Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network

This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper. We suppose a worst-case scenario that an eavesdropper has ideal user detection ability. In particular, we suggest an optimization-based beamforming scheme with MISO-NOMA to improve the security and outage probability of a cell-edge user while maintaining the quality of service of the near-user and degrading the performance of the eavesdropper. To this end, power allocation coefficients are adjusted with the help of target data rates of both the users by utilizing a simultaneous wireless information and power transfer with time switching/power splitting protocol, where the near-user is used to forward the information to cell-edge user. The analytical results demonstrate that our beamformer analysis can achieve reduced outage probability of cell-edge user in the presence of the eavesdropper. Moreover, the provided simulation results validate our theoretical analysis and show that our approach improves the overall performance of a two-user cooperative MISO-NOMA system.


Introduction
Non-orthogonal multiple-access (NOMA) has been suggested as the emerging candidate technology to improve spectral efficiency by mapping multiple users on resource domains (e.g., frequency and time) in order to enable 5G and future generation data networks, also known as future communication networks [1]. Recently, the research community is taking great interest in the integration of wireless power transmission and NOMA communication [2]. The motivation behind this technique is its potential in the improvement of energy efficiency as well as the spectral performance in these wireless networks. The need for low latency traffic and high spectral performance has resulted from an increased convergence, and it has prompted recent advancements in wireless technology [3]. NOMA stands out for its dominance in meeting the criteria of vast convergence, effectively reducing transmission latency, and improving spectral efficiency [4]. The common resource across various power levels for all superposed transmit signals is the main characteristics of NOMA. To completely exploit the advantages of NOMA, a successive interference cancellation (SIC) detector having low complexity is used on the receiving side [5]. The user, having strong channel conditions, named as a near-user, initially decodes the message of far-user that has weaker channel conditions and then eliminates the interference from the far-user by using SIC [6]. Information of the far-user is easily detected by considering all other messages as noise, given that both the users will utilize complete resource block [7].
As both the near-and far-users coexist in any communication network, the authors of [8] suggested and evaluated a novel cooperative NOMA algorithm to increase the faruser's reliability. The fundamental theory behind this cooperative transmitting technique is that users having higher channel gains are used as relays and they assist far-users having bad channel conditions. Furthermore, based on the available limited energy storage capability at the relay nodes, compensation usually exist between information receiving and forwarding, particularly to meet internet of things (IoT) accessibility requirements [9]. As a result, multiple attempts are recorded to deploy energy harvesting (EH) wireless networks, which provide self-sustainability and the ability to share energy among nodes. The authors of [10] investigated wireless-powered NOMA networks in which energy-constrained users collect energy from the base station for conducting NOMA transmission.
By using NOMA's power-domain multiplexing, users must consume marginal energy to power their SIC decoders [11]. This essentially prevents NOMA from being used in energy-constrained IoT. The simultaneous wireless information and power transmission (SWIPT) has recently been lauded as a promising strategy for solving the power usage challenge in wireless networks [12]. The SWIPT has been widely investigated in previous studies, and can be split into two groups on the basis of EH model, named as a linear and a nonlinear EH model. The optimum resource allocation was developed in [13] relying on the linear EH model to fulfill various performance criteria, e.g., energy consumption, throughput, and data rate fairness among others. In [14], first nonlinear EH model was developed on the basis of data measurement to delineate the nonlinear function of the energy harvester. The nonlinear EH model was used to establish the optimal resource scheduling and interference management for cognitive SWIPT networks in [15]. In [16], the authors built on their previous work to incorporate a situation of incomplete channel state information (CSI). The problem of acquiring CSI and suppressing the direct-link interference through a cloud radio access network architecture was discussed in [17], where primary and secondary users are connected to a cloud processor. A store and transmit (SaT) scheme was proposed in [18] to perform information transmitting and energy storing in a two-user NOMA communication system by using a nonlinear EH relay.
On the other hand, there is a security drawback due to the broadcast existence of wireless networks [19]. Such as, if the eavesdropper is successful in intercepting message signal of a user in a NOMA setup, then the eavesdropper would be able to collect multiple users' information [20]. However, in the NOMA scheme, the security problem is more challenging. Physical layer security (PLS) can provide a potential defense against a malicious user's attack. Moreover, the message will be conveyed in confidence if the legitimate user's channel and the eavesdropper channel can be managed in such a way that the message is not intercepted. To avoid eavesdropping attacks, PLS is a forefront security technique in wireless communication [21,22]. The PLS offers keyless knowledge authentication with information-theoretic assurances, as opposed to traditional cryptography techniques that use the phenomenon of secret key exchange at both transmitter and receiver and it also depends on the decipherer's restricted computation capacity to safeguard the information [23]. The PLS follows the Shannon theory concept, which protects the physical layer by using the inherent randomness of wireless networks [24].
The cooperative NOMA systems with PLS have recently increased researchers' interest in this area. The authors of [25] developed closed-form secure outage probability (SOP) expressions of cooperative NOMA systems in amplify-and-forward (AF) and decodeand-forward (DF) relay modes, demonstrating that using the optimum power allocation parameters will enhance the system's secure performance. To make a secure communication system, jamming phenomenon in NOMA cooperative system was proposed in [26]. The cooperative NOMA's reliability and security in downlink scenario cognitive networks was evaluated by the authors in [27]. In [28], the authors suggested a cooperative jamming technique to confuse relays and indicated that fading parameters and transmission power affect secure efficiency. For secure communication connection from eavesdropping, two-stage protected relay selection strategy at both sender and receiver using NOMA was suggested in [29] to increase the ability among users. In addition, artificial noise can be used to enhance transmitting information security. Therefore, the artificial noise technique in [30] was used to increase the secrecy efficiency of multiple antenna NOMA networks. The authors of [28] studied the secrecy outage possibility (SOP) of NOMA networks via multiple relays using PLS and cooperative communication. A framework with imperfect channel estimation was used in [31] to analyze the secrecy performance of an artificial noise-aided massive multiple-input multiple-output non-orthogonal multipleaccess (MIMO-NOMA) network. In particular, the asymptotic expressions and ergodic secrecy rates for users were derived in this work. A joint power allocation scheme was used in [32] for the secrecy performance analysis of a massive MIMO-NOMA network in the presence of a multiple-antenna eavesdropper. The authors in [33] analyzed the large-scale NOMA systems in the domain of PLS and characterized the SOP using homogeneous Poisson point processes (HPPPs) to spread legitimate users (LUs) and eavesdroppers (Eves). In addition, the authors of [34] looked at the PLS of an uplink NOMA where the Eves are distributed randomly, and stochastic geometry approach was used for the performance evaluation.
Despite the fact that cooperative NOMA systems with SWIPT have been considered in the literature, no research is conducted to investigate the outage probability minimization problem in such a way to design an energy-efficient beamforming strategy in a nonlinear EH model to minimize the outage probability of far-user and also degrade the performance of Eve for a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) communication.

Contributions
The future deployment criteria-energy efficiency, minimum cost, and low powerimplied in the application of a MISO antenna design all motivated us to explore optimized beamforming design in cooperative MISO-NOMA with SWIPT. A general MISO-NOMA system is considered here by using the SWIPT protocol where Alice (user-A), Bob (user-B), and an eavesdropper (Eve) are deployed in such a way that user-B and Eve are at the cell-edge. The decode-and-forward SWIPT architecture with EH receiver is employed at user-A using time switching/power splitting (TS/PS) protocol. User-A plays the role of a relay to forward the message signal of user-B. To this end, a cooperative scheme, where BS and each user are equipped with N number of antennas and single antenna, respectively, is proposed in this paper. Furthermore, the selection combining technique is employed at user-B and Eve. The main contributions of this paper are summarized as follows.

•
For the general channel model, we incorporate the beamforming at the transmitter side and use the indefinite quadratic form (IQF) approach to build a signal-to-interferenceplus-noise ratio (SINR) in a canonical quadratic formulation for both direct and relaying transmissions. • The exact closed-form outage probability expressions of the legitimate users (user-A and user-B), and the Eve are derived and validated under several design parameters. • The analysis of beamformer is performed. More precisely, the proposed beamforming finds reduced outage probability of user-B, and further degrades the performance of Eve while maintaining quality-of-service (QoS) of user-A.
The remaining part of the paper is sectionalized as follows. In Section 2, the system model and the SINR formulation of direct and relaying transmission are presented. The optimal analysis strategy and outage probability expressions of user-A, user-B, and Eve are presented in Section 3. The system model is validated in Section 4 through simulation results, while Section 5 concludes the paper.

System Model
We consider a downlink MISO-NOMA system consisting of one near-user i.e., user-A, one far-user i.e., user-B, a passive Eve, and a BS consisting of N antennas, as shown in Figure 1. Let h A , h B , and h E denote the channel vectors from BS to user-A, user-B, and Eve, respectively. Similarly, the channels from user-A to user-B, and user-A to Eve are denoted by h AB and h AE , respectively. Rayleigh flat fading is assumed in all wireless channels and considered as Gaussian random variables having zero mean. Additionally, n A (n) and n B (n) represent the additive white Gaussian noise (AWGN) with zero mean at user-A and user-B, respectively, having variance σ 2 a and σ 2 c . Furthermore, the channel gain is written as , where β is the power attenuation, denotes the path loss exponent, d xy is the distance between two nodes, and d o is the reference distance. In the proposed model, user-A acts as a hybrid TS/PS relay where the time switching block T is split into three parts: In the first time block, user-A harvests the energy from the BS utilizing the time duration αT. In the second time block, i.e., (1 − α) T 2 , power splitting takes place, where the user-A utilizes a power fraction ρ of the received power for energy harvesting and the remaining power fraction 1 − ρ to decode information simultaneously. In the third time block having (1 − α) T 2 time duration the relaying transmission takes place where user-A utilizes its harvested energy to power the relaying operation. The ranges of power splitting and time switching parameters are 0 < ρ < 1 and 0 < α < 1, respectively. Presence of rectifier circuits in a system imposes nonlinearity in the power conversion. Furthermore, the harvesting power circuit shows zero response if the input power falls below a sensitivity threshold (P sen S ). If the input power is between the sensitivity and saturation threshold (P sat S ), the harvested power is a continuous, nonlinear, and increasing function of the input power. For the input power above saturation, the output power of the harvester is saturated as discussed in [35,36]. Therefore, the harvested power at the output of the harvesting circuit is where E A (·) is the harvesting efficiency which is a function of input power. The hybrid SWIPT TS/PS protocol is shown in Figure 2. Here, we assume that Eve is assumed to be located close to the cell-edge. SINR is elaborated in the following stages.

First Time Slot
In the first time slot, information is transmitted from BS to user-A, user-B, and Eve. The message signals s B and s A of user-B and user-A, respectively, are superposed as w √ p A s A + √ p B s B and then broadcast towards all the users through N number of transmit antennas of BS, where p A and p B are the power allocations coefficients. Furthermore, following the principle of NOMA, it is assumed that p A + p B = 1, and 0 < p A < p B . The information received during first time slot is divided as follows.

From BS to User-A
The information received at user-A is written as where the first term is the user-A's desired message, the second term is the interference for user-A, and the remaining term is denoted as AWGN. Here, h A is the channel of order N × 1 between BS to user-A. Now, the energy harvested by user-A using hybrid SWIPT TS/PS protocol also takes place in the first time slot as follows: where we achieve the second equality by quadratic formulation (The quadratic formulation for any matrix X is written as ||h|| 2 X h H Xh.), and the energy conversion efficiency denoted by η having the range 0 < η < 1 is used to decode the information. Now, the SIC receiver is applied at user-A, and following the scheme of NOMA and superposition principle, user-A first decodes the message signal of user-B, i.e., s B and then detects its own message s A by subtracting the user-B's decoded message. Now, the SINR at user-A to decode the message signal of user-B is written as In (3), by using the the quadratic formulation we achieve the second equality, and by means of whitened transformation, i.e., h A from relation (5) in [37] we achieve the third are considered as the weight matrices of user-B and user-A, respectively, while σ 2 a and σ 2 c are the variance terms at the receiving antennas. Now, after subtracting the message signal of user-B from the composite signal, user-A can easily decode its own message without facing interference. Therefore, at user-A the received SNR to decode its own message s A , denoted as Γ A A , can be expressed as

From BS to User-B
During the direct transmission stage, the SNR at user-B is characterized given that the user-B has higher transmit power, and SIC is applied at user-A. Therefore, user-B deals the interference due to user-A as noise. Thus, the SNR at user-B to decode its own message is written as where the channel in the second equality is achieved as

From BS to Eve
The information signal received at Eve is written as The first term in (6) is the message signal of user-A which Eve taps from the BS, while the second term is the message signal of user-B that Eve can listen from the BS. Now, we consider that Eve has the capability to differentiate message signals of both users. Therefore, the SINR for Eve to wiretap the information of user-A is expressed as where in the first equality h E is the channel link from BS to Eve. In the second equal- Similarly, SINR for Eve to wiretap the information of user-B is written as

Second Time Slot
The second time slot is for user-A to forward the information to user-B and Eve through cooperative relaying transmission. The information received from user-A at Eve and user-B is discussed in the following subsections.

From User-A to Eve
Power provided for relaying process is accomplished in first time slot, as in [38]. In this time slot, the Eve has the capability to listen to message signal of user-B. The information received from user-A to Eve is written by using the expression (7) from in [39] as follows: where s B is the re-encoded version of s B , and p A is the power of user-A harvested in the first time slot, and thus through this power, the cooperative relaying transmission takes place. The value of p A is obtained from the expression (7) of [39]. Now, the SINR received at Eve to listen the message signal of user-B through user-A to the Eve channel is written as .
The information at Eve is received in two stages; thus, both relayed and direct signals are combined at Eve. Therefore, considering the selection combining technique, the SINR at Eve to listen the information of user-B due to combination of these two signals is written as

From User-A to User-B
Similarly, user-A also forwards the information toward user-B by using the energy which is harvested in the first time slot. Therefore, we write the SINR received at user-B through user-A to user-B channel as .
The information at user-B is also received in two stages. Consequently, both relayed and direct signals are combined at user-B. Thus, by using the selection combining technique again, the SINR at user-B due to combination of these two signals becomes

Outage Probability Characterization
The probability that a user's instantaneous data rate drops below a predefined target SNR is known as the user's outage probability. The outage probability performance of user-A, user-B, and Eve is investigated in this section for the MISO-NOMA system under Rayleigh fading channels. It is assumed that both the users are independent.

Outage Probability of User-B
The outage probability of user-B, denoted by O B , by considering linearly dependent beamformers w is written as In (14), γ th is the the SNR threshold to decode s B , and is written as The closed-form expression for O B in terms of exponential function (exp(·)), unit step function (u(·)), and generalized gamma function (Γ(·)), for linearly dependent beamformers is written as (15).

Outage Probability of Eve
The outage probability of Eve, denoted by O Eve , by considering the beamformers w to be linearly dependent, is written as In (18), γ th is the the SNR threshold to decode s B , and is written as γ th = 2 2R B 1−α − 1, where R B is the data rate of user-B. It is assumed that both the users are independent.
The closed-form expression of O Eve can be written as (16), where the beamformers remain linearly dependent.
Proof. The proof of (16) follows the same approach as given in Appendix A. Moreover, λ iA and λ iB are the eigenvalues of user-A and user-B obtained through their respective correlation matrices, while l AE is the distance from user-A to Eve.

Outage Probability of User-A
The outage probability of user-A, denoted by O A , is written by considering the beamformers w to be linearly dependent, as In (19), γ th is the the SNR threshold to detect S A , and is written as γ th = 2 2R A 1−α − 1, where R A is the data rate of user-A. In the above equation, it is assumed that both the users are independent. Now using (4) in (19), we get The exact closed-form expression of O A is written as (17).
Proof. The proof of (17) follows the same approach as in the derivation of (22) in [40].

Secure Communication Criteria for User-B
In this subsection, we present secure communication criteria through an optimization problem. This work focuses on a scenario where user-A and user-B are trusted, which means that the SIC processing is perfectly done at user-A. Moreover, in our assumptions Eve is closer to user-B as compared to user-A or BS, which may lead to the degradation in outage probability specifically for user-B. Therefore, we propose a security enhancement algorithm through optimization problem which degrades the outage probability of Eve in such a way that we get lower outage probability of user-B, and also use the outage probability of user-A as a constraint to avoid the outage probability degradation of user-A. We select (15) as our objective function which is optimized with respect to beamformer vector w in the presence of constraints through which the transmit power is restricted. Thus, we write minimize where the postscript i denotes the number of iterations. The constraint C1 indicates that ww H = 1, while the constraint C2 guarantees that O A can reach its minimum outage probability value, and the constraint C3 represents that the optimized outage probability of Eve should have higher value as compared to its initial value. The optimization problem given in (21) is a non-convex single objective constrained optimization problem, so we solve it through exhaustive search approach. A pseudocode for outage minimization problem in (21) is given in Algorithm 1.  (21)  4.
Store beamformer value, O A , and O Eve then perform recursion 8. Else 9.
Return optimized beamformer value, O A , and O Eve 10.

Numerical Results
In this section, numerical results are presented for the cooperative MISO-NOMA networks performance for the outage probability over Rayleigh fading channels. For simulation, we use MATLAB programming tools with appropriate parameters. Monte Carlo simulations are used to validate the analytical closed-form expression of outage probability. We consider that the BS, user-A, and user-B are all in a straight line. This assumption has been widely adopted in cooperative NOMA networks [39,41]. The reason behind this assumption is to discuss the effect of position of user-A on the performance of the two-hop cooperative NOMA systems, where user-A moves along BS to user-B link. Assuming that the distance from BS to user-B (d SB ) is 10 m, the distance from user-A to the BS (d SA ) is 3 m and the distance between user-A and user-B is d AB = d SB − d SA . The distinct correlation matrices of transmitter and receiver are given as R 1 2 ij−Tx = χ |i−j| 1 and R 1 2 ij−Rx = χ |i−j| 2 , respectively, where the correlation coefficients χ 1 and χ 2 are bounded between 0 and 1. Unless stated otherwise, the values of simulation parameters used are mentioned in Table 1, which are extensively used in other works on MISO-NOMA. These parameters are loosely adopted from in [38,39].
Let us quickly review how power allocation coefficients (PACs) have been calculated in the literature in order to pick suitable PACs for our plots. Evidently, in NOMA, there are different methods for determining the PACs. The authors of [41][42][43] randomly selected the power coefficients as long as the NOMA's principle is met, i.e., p 1 ≤ p 2 and p 1 + p 2 = 1. These PACs can also be calculated depending on the user's QoS and target data rate, as in [44]. We calculate the PACs dynamically in this paper, depending on the target data rates of both user-A and user-B, as done in [38], and given as follows: Figure 3a-c presents the OP of user-A, user-B, and Eve as a function of SNR, respectively, for validation purposes. The results derived from closed-form OP expressions are well matched with the simulation results, which indicates the validation of our model. It can also be observed that user-A shows better outage probability among others, while the outage probability of undesired user, i.e., Eve has the worst outage probability. This is because the distance between BS and Eve is assumed as d SE = d SB + 5m. Furthermore, the impact of antenna diversity can also be seen in Figure 3. By increasing the number of antennas at the transmitter side, it results in better outage probability. Similarly, it can also be observed that the outage probability of the users gets improved at higher values of SNR.  Figure 4 we explain the complexity of our model by computing the execution time of the algorithm. The execution times in seconds, of sequential quadratic programming ("sqp"), "active-set", and "interior-point" algorithms are 1.250742 s, 0.278754 s, and 2.700135 s, respectively. Intel Core TM i7-7500U CPU @ 2.70 GHz 2.90 GHz is used with 8GB RAM. Furthermore, the outage probability comparison of these three algorithms is shown in Figure 4, where the "sqp" algorithm gives lower outage probability as compared to "active-set" and "interior-point" algorithms specially for smaller distance of user-B from BS. For the rest of the experiments, we have considered "sqp" as optimization algorithm due to its superior performance. Outage probability comparison of "sqp", "active-set", and "interior-point" algorithms for specification of experiment. Figure 5 presents the comparison of outage probability before and after the optimization of user-B and Eve. The positive gain of 1.5 dB, achieved by the user-B after the optimization, can be observed in this figure. Note that without degrading the outage probability of user-A, we have improved the optimized outage probability of user-B by 12%. At the same time, degradation in the outage probability of Eve by 10% and the negative gain of 1 dB is also achieved. This is because we have adjusted the beam from BS to user-B by using beamformer vector w in such a way that the beam becomes narrowed and is directed towards the legitimate user so that it becomes difficult for Eve to access the message signal of user-B. Similarly, Figure 5 can also be observed with respect to SNR, i.e., higher values of SNR result in better outage probability of the users. Next, the distance of Eve from the BS is studied more deeply in Figure 6. It can be observed that going away from the BS degrades the performance of Eve. The difference between the initial and optimized outage probability values of Eve can also be seen in Figure 6. It can be observed that the optimized outage probability of Eve is increased by 6% and 21% when the number of transmit antennas are N = 3 and N = 5, respectively. Additionally, an important result, which we have depicted in Figure 6, is that we achieve the higher gain value by increasing the number of transmit antennas. A reason herein is that the Eve is far from the BS, thus the channel conditions between BS and Eve are poor.

Outage probability of Eve
Initial outage probability of Eve at N=3 Optimized outage probability of Eve at N=3 Initial outage probability of Eve at N=5 Optimized outage probability of Eve at N=5 Outage probability increased by 21% at N=5 Outage probability increased by 6% at N=3 Figure 6. Comparison of outage probability of Eve with the distance of Eve from the BS. Figure 7 indicates the behaviour of outage probability of user-B and Eve under different values of predefined threshold γ th . It is observed that the proposed optimal beamforming got significant gain at two different values of SNR in case of both user-B and Eve as shown in Figure 7a,b, respectively. Note that at different values of SNR, the optimized outage probability of user-B performs better as compared to its initial outage probability (before optimization). The optimized outage probability of Eve is degraded as compared to its initial outage probability by applying the proposed optimal beamforming algorithm, which ensures the accomplishment of our goal about secure communication for cell-edge user.
Last, Figure 8 presents a comparison of our proposed model with transmit beamformerbased technique [39] for the analysis of the outage probability of user-B in a similar network configuration. The main difference between the proposed work and the work in [39] is the general channel model. The physical layer security in MISO-NOMA system in the presence of an eavesdropper and secure communication criteria for the legitimate users is discussed in our work, which was not addressed in [39]. It is observed in Figure 8 that the proposed method with optimization performs better as compared to the work in [39]. However, without optimization, the proposed method shows higher outage probability of user-B as compared to the technique in [39]. This is due to the presence of Eve, and although Eve is also present in case of optimization in the proposed model, our optimization algorithm degrades the outage probability of Eve and improves the outage probability of user-B.

Conclusions
In this paper, we optimized the beamforming vector in downlink MISO NOMA systems in order to achieve lowest outage probability of cell-edge user. Specifically, we first provided the exact closed-form expression of outage probability of near-user, far-user, and eavesdropper under the parameters including the power allocation coefficients, trans-mit correlation, time switching/power splitting factors, and transmit antenna diversity. In addition, an optimization problem was developed for the case of two users, and an eavesdropper, which was then solved via the exhaustive search method. A secure MISO-NOMA communication is achieved by obtaining the best minimum outage probability of cell-edge user and performance degradation of an eavesdropper. Analytical results are validated by Monte Carlo simulation results, and antenna diversity at the transmitter is used to make significant performance gains. This work can be further expanded for multiple near-user MISO-NOMA systems acting as relays and by performing optimal analysis on power allocation coefficients to pick a best near-user to enhance overall performance of the system. Furthermore, the secrecy performance analysis of a MIMO-NOMA and massive MIMO-NOMA network in the presence of a multiple-antenna eavesdropper can be useful extensions of this work.

Conflicts of Interest:
The authors declare no conflict of interest.

Abbreviations
The following abbreviations are used in this manuscript:

Appendix A
The beamformer vectors are linearly dependent, so (14) can be written as Now, plugging (3), (5), and (12) in (A1), we get where linearly dependent beamformers are as a result written in form of matrices U,Ũ, V, andṼ. Now, to solve P 1 , we utilize quadratic formulation and u(x), where u(x) is the unit step function, i.e., u(x) = 1 2π ∞ −∞ e x(jω+β) jω+β dω; β > 0. The presence of u(x) helps in the tractability of analysis in this work. Therefore, the closed-form expression of P 1 is written, by using (13) from in [39], as Now, to solve P 2 , same approach is opted as (A3) and written as follows: Next, to solve P 3 , the link between user-A and user-B follows the exponential distribution. By utilizing the change in variable approach as in (40) from in [39] and generalized incomplete gamma function [45], the exact closed-form expression of P 3 is written as P 3 = Γ 1, γ th (a 1 − a 2 γ th )||w|| 2 ; , while l AB is the distance between user-A to user-B. Moreover, λ iA and λ iB are the eigenvalues of user-A and user-B obtained through their respective correlation matrices. Finally, using (A3)-(A5) in (A2), we obtain the exact closed-form expression written as (15).