 + σ c 2 .

2.2. Second Time Slot

The second time slot is for user-A to forward the information to user-B and Eve through cooperative relaying transmission. The information received from user-A at Eve and user-B is discussed in the following subsections.

2.2.1. From User-A to Eve

Power provided for relaying process is accomplished in first time slot, as in [38]. In this time slot, the Eve has the capability to listen to message signal of user-B. The information received from user-A to Eve is written by using the expression (7) from in [39] as follows:
y AE = p A s ^ B h AE + n a + n c ,
where s ^ B is the re-encoded version of s B , and  p A is the power of user-A harvested in the first time slot, and thus through this power, the cooperative relaying transmission takes place. The value of p A is obtained from the expression (7) of [39].
Now, the SINR received at Eve to listen the message signal of user-B through user-A to the Eve channel is written as
Γ AE B = | h AE | 2 | | h A | | w w H η P s ( 2 α + ( 1 α ) ρ ) ( σ a 2 + σ c 2 ) ( 1 α ) 2 .
The information at Eve is received in two stages; thus, both relayed and direct signals are combined at Eve. Therefore, considering the selection combining technique, the SINR at Eve to listen the information of user-B due to combination of these two signals is written as
Γ Eve = max Γ Eve B , Γ AB B .

2.2.2. From User-A to User-B

Similarly, user-A also forwards the information toward user-B by using the energy which is harvested in the first time slot. Therefore, we write the SINR received at user-B through user-A to user-B channel as
Γ AB = | h AB | 2 | | h A | | w w H η P s ( 2 α + ( 1 α ) ρ ) ( σ a 2 + σ c 2 ) ( 1 α ) 2 .
The information at user-B is also received in two stages. Consequently, both relayed and direct signals are combined at user-B. Thus, by using the selection combining technique again, the SINR at user-B due to combination of these two signals becomes
Γ B = max Γ B B , Γ AB .

3. Outage Probability Characterization

The probability that a user’s instantaneous data rate drops below a predefined target SNR is known as the user’s outage probability. The outage probability performance of user-A, user-B, and Eve is investigated in this section for the MISO-NOMA system under Rayleigh fading channels. It is assumed that both the users are independent.

3.1. Outage Probability of User-B

The outage probability of user-B, denoted by O B , by considering linearly dependent beamformers w is written as
O B = P r Γ A B < γ th , Γ B B < γ th + P r Γ A B > γ th , m a x ( Γ B B , Γ AB ) < γ th .
In (14), γ th is the the SNR threshold to decode s B , and is written as γ th = 2 2 R B 1 α 1 , where R B is the data rate of user-B.
The closed-form expression for O B in terms of exponential function exp ( · ) , unit step function u ( · ) , and generalized gamma function Γ ( · ) , for linearly dependent beamformers is written as (15).
Proof. 
The proof of (15) is given in Appendix A.    □
O B = 1 i = 1 N λ i B j = 1 , j i N ( λ i B λ j B ) exp γ th ( σ a 2 + σ c 2 ) λ i B u γ th ( σ a 2 + σ c 2 ) λ i B 1 i = 1 N λ i A j = 1 , j i N ( λ i A λ j A ) × exp γ th ( ( 1 ρ ) σ a 2 + σ c 2 ) λ i A u γ th ( ( 1 ρ ) σ a 2 + σ c 2 ) λ i A + exp γ th ( a 1 a 2 γ th ) . | | w | | 2 Γ 1 , γ th ( a 1 a 2 γ th ) | | w | | 2 ; γ th | | w | | 2 l A B . c .
O Eve = 1 i = 1 N λ i E j = 1 , j i N ( λ i E λ j E ) exp γ th ( σ a 2 + σ c 2 ) λ i E u γ th ( σ a 2 + σ c 2 ) λ i E 1 i = 1 N λ i A j = 1 , j i N ( λ i A λ j A ) × exp γ th ( ( 1 ρ ) σ a 2 + σ c 2 ) λ i A u γ th ( ( 1 ρ ) σ a 2 + σ c 2 ) λ i A + exp γ th ( a 1 a 2 γ th ) . | | w | | 2 Γ 1 , γ th ( a 1 a 2 γ th ) | | w | | 2 ; γ th | | w | | 2 l A E . c .
O A = 1 i = 1 N λ i A j = 1 , j i N ( λ i A λ j A ) exp γ th ( ( 1 ρ ) σ a 2 + σ c 2 ) λ i A u γ th ( 1 ρ ) σ a 2 + σ c 2 λ i A .

3.2. Outage Probability of Eve

The outage probability of Eve, denoted by O Eve , by considering the beamformers w to be linearly dependent, is written as
O Eve = P r Γ A B < γ th , Γ Eve B < γ th + P r Γ A B > γ th , m a x ( Γ Eve B , Γ AE B ) < γ th .
In (18), γ th is the the SNR threshold to decode s B , and is written as γ th = 2 2 R B 1 α 1 , where R B is the data rate of user-B. It is assumed that both the users are independent.
The closed-form expression of O E v e can be written as (16), where the beamformers remain linearly dependent.
Proof. 
The proof of (16) follows the same approach as given in Appendix A. Moreover, λ i A and λ i B are the eigenvalues of user-A and user-B obtained through their respective correlation matrices, while l A E is the distance from user-A to Eve.    □

3.3. Outage Probability of User-A

The outage probability of user-A, denoted by O A , is written by considering the beamformers w to be linearly dependent, as 
O A = P r Γ A A < γ th .
In (19), γ th is the the SNR threshold to detect S A , and is written as γ th = 2 2 R A 1 α 1 , where R A is the data rate of user-A. In the above equation, it is assumed that both the users are independent.
Now using (4) in (19), we get
O A = P r | | h ¯ A | | U 2 ( 1 ρ ) σ a 2 + σ c 2 < γ th = P r ( 1 ρ ) σ a 2 + σ c 2 γ th | | h ¯ A | | U 2 > 0 = p ( h ¯ A ) u γ th ( 1 ρ ) σ a 2 + σ c 2 | | h ¯ A | | U 2 d h ¯ A .
The exact closed-form expression of O A is written as (17).
Proof. 
The proof of (17) follows the same approach as in the derivation of (22) in [40].    □

3.4. Secure Communication Criteria for User-B

In this subsection, we present secure communication criteria through an optimization problem. This work focuses on a scenario where user-A and user-B are trusted, which means that the SIC processing is perfectly done at user-A. Moreover, in our assumptions Eve is closer to user-B as compared to user-A or BS, which may lead to the degradation in outage probability specifically for user-B. Therefore, we propose a security enhancement algorithm through optimization problem which degrades the outage probability of Eve in such a way that we get lower outage probability of user-B, and also use the outage probability of user-A as a constraint to avoid the outage probability degradation of user-A. We select (15) as our objective function which is optimized with respect to beamformer vector w in the presence of constraints through which the transmit power is restricted. Thus, we write
minimize w O B w subject to C 1 : | | w | | 2 = 1 C 2 : O A i + 1 O A i C 3 : O Eve i + 1 O Eve i ,
where the postscript i denotes the number of iterations. The constraint C1 indicates that w w H = 1 , while the constraint C2 guarantees that O A can reach its minimum outage probability value, and the constraint C3 represents that the optimized outage probability of Eve should have higher value as compared to its initial value. The optimization problem given in (21) is a non-convex single objective constrained optimization problem, so we solve it through exhaustive search approach. A pseudocode for outage minimization problem in (21) is given in Algorithm 1.
Algorithm 1 Pseudocode of optimized beamformer.
Input: Initialized value of beamformer vector
Output: Optimized beamformer value
1.    Initialize w , set threshold level ( ζ ), precision, number of iteration, and time index (i)
2.    Repeat
3.      Compute O B as in (21)
4.      i = i + 1
5.      Compute O B i + 1 , O A i + 1 O Eve i + 1 as in (21)
6.      If { O A i + 1 O A i } and { O Eve i + 1 O Eve i }
7.       Store beamformer value, O A , and  O Eve then perform recursion
8.       Else
9.       Return optimized beamformer value, O A , and  O Eve
10.      Stop algorithm = true
11.     End if
12.   Until (Stop algorithm = true)

4. Numerical Results

In this section, numerical results are presented for the cooperative MISO-NOMA networks performance for the outage probability over Rayleigh fading channels. For simulation, we use MATLAB programming tools with appropriate parameters. Monte Carlo simulations are used to validate the analytical closed-form expression of outage probability. We consider that the BS, user-A, and user-B are all in a straight line. This assumption has been widely adopted in cooperative NOMA networks [39,41]. The reason behind this assumption is to discuss the effect of position of user-A on the performance of the two-hop cooperative NOMA systems, where user-A moves along BS to user-B link. Assuming that the distance from BS to user-B ( d S B ) is 10 m, the distance from user-A to the BS ( d S A ) is 3 m and the distance between user-A and user-B is d A B = d S B d S A . The distinct correlation matrices of transmitter and receiver are given as R i j T x 1 2 = χ 1 | i j | and R i j R x 1 2 = χ 2 | i j | , respectively, where the correlation coefficients χ 1 and χ 2 are bounded between 0 and 1. Unless stated otherwise, the values of simulation parameters used are mentioned in Table 1, which are extensively used in other works on MISO-NOMA. These parameters are loosely adopted from in [38,39].
Let us quickly review how power allocation coefficients (PACs) have been calculated in the literature in order to pick suitable PACs for our plots. Evidently, in NOMA, there are different methods for determining the PACs. The authors of [41,42,43] randomly selected the power coefficients as long as the NOMA’s principle is met, i.e., p 1 p 2 and p 1 + p 2 = 1 . These PACs can also be calculated depending on the user’s QoS and target data rate, as in [44]. We calculate the PACs dynamically in this paper, depending on the target data rates of both user-A and user-B, as done in [38], and given as follows:
p 1 = 2 2 R t h 1 1 2 2 R t h 1 + 2 R t h 2 1 p 2 = 1 p 1 .
Figure 3a–c presents the OP of user-A, user-B, and Eve as a function of SNR, respectively, for validation purposes. The results derived from closed-form OP expressions are well matched with the simulation results, which indicates the validation of our model. It can also be observed that user-A shows better outage probability among others, while the outage probability of undesired user, i.e., Eve has the worst outage probability. This is because the distance between BS and Eve is assumed as d S E = d S B + 5 m . Furthermore, the impact of antenna diversity can also be seen in Figure 3. By increasing the number of antennas at the transmitter side, it results in better outage probability. Similarly, it can also be observed that the outage probability of the users gets improved at higher values of SNR.
Now, in Figure 4 we explain the complexity of our model by computing the execution time of the algorithm. The execution times in seconds, of sequential quadratic programming (“sqp”), “active-set”, and “interior-point” algorithms are 1.250742 s, 0.278754 s, and 2.700135 s, respectively. Intel ® Core TM i7-7500U CPU @ 2.70 GHz 2.90 GHz is used with 8GB RAM. Furthermore, the outage probability comparison of these three algorithms is shown in Figure 4, where the “sqp” algorithm gives lower outage probability as compared to “active-set” and “interior-point” algorithms specially for smaller distance of user-B from BS. For the rest of the experiments, we have considered “sqp” as optimization algorithm due to its superior performance.
Figure 5 presents the comparison of outage probability before and after the optimization of user-B and Eve. The positive gain of 1.5 dB, achieved by the user-B after the optimization, can be observed in this figure. Note that without degrading the outage probability of user-A, we have improved the optimized outage probability of user-B by 12%. At the same time, degradation in the outage probability of Eve by 10% and the negative gain of 1 dB is also achieved. This is because we have adjusted the beam from BS to user-B by using beamformer vector w in such a way that the beam becomes narrowed and is directed towards the legitimate user so that it becomes difficult for Eve to access the message signal of user-B. Similarly, Figure 5 can also be observed with respect to SNR, i.e., higher values of SNR result in better outage probability of the users.
Next, the distance of Eve from the BS is studied more deeply in Figure 6. It can be observed that going away from the BS degrades the performance of Eve. The difference between the initial and optimized outage probability values of Eve can also be seen in Figure 6. It can be observed that the optimized outage probability of Eve is increased by 6% and 21% when the number of transmit antennas are N = 3 and N = 5 , respectively. Additionally, an important result, which we have depicted in Figure 6, is that we achieve the higher gain value by increasing the number of transmit antennas. A reason herein is that the Eve is far from the BS, thus the channel conditions between BS and Eve are poor.
Figure 7 indicates the behaviour of outage probability of user-B and Eve under different values of predefined threshold γ t h . It is observed that the proposed optimal beamforming got significant gain at two different values of SNR in case of both user-B and Eve as shown in Figure 7a,b, respectively. Note that at different values of SNR, the optimized outage probability of user-B performs better as compared to its initial outage probability (before optimization). The optimized outage probability of Eve is degraded as compared to its initial outage probability by applying the proposed optimal beamforming algorithm, which ensures the accomplishment of our goal about secure communication for cell-edge user.
Last, Figure 8 presents a comparison of our proposed model with transmit beamformer-based technique [39] for the analysis of the outage probability of user-B in a similar network configuration. The main difference between the proposed work and the work in [39] is the general channel model. The physical layer security in MISO-NOMA system in the presence of an eavesdropper and secure communication criteria for the legitimate users is discussed in our work, which was not addressed in [39]. It is observed in Figure 8 that the proposed method with optimization performs better as compared to the work in [39]. However, without optimization, the proposed method shows higher outage probability of user-B as compared to the technique in [39]. This is due to the presence of Eve, and although Eve is also present in case of optimization in the proposed model, our optimization algorithm degrades the outage probability of Eve and improves the outage probability of user-B.

5. Conclusions

In this paper, we optimized the beamforming vector in downlink MISO NOMA systems in order to achieve lowest outage probability of cell-edge user. Specifically, we first provided the exact closed-form expression of outage probability of near-user, far-user, and eavesdropper under the parameters including the power allocation coefficients, transmit correlation, time switching/power splitting factors, and transmit antenna diversity. In addition, an optimization problem was developed for the case of two users, and an eavesdropper, which was then solved via the exhaustive search method. A secure MISO-NOMA communication is achieved by obtaining the best minimum outage probability of cell-edge user and performance degradation of an eavesdropper. Analytical results are validated by Monte Carlo simulation results, and antenna diversity at the transmitter is used to make significant performance gains. This work can be further expanded for multiple near-user MISO-NOMA systems acting as relays and by performing optimal analysis on power allocation coefficients to pick a best near-user to enhance overall performance of the system. Furthermore, the secrecy performance analysis of a MIMO-NOMA and massive MIMO-NOMA network in the presence of a multiple-antenna eavesdropper can be useful extensions of this work.

Author Contributions

Conceptualization, M.G., Z.H.A., A.K.H., G.A. and T.B.; Data curation, M.G. and Z.H.A.; Formal analysis, M.G., Z.H.A., A.K.H., G.A. and D.A.-J.; Funding acquisition, T.B. and D.A.-J.; Investigation, M.G., Z.H.A., A.K.H., G.A. and T.B.; Methodology, Z.H.A., A.K.H. and G.A.; Project administration, Z.H.A., G.A., T.B. and D.A.-J.; Resources, A.K.H., G.A., T.B. and D.A.-J.; Supervision, Z.H.A. and A.K.H.; Validation, Z.H.A., G.A., T.B. and D.A.-J.; Visualization, T.B.; Writing—original draft, M.G., Z.H.A. and A.K.H.; Writing—review & editing, Z.H.A., G.A., T.B. and D.A.-J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
α Time fraction
ρ Power fraction
w Beamformer vector
| | h | | 2 Norm-2 of vector h
R i j T x Transmit correlation matrix
R i j R x Receive correlation matrix
P S Transmitted Power
NBase station antennas
O Eve Outage Probability of Eve
O A Outage Probability of user-A
O B Outage Probability of user-B

Appendix A

The beamformer vectors are linearly dependent, so (14) can be written as
O B = P r Γ A B < γ t h P r ( Γ B B < γ t h ) + P r ( Γ B B < γ t h ) P r ( Γ A B > γ t h , Γ AB < γ t h ) = P r Γ B B < γ t h P r Γ A B < γ t h + P r Γ A B > γ t h , Γ AB < γ t h .
Now, plugging (3), (5), and (12) in (A1), we get
O B = P r | | h ¯ A | | U 2 | | h ¯ A | | U ˜ 2 + ( 1 ρ ) σ a 2 + σ c 2 < γ t h P 1 P r | | h ¯ B | | V 2 | | h ¯ B | | V ˜ 2 + σ a 2 + σ c 2 < γ t h P 2 + P r Γ A B > γ t h , Γ AB < γ t h P 3 ,
where linearly dependent beamformers are as a result written in form of matrices U , U ˜ , V , and V ˜ . Now, to solve P 1 , we utilize quadratic formulation and u ( x ) , where u ( x ) is the unit step function, i.e., u ( x ) = 1 2 π e x ( j ω + β ) j ω + β d ω ; β > 0 . The presence of u ( x ) helps in the tractability of analysis in this work. Therefore, the closed-form expression of P 1 is written, by using (13) from in [39], as
P 1 = 1 i = 1 N λ i B j = 1 , j i N ( λ i B λ j B ) exp γ t h ( σ a 2 + σ c 2 ) λ i B u γ th ( σ a 2 + σ c 2 ) λ i B ,
Now, to solve P 2 , same approach is opted as (A3) and written as follows:
P 2 = 1 i = 1 N λ i A j = 1 , j i N ( λ i A λ j A ) × exp γ t h ( ( 1 ρ ) σ a 2 + σ c 2 ) λ i A × u γ t h ( ( 1 ρ ) σ a 2 + σ c 2 ) λ i A .
Next, to solve P 3 , the link between user-A and user-B follows the exponential distribution. By utilizing the change in variable approach as in (40) from in [39] and generalized incomplete gamma function [45], the exact closed-form expression of P 3 is written as
P 3 = Γ 1 , γ th ( a 1 a 2 γ t h ) | | w | | 2 ; γ th | | w | | 2 l A B . c .
In (A5), a 1 = ( 1 ρ ) p B P s ( 1 ρ ) σ a 2 + σ c 2 , a 2 = ( 1 ρ ) p A P s ( 1 ρ ) σ a 2 + σ c 2 , and c = ( η P s ) ( 2 α 1 α + ρ ) σ a 2 + σ c 2 , while l A B is the distance between user-A to user-B. Moreover, λ i A and λ i B are the eigenvalues of user-A and user-B obtained through their respective correlation matrices.
Finally, using (A3)–(A5) in (A2), we obtain the exact closed-form expression written as (15).

References

  1. Al-Abbasi, Z.Q.; Khamis, M.A. Spectral efficiency (SE) enhancement of NOMA system through iterative power assignment. Wirel. Netw. 2021, 72, 1309–1317. [Google Scholar] [CrossRef]
  2. Cao, K.; Wang, B.; Ding, H.; Lv, L.; Tian, J.; Hu, H.; Gong, F. Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems. IEEE Trans. Veh. Technol. 2021, 70, 1978–1983. [Google Scholar] [CrossRef]
  3. Dai, L.; Wang, B.; Ding, Z.; Wang, Z.; Chen, S.; Hanzo, L. A survey of non-orthogonal multiple access for 5G. IEEE Commun. Surv. Tutor. 2018, 20, 2294–2323. [Google Scholar] [CrossRef] [Green Version]
  4. Dai, X.; Zhang, Z.; Bai, B.; Chen, S.; Sun, S. Pattern division multiple access: A new multiple access technology for 5G. IEEE Wirel. Commun. 2018, 25, 54–60. [Google Scholar] [CrossRef]
  5. Ding, Z.; Schober, R.; Poor, H.V. Unveiling the Importance of SIC in NOMA Systems Part 1: State of the Art and Recent Findings. IEEE Commun. Lett. 2020, 24, 2373–2377. [Google Scholar] [CrossRef]
  6. Lv, L.; Chen, J.; Ni, Q.; Ding, Z.; Jiang, H. Cognitive non-orthogonal multiple access with cooperative relaying: A new wireless frontier for 5G spectrum sharing. IEEE Commun. Mag. 2018, 56, 188–195. [Google Scholar] [CrossRef] [Green Version]
  7. Chen, Z.; Ding, Z.; Dai, X.; Zhang, R. An optimization perspective of the superiority of NOMA compared to conventional OMA. IEEE Trans. Signal Process. 2017, 65, 5191–5202. [Google Scholar] [CrossRef]
  8. Ding, Z.; Peng, M.; Poor, H.V. Cooperative non-orthogonal multiple access in 5G systems. IEEE Commun. Lett. 2015, 19, 1462–1465. [Google Scholar] [CrossRef] [Green Version]
  9. Zhai, D.; Zhang, R.; Cai, L.; Li, B.; Jiang, Y. Energy-efficient user scheduling and power allocation for NOMA-based wireless networks with massive IoT devices. IEEE Internet Things J. 2018, 5, 1857–1868. [Google Scholar] [CrossRef]
  10. Zaidi, S.K.; Hasan, S.F.; Gui, X. Two-way SWIPT-aided hybrid NOMA relaying for out-of-coverage devices. Wirel. Netw. 2020, 26, 2255–2270. [Google Scholar] [CrossRef]
  11. Gong, J.; Chen, X. Achievable rate region of non-orthogonal multiple access systems with wireless powered decoder. IEEE J. Sel. Areas Commun. 2017, 35, 2846–2859. [Google Scholar] [CrossRef] [Green Version]
  12. Wang, J.; Song, X.; Ma, Y.; Xie, Z. Power Efficient Secure Full-Duplex SWIPT Using NOMA and D2D with Imperfect CSI. Sensors 2020, 20, 5395. [Google Scholar] [CrossRef]
  13. Rajaram, A.; Khan, R.; Tharranetharan, S.; Jayakody, D.N.K.; Dinis, R.; Panic, S. Novel SWIPT schemes for 5G wireless networks. Sensors 2019, 19, 1169. [Google Scholar] [CrossRef] [Green Version]
  14. Boshkovska, E.; Ng, D.W.K.; Zlatanov, N.; Schober, R. Practical non-linear energy harvesting model and resource allocation for SWIPT systems. IEEE Commun. Lett. 2015, 19, 2082–2085. [Google Scholar] [CrossRef] [Green Version]
  15. Wang, Y.; Wu, Y.; Zhou, F.; Chu, Z.; Wu, Y.; Yuan, F. Multi-objective resource allocation in a NOMA cognitive radio network with a practical non-linear energy harvesting model. IEEE Access 2017, 6, 12973–12982. [Google Scholar] [CrossRef]
  16. Huang, Y.; Li, Z.; Zhou, F.; Zhu, R. Robust AN-aided beamforming design for secure MISO cognitive radio based on a practical nonlinear EH model. IEEE Access 2017, 5, 14011–14019. [Google Scholar] [CrossRef] [Green Version]
  17. Darsena, D.; Gelli, G.; Verde, F. Cloud-aided cognitive ambient backscatter wireless sensor networks. IEEE Access 2019, 7, 57399–57414. [Google Scholar] [CrossRef]
  18. Tuan, V.P.; Hong, I.P. Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming. Sensors 2020, 20, 1047. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  19. Li, X.; Huang, M.; Zhang, C.; Deng, D.; Rabie, K.M.; Ding, Y.; Du, J. Security and reliability performance analysis of cooperative multi-relay systems with nonlinear energy harvesters and hardware impairments. IEEE Access 2019, 7, 102644–102661. [Google Scholar] [CrossRef]
  20. Zhou, Z.; Chen, X.; Zhang, Y.; Mumtaz, S. Blockchain-empowered secure spectrum sharing for 5G heterogeneous networks. IEEE Netw. 2020, 34, 24–31. [Google Scholar] [CrossRef]
  21. Zhang, C.; Jia, F.; Zhang, Z.; Ge, J.; Gong, F. Physical layer security designs for 5G NOMA systems with a stronger near-end internal eavesdropper. IEEE Trans. Veh. Technol. 2020, 69, 13005–13017. [Google Scholar] [CrossRef]
  22. Melki, R.; Noura, H.N.; Chehab, A. Physical layer security for NOMA: Limitations, issues, and recommendations. Ann. Telecommun. 2020, 1–23. [Google Scholar] [CrossRef]
  23. Madeira, J.; Guerreiro, J.; Serra, H.; Dinis, R.; Montezuma, P.; Campos, L.M. A Physical Layer Security Technique for NOMA Systems with MIMO SC-FDE Schemes. Electronics 2020, 9, 240. [Google Scholar] [CrossRef] [Green Version]
  24. Ahiadormey, R.K.; Anokye, P.; Jo, H.S.; Song, C.; Lee, K.J. Secrecy Outage Analysis in NOMA Power Line Communications. IEEE Commun. Lett. 2021, 25, 1448–1452. [Google Scholar] [CrossRef]
  25. Zaghdoud, N.; Alouane, W.H.; Boujemaa, H.; Touati, F. Secure performance of AF and DF relaying in cooperative NOMA systems. In Proceedings of the 2019 19th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), Sousse, Tunisia, 24–26 March 2019; pp. 614–619. [Google Scholar]
  26. Yuan, C.; Tao, X.; Li, N.; Ni, W.; Liu, R.P.; Zhang, P. Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming. IEEE Trans. Veh. Technol. 2019, 68, 2682–2696. [Google Scholar] [CrossRef]
  27. Li, B.; Qi, X.; Huang, K.; Fei, Z.; Zhou, F.; Hu, R.Q. Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks. IEEE Trans. Commun. 2018, 67, 83–96. [Google Scholar] [CrossRef]
  28. Lei, H.; Yang, Z.; Park, K.H.; Ansari, I.S.; Guo, Y.; Pan, G.; Alouini, M.S. Secrecy outage analysis for cooperative NOMA systems with relay selection scheme. arXiv 2018, arXiv:1811.03220. [Google Scholar] [CrossRef] [Green Version]
  29. Feng, Y.; Yan, S.; Liu, C.; Yang, Z.; Yang, N. Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access. IEEE Trans. Inf. Forensics Secur. 2018, 14, 1670–1683. [Google Scholar] [CrossRef]
  30. Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
  31. Zeng, M.; Nguyen, N.P.; Dobre, O.A.; Poor, H.V. Securing downlink massive MIMO-NOMA networks with artificial noise. IEEE J. Sel. Top. Signal Process. 2019, 13, 685–699. [Google Scholar] [CrossRef] [Green Version]
  32. Nguyen, N.P.; Dobre, O.A.; Nguyen, L.D.; Nguyen, C.T.; Poor, H.V. Secure downlink massive MIMO NOMA network in the presence of a multiple-antenna eavesdropper. In Proceedings of the ICC 2019-2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  33. Yue, X.; Liu, Y.; Yao, Y.; Li, X.; Liu, R.; Nallanathan, A. Secure communications in a unified non-orthogonal multiple access framework. IEEE Trans. Wirel. Commun. 2020, 19, 2163–2178. [Google Scholar] [CrossRef] [Green Version]
  34. Gomez, G.; Martin-Vega, F.J.; Lopez-Martinez, F.J.; Liu, Y.; Elkashlan, M. Physical layer security in uplink NOMA multi-antenna systems with randomly distributed eavesdroppers. IEEE Access 2019, 7, 70422–70435. [Google Scholar] [CrossRef]
  35. Alevizos, P.N.; Bletsas, A. Sensitive and nonlinear far-field RF energy harvesting in wireless communications. IEEE Trans. Wirel. Commun. 2018, 17, 3670–3685. [Google Scholar] [CrossRef] [Green Version]
  36. Wang, S.; Xia, M.; Huang, K.; Wu, Y.C. Wirelessly powered two-way communication with nonlinear energy harvesting model: Rate regions under fixed and mobile relay. IEEE Trans. Wirel. Commun. 2017, 16, 8190–8204. [Google Scholar] [CrossRef]
  37. Hassan, A.K.; Moinuddin, M.; Al-Saggaf, U.M.; Aldayel, O.; Davidson, T.N.; Al-Naffouri, T.Y. Performance Analysis and Joint Statistical Beamformer Design for Multi-User MIMO Systems. IEEE Commun. Lett. 2020, 24, 2152–2156. [Google Scholar] [CrossRef]
  38. Do, T.N.; da Costa, D.B.; Duong, T.Q.; An, B. Improving the performance of cell-edge users in MISO-NOMA systems using TAS and SWIPT-based cooperative transmissions. IEEE Trans. Green Commun. Netw. 2017, 2, 49–62. [Google Scholar] [CrossRef]
  39. Ghous, M.; Abbas, Z.H.; Abbas, G.; Hassan, A.K.; Moinuddin, M. Transmit beamformer based performance analysis and diversity gains of cell edge user in cooperative MISO-NOMA system. Phys. Commun. 2020, 41, 101102. [Google Scholar] [CrossRef]
  40. Hassan, A.K.; Moinuddin, M.; Al-Saggaf, U.M.; Al-Naffouri, T.Y. Performance analysis of beamforming in MU-MIMO systems for Rayleigh fading channels. IEEE Access 2017, 5, 3709–3720. [Google Scholar] [CrossRef] [Green Version]
  41. Ding, Z.; Adachi, F.; Poor, H.V. The application of MIMO to non-orthogonal multiple access. IEEE Trans. Wirel. Commun. 2015, 15, 537–552. [Google Scholar] [CrossRef] [Green Version]
  42. Do, N.T.; Da Costa, D.B.; Duong, T.Q.; An, B. A BNBF user selection scheme for NOMA-based cooperative relaying systems with SWIPT. IEEE Commun. Lett. 2016, 21, 664–667. [Google Scholar] [CrossRef] [Green Version]
  43. Kim, J.B.; Lee, I.H. Capacity analysis of cooperative relaying systems using non-orthogonal multiple access. IEEE Commun. Lett. 2015, 19, 1949–1952. [Google Scholar] [CrossRef]
  44. Yang, Z.; Ding, Z.; Fan, P.; Al-Dhahir, N. The impact of power allocation on cooperative non-orthogonal multiple access networks with SWIPT. IEEE Trans. Wirel. Commun. 2017, 16, 4332–4343. [Google Scholar] [CrossRef] [Green Version]
  45. Chaudhry, M.A.; Zubair, S.M. On a Class of Incomplete Gamma Functions with Applications; Chapman and Hall/CRC: London, UK, 2001. [Google Scholar]
Figure 1. System model of a secure cooperative multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system.
Figure 1. System model of a secure cooperative multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system.
Sensors 21 04180 g001
Figure 2. A hybrid simultaneous wireless information and power transmission (SWIPT) time switching/power splitting (TS/PS) protocol.
Figure 2. A hybrid simultaneous wireless information and power transmission (SWIPT) time switching/power splitting (TS/PS) protocol.
Sensors 21 04180 g002
Figure 3. Effect of different values of BS transmit antennas on the outage probability of (a) user-A, (b) user-B, and (c) Eve, against SNR in dB.
Figure 3. Effect of different values of BS transmit antennas on the outage probability of (a) user-A, (b) user-B, and (c) Eve, against SNR in dB.
Sensors 21 04180 g003
Figure 4. Outage probability comparison of “sqp”, “active-set”, and “interior-point” algorithms for specification of experiment.
Figure 4. Outage probability comparison of “sqp”, “active-set”, and “interior-point” algorithms for specification of experiment.
Sensors 21 04180 g004
Figure 5. Comparison of outage probability of user-B and Eve before and after optimization versus SNR in dB.
Figure 5. Comparison of outage probability of user-B and Eve before and after optimization versus SNR in dB.
Sensors 21 04180 g005
Figure 6. Comparison of outage probability of Eve with the distance of Eve from the BS.
Figure 6. Comparison of outage probability of Eve with the distance of Eve from the BS.
Sensors 21 04180 g006
Figure 7. Impact of predefined threshold ( γ t h ) at N = 7 on the outage probability of (a) user-B and (b) Eve.
Figure 7. Impact of predefined threshold ( γ t h ) at N = 7 on the outage probability of (a) user-B and (b) Eve.
Sensors 21 04180 g007
Figure 8. Outage probability comparison between transmit beamformer technique and our proposed model.
Figure 8. Outage probability comparison between transmit beamformer technique and our proposed model.
Sensors 21 04180 g008
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParametersValues
Bandwidth1 MHz
Correlation coefficient χ 1 0.2 + 0.4 j
Correlation coefficient χ 2 0.1 + 0.3 j
Data rates of users, R t h 1 = R t h 2 0.17 bits/s/Hz
Energy conversion efficiency to decode information, η 0.7
Noise power density of antenna, n a 100 dBm/Hz
Noise density to process information, n c 90 dBm/Hz
Number of Monte Carlo simulation runs 10 6
Path loss exponent, ϵ 3
The distance from BS to user-A, d SA 3 m
The distance from BS to user-B, d SB 10 m
The distance from user-A to user-B, d AB d SB d SA
The distance from BS to Eve, d SE d SB + 5 m
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ghous, M.; Abbas, Z.H.; Hassan, A.K.; Abbas, G.; Baker, T.; Al-Jumeily, D. Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network. Sensors 2021, 21, 4180. https://doi.org/10.3390/s21124180

AMA Style

Ghous M, Abbas ZH, Hassan AK, Abbas G, Baker T, Al-Jumeily D. Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network. Sensors. 2021; 21(12):4180. https://doi.org/10.3390/s21124180

Chicago/Turabian Style

Ghous, Mujtaba, Ziaul Haq Abbas, Ahmad Kamal Hassan, Ghulam Abbas, Thar Baker, and Dhiya Al-Jumeily. 2021. "Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network" Sensors 21, no. 12: 4180. https://doi.org/10.3390/s21124180

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop