You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

9 October 2019

Secure Beamforming in 5G-Based Cognitive Radio Network

and
Department of Electronics and Communication Engineering, PSG College of Technology, Peelamedu, Coimbatore 641004, India
*
Authors to whom correspondence should be addressed.

Abstract

Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intended to access the primary channels. At the same time, the primary user also returns to the channel before the SUs access ends. This similar way of accessing the primary channel will cause interference between the users. Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive radio network. The simulation result provides better evidence for the performance of the proposed technique.

1. Introduction

The future technique of 5G-based cognitive radio network (CRN) has high throughput and low latency with a wide range of connectivity. This target was achieved by the non-orthogonal multiple-access (NOMA) technique to reuse the resources in spatial [] and temporal varieties. A NOMA uses the distinct channel gains within the same cell and assigns the same frequency to a number of users. A NOMA is combined with a multiple-input multiple-output (MIMO) system [] to obtain a high diversity and a high spectral efficiency in a multi-cell substructure. A serious interference will be caused due to the high spectral efficiency in NOMA network. Thus, security is needed for the design of communication systems in the MIMO-NOMA framework [,]. The transmitting and receiving beamforming techniques were used in [] to reduce the inter- and intra-cell interferences. The eavesdroppers may secretly listen to the channel by simply ignoring the receiving beamformer technique. The signal alignment and the receiving beamformer methods were used in [,] to control the interference and raise the total throughput. The greedy algorithm and a convex approximation method were used in [] to solve the scheduling problem. A two-stage transmission [] scheme was used in the cooperative NOMA system model. During the first stage, the source transmits the code symbol to the relay and the destination. At the last stage, the relay decodes and forwards a new code symbol to the destination with the corresponding power allocation factor. The artificial noise method was used in [] to secure the transmission in the MIMO-NOMA system model. The convex optimization problem was solved in [] for the better MIMO-NOMA network. In [], an investigation was based on the joint subcarrier (SC) assignment and the power allocation problem in NOMA features in the presence of eavesdroppers. The cooperative jamming (CJ) technique and the smart sensor protocol algorithm (SSPA) were implemented in the security of the better communication link. Then, the overall energy efficiency was increased. The relay-based downlink NOMA network contains the physical layer security (PLS) and was considered in []. The receiver beamforming technique used in [,,,,] does not provide a beneficial assurance for the system security in a multi-cell network.
In this article, the proposed beamforming technique was compared with the existing zero forcing technique, which was used in []. The simulation results provide better evidence for the enhancement of the proposed method.

3. System Model

3.1. Secure Beamforming in 5G-Based CRN

Beamforming [] is a fast and an accurate process that is properly focused on the target user equipment (UE). The process of beamforming is demonstrated Figure 1. The process, in which a UE has a rapid movement, is not an easy task. It is able to adapt the radiation model of an antenna to a certain structure. It steers a power in a specific direction toward a user. This is the actual process of beamforming, which is shown in Figure 2.
Figure 1. Beamforming of user qeuipment (UE).
Figure 2. Beamforming toward a user.
Massive MIMO was examined as a part of beamforming. The CSI is a collection of spatial transfer functions between each antenna and a user terminal. The spatial information is found in the matrix (G), as shown in Figure 3.
Figure 3. Traditional beamforming.
The research focuses on securing the CSI by aligning the signal matrix after applying the proposed method to reduce an interference in the channel matrix.

3.2. Proposed Beamformer

A cellular MIMO-NOMA-based CRN has two cells. Its BS with L clusters is shown in Figure 4 []. Each cluster has two users: One is the primary user (PU) and the other is a secondary user (SU). The BS and the two users of each cluster contains M and N antennas, respectively. Then, c∈{A,B} indicates a cell and l ∈ L ≝ {1, 2, …, L} represents the cluster, and u ∈ {pu, su} denotes each user, respectively. The radius of a cell is ro, in which the BS is situated at the center of an each cell. In this model, a cell is divided into two discs, namely D1 and D2. They are the inner and outer discs in a cell. The D1 contains the radius of ri and D2 contains the radius ro, which lies within the circle of radius ri. This model is easily extended for multi-cell framework [] in any pairing order [].
Figure 4. A two-cell network of multiple-input-multiple-output0non-orthogonal multiple access (MIMO-NOMA)-based cognitive radio network (CRN).
The channel gain of an uth users on a lth cluster of cth cell is given by [],
G u l , c = F u l , c P ( d u l , c )
where F u l , c indicates a Rayleigh fading channel, which means ( σ u l , c ) 2 is for variance calculations. For N x M dimensions, the channel gain matrices are given as G u l , c .
Let P ( d u l , c ) = ( d u l , c ) υ indicate a large-scale path loss and υ denote the path loss exponent. d u l , c specifies the distance between the BS and a uth user. Likewise, the inter-cell channel-gain for the PU in the lth cluster of a cth cell is denoted by I pu l , c .
The licensed PUs need to be served first in the presence of a several SUs, but they are shared at the same time and frequency. The SU and the PU data in a cluster are retrieved using a SIC. The existing (L−1) clusters are denoted as an intruder in the fundamental clusters. In a multi-cell framework, all the PUs in a cell are specified as an intruder by another cell user. This does not occur in the case of SUs, which are within the same cell. This says that each of the clusters need to be secured from all other cell clusters, as well as in the PUs. This is solved by a proposed technique in the transmitter. The proposed technique consists of an incorporation of a ZFBF and an MMSE method. Nevertheless, the proposed technique implementation in the BS is not possible. This is because of the number of antennas in the BS is lesser than the entire number of antennas present in the clusters. This is also solved by a proposed technique.

3.3. Proposed Technique in Cascaded Transmission of MIMO-NOMA Network

The cascaded transmission of this approach is used in MIMO-NOMA-based CRN for the secure communication in the multi-cell framework. The intruders will make an attempt to secretly listen to the channel information. The BS does not want the intruders to prevent the data using receiving beamformers. The proposed technique is applied at the BS for the determination of an information leakage within the same and the adjacent cells. The received signal of the PU and the SU in the lth cluster of a cell A is expressed as []
R su l , A = G su l ,   A m = 1 L v m , A + w su l , A
R pu l , A = G pu l ,   A m = 1 L v m , A + I pu l , A m = 1 L v m ,   B + w pu l , A
Let v l ,   A be the M × 1 superposition signal vector for the lth cluster of the cell A. Note that v l , A ∊ ℂMx1 is the transmitting proposed vector and w pu l , A , w su l , A is the AWGN process. It will be present in the receiver side of the PU and SU of the lth cluster in the cell A. Assume l ∈ L ≝ {1, 2, …, L}.
The secrecy Rate of a PU and a SU is derived as
S su l , A [ log 2 ( 1 + ψ | G su l , A v l , A | 2 ) max m , m l log 2 ( 1 + ψ | G su m , A v m , A | 2 ) ] +
S pu l , A [ log 2 ( 1 + ψ | G pu l , A v l , A | 2 ) Y 1 Y 2 ] +
where ψ is the signal to noise ratio (SNR) transmission at the BS. The idea of [e]+ is defined as max(0,e). Y 1 max m , m l log 2 ( 1 + ψ | G pu m , A v m , A | 2 ) and Y 2 max m log 2 ( 1 + ψ | I pu m , A v m , B | 2 ) . In Equations (4) and (5), the second term on the right hand side (RHS) contains the formulation of an information leakage for the lth cluster in the same cell. In Equation (5), the third term on the RHS contains the formulation of an information leakage for the lth cluster in the neighboring cell. The information leakage will be overcome by applying the proposed technique in the BS, by knowing that the BS has a CSI for all the users. The CSI is evaluated at the receiving end and it responds to the BS by a feedback channel.
Consider a proposed technique in the BS within the same cell without applying a signal alignment in the interfering channel matrix. A proposed technique is used to secure the data in every cluster within the same cell and in the neighboring cell. A proposed technique of v l , A needs to be designed at the BS as a non-trivial solution in Equation (6). A non-trivial solution will exist if M ≥ 2N (L−1). So, there must be a large number of antennas in the BS. The proposed method will serve as ( M + 1 ) / 3 in a multi-cell framework. This indicates that the number of antennas in the BS will be larger than the number of clusters. Therefore, this will reduce the overall throughput. This problem will be overcome by an alignment matrix Q A MxS . This will align the interference channel matrix in a cell for a different dimension. Then v l , A = Q A V l , A where V l , A Sx 1 is a proposed vector for the lth cluster in a cell A. The BS will perform a precoding in an aligned interference channel matrix. The precoding must be in NxM dimensions for the better generation of a non-trivial solutions. So, there are no limitations in the number of antennas that is used in the BS. At the same time, the number of clusters is restricted by the antenna in the BS is also eliminated. The Equation (6) is derived by applying an alignment matrix Q A . The area of an aligned channel matrix is 2N(L−1) × A, which is derived from the Equation (7). The ‘S’ value is nominated to get a non-trivial solution of an Equation (7). The alignment matrix Q A is constituted as Q 2 A Q 1 A where Q 2 A is initialized to align the interference channel matrix in a neighboring cell. Then, Q 1 A is a proposed transmitting vector to overcome the data leakage in the neighboring cell. The proposed transmitting vector Q 1 A for the neighboring cell will satisfy the following term as:
[ G pu 1 , A   G su 1 , A     G pu l 1 , A   G su l 1 , A   G pu l + 1 , A   G su l + 1 , A     G pu L , A   G su L , A ] G v l , A = 0
[ G pu 1 , A Q A   G su 1 , A Q A     G pu l 1 , A Q A   G su l 1 , A Q A   G pu l + 1 , A Q A   G su l + 1 , A Q A     G pu L , A Q A   G su L , A Q A ] G V l , A = 0
[ H pu 1 , B Q 2 A   H pu 2 , B Q 2 A     H pu L , B Q 2 A ] T Q 1 A = 0
where, H pu L , B Q A V l , A span   ( H pu L , B )   Q A V l , A
A non-trivial solution of Q 1 A PxS ,   Q 2 A MxP is aligned with the interference channel matrix in a neighboring cell as P > NL for the Equation (8). The solution is given as []:
X 1 A = span   { H ¯ G ( H ¯ H ¯ G + β I d ) 1 H ¯ }
where H ¯ [ H pu 1 , B Q 2 A   H pu 2 , B Q 2 A     H pu L , B Q 2 A ] T . The condition of M>N is unrelated for a non-trivial solution of Q 1 A in an Equation (9). The regularization term of β contains a normalized mean square error (NMSE) method of an optimization that allows the balance between the noise covariance and the transmit power. Let I d be the identity matrix of NxM dimensions.
Let V l , A represent the determination of a non-trivial solutions for the Equation (7). Assuming g p u L , A G p u L , A Q A and g s u L , A G s u L , A Q A in Equation (7), Equation (10) is as follows:
G ¯ [ g pu 1 , A   g su 1 , A     g pu l 1 , A   g su l 1 , A   g pu l + 1 , A   g su l + 1 , A     g pu L , A   g su L , A ] T
Then, the solution is given as
V l , A = span   { G ¯ G ( G ¯ G ¯ G + β I ) 1 G ¯ }
The MMSE method, along with the transmitting ZFBF approach, is spanned to obtain a proposed solution in the Equation (11). The regularization term of β contains a stability in the transmit power and a noise variance [] which is denoted as C x and C v . Then, the term β for a cell A is expressed as
β I = C x MC v S I
Assume S be the data symbol that contains a s pu l , A , s su l , A for the cluster l of cell A. Let C x be the transmit power and is expressed as [],
C x = E [ ω ω G ] [ 1 L l = 1 L ω l , u ω G l , u ] I d NxM
Then, ω be the power allocation coefficient that contains a ω pu l , A , ω su l , A for the PUs and the SUs and is assumed as ω pu l , A + ω su l , A = 1 .
Let l be the number of clusters, be the Hadamard product, and I d NxM be the N×xM identity matrix. Equation (13) assumes that the signal source from different positions are uncorrelated. Let C v be the noise covariance matrix, expressed as
C v = E [ ww G ] σ w 2 I d NxM
where σ w 2 is a variance of the thermal noise and is assumed as additive white Gaussian noise (AWGN). The MMSE strikes the balance of obtaining a maximum signal amplification and then reducing the interference. This view that the signal processing complexity will help to obtain a good solution.
In the proposed method, the re-iteration of a transmit power C x has taken place in the MMSE iterative solutions []. The iteration is declared through a data symbol.
C x ( s 1 ) = [ 1 L l = 1 L ω l ω G l ] I d NxM
The iteration has been terminated by the NMSE solutions and is expressed as []
C x | C x ( s 1 ) = ϑ s = 1 u u = pu su [ l = 1 L ω ^ l , u ( s ) ω ^ l , u ( s 1 ) 2 l = 1 L ω ^ l , u ( s 1 ) 2 ] I d NxM
So, instead of the Equation (13), we apply an iterated transmitted power [] as shown in the above Equation (16) for the better MMSE solutions. Therefore, the proposed technique obtains an enhanced solution compared with the existing method.
The above proposed solution is situated at the BS and the derivation for the secrecy rate is calculated as follows []:
S su l , A log 2 ( 1 + ψ | G su l , A v l , A | 2 )
S pu l , A log 2 ( 1 + ψ | G pu l , A v l , A | 2 )
The total secrecy rate in a cluster is given by
S total l , A = S pu l , A +   S su l , A
The proposed method in an Equation (16) will convert a total secrecy rate of a cluster to the total throughput of a cluster.
The BER from the above formulation is calculated as
BER u = 1 2 Q ( 2 E [ | v l ,   A | ] 2 w u l , A )
where Q (.) is the Gaussian Q-function and is defined as
Q ( W ) = 1 2 π w e   z 2 2 d z
The channel capacity is also greatly increased by the proposed method and is formulated as
C u = C h B l o g 2 ( 1 + v l ,   A w u l , A ChB )
where B is the channel bandwidth, which is taken at 1 MHz.
The throughput of the channel can be expressed as
T u = ψ [ | G u l , A v l ,   A | ] 2
The proposed technique is skillful in allocating the multi-cells and multi-clusters in which the number of antennas is not limited at the BS.

3.4. Secrecy Outage Probability

The secrecy outage probability of the PU and the SU in a cluster was analyzed in consent with the CR power allocation policy. This says that the PU permits the SU to reuse the spectrum by assuring a PUs quality of service. The PU will obtain a target data rate of D pu l ,   A by modifying the power allocation coefficient of ω p u l , A . Then, the limitation is given by
ψ | G pu l , A v l , A | 2 ω pu l , A ψ | G pu l , A v l , A | 2 ω su l , A +   1 >   ε pu l , A
where ε pu l , A = 2 D pu l ,   A 1 . This gives a following alternative as
ω su l , A = max ( 0 ,   ψ | G pu l , A v l , A | 2 ε pu l , A ( 1 + ε pu l , A ) ψ | G pu l , A v l , A | 2 )
The target data rate is not achieved, even when the full power is assigned to it. Thus, the secrecy outage probability of the PU and the SU is implied as follows:
SOP pu l , A Pr [ log 2 ( 1 + ψ | G pu l , A v l , A | 2 ) < D pu l ,   A ]
SOP su l , A Pr [ log 2 ( 1 + ψ | G su l , A v l , A | 2 ) < D su l ,   A ]
Let the asymptotic expression of channel gain and proposed vector will be taken as
| G pu l , A v l , A | 2 ( N ( S 1 ) ,   ( σ p u l , A ) 2 )
| G su l , A v l , A | 2 ( N ( S 1 ) ,   ( σ s u l , A ) 2 )
Then, applying the gamma function in the above assumption is given [] as
1 ( N ( S 1 ) ) γ ( N ( S 1 ) ,   J 3 ( σ p u k , A ) 2 ) 1 q ( r ψ ) q f = 1 6 θ f f
Let q ( N ( S 1 ) ) and r J 3 ( σ p u l , A ) 2 , where γ ( q ,   r ) 0 r φ q 1 exp ( φ ) d φ denotes the lower incomplete gamma function as φ = f r 6 ψ and θ f = ( i 6 ) a 1 , f = e f r 6 ψ . The asymptotic expression of Equation (12) is obtained by applying the Simpson’s 1/3 numerical integration method []. Here, J 3 ε p u l , A ψ ω p u l , A and | G pu l , A v l , A | 2 Z ( N ( S 1 ) ,   ( σ p u l , A ) 2 ) . The secrecy outage at PU is same as the conventional orthogonal multiple-access systems []. Then, the secrecy outage at SU is found in three different scenarios as: Event T1 for ω s u k , A = 0 , Event T2 for ω s u l , A > 0 where the SU is unable to decode the message for both the PU and the SU [], and Event T3 for ω s u l , A > 0 where the SU is unable to decode its own message but it is able to decode the message for PU []. The probability of a T1 is expressed as
P ( T 1 ) = P [ ψ Z ε p u l , A < 0 ] 1 q ( r ψ ) q f = 1 6 θ f f
The probability of T2 is found as P ( T 2 ) = 0 . Then, the probability of T3 is calculated as []
P ( T 3 ) = P [ X ψ Z ε p u l , A ( 1 + ε p u l , A ) Z < ε s u l , A ,   Z > ε p u l , A ψ ]
where D s u k , A is the target data rate of SU and ε s u l , A D s u l , A 1 and | G su l , A v l , A | 2 X ψ ( N ( S 1 ) , ( σ s u l , A ) 2 ) . Then, P(E3) [] will be
P ( T 3 ) = 0 ε p u l , A ψ J 4 f Z ( z ) f X ( x ) d z d x
where, J 4 ε s u l , A ( 1 + ε p u l , A ) x y ψ ε p u l , A . Combining P(E1), P(E2), and P(E3), one can obtain the asymptotic expression for the secrecy outage probability of SU as in [] as
S O P s u k , A 1 q ( r ψ ) q f = 1 6 θ i i + ( ε p u k , A ψ ) q [ 1 + J 5 ψ ]
where
J 5 = ( ε s u k , A ( 1 + ε p u k , A ) ( σ p u k , A ) 2 ) ( σ p u k , A ) 2 ( q 1 ) q
The above equation was taken from the reference [] and was applied here to obtain the analytical solutions for both the PU and the SUs. The asymptotic outage performance of the PU and the SU is shown in the simulation results.

4. Numerical Evaluation

The numerical rating of the proposed method was conducted in this section and the results were compared with the existing cascaded ZFBF techniques []. A proposed technique has a greater performance than the existing technique. The simulation parameter, which is used in the proposed technique, is shown in Table 1.
Table 1. Simulation parameters.
This article was implemented using the software named ‘Matlab’ (The MathWorks, Inc., Natick, MA, USA) of version R2017b in the platform of 64-bit version in the x86 instruction set.
In Figure 5, the secrecy rate of the PU and the SU is plotted to the transmitting SNR. The proposed method was also compared with the existing method of coordinated beamforming (CoBF) technique [] and the cascading ZFBF techniques [], respectively. The secrecy rate of the proposed method is increased with the SNR and its performances are higher than the existing methods. The CoBF technique is implemented in both the transmitting and receiving beamformers. The interference channel matrix is aligned by the transmitting beamforming technique and nullified by the receiving beamformer. Likewise, the cascaded ZFBF technique performs better than the CoBF technique [], but the proposed performance provides a better result compared with the cascaded ZFBF method []. Nevertheless, an eavesdropper obstructs the interference in which the receiving beamformer is not used. The interference alignment and the proposed method are applied at the BS. Therefore, the secrecy rate increases with the SNR.
Figure 5. Secrecy rate.
The secrecy outage probability for the PU and the SU estimates for the different target data rate as, D pu l ,   A and D su l ,   A . Then, the secrecy outage probability of the SU is SOP su l , A , which is higher than the secrecy outage probability of the PU as, SOP pu l , A . The probability of the secrecy outage will be increased, as the target data rate has a larger value.
The output results, which are shown in Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9, respectively, show the effectiveness of the proposed method.
Figure 6. Secrecy outage probability.
Figure 7. Bit error rate of the ZFBF and the proposed technique.
Figure 8. Channel capacity of zero forcing beamforming (ZFBF) and the proposed technique.
Figure 9. Throughput of the ZFBF and the proposed technique.

5. Motivation and Contribution of the Article

This article clearly described the proposed technique, which is one of the best beamforming techniques to reduce the interference in the MIMO-NOMA-based CRN. The MMSE method, along with the NMSE iterations, were used to limit the power transmission for the better exposure of the proposed performance. The number of antennas at the BS was not limited because the signal alignment matrix was used at the BS to align the channel matrix. The motivation of an article was to enhance the secure transmission of the data packets by reducing the interference as effectively as possible. The simulation results show the effectiveness of the proposed technique.

6. Discussion

This article shows the highlighted secrecy rate and effectively reduces the outage probability compared with the previous results []. The proposed technique in the article was used in securing the beamforming in the 5G technology without causing interference during a data transmission between a cluster from one cell to another cell. The findings of the proposed method are oriented to the MMSE technique, which belongs to one of the beamforming techniques in the MIMO. Here, the proposed MMSE iterative technique was used to enhance the secrecy rate by cancelling the interference as possible.
The proposed method normally uses the technique that is oriented to MMSE will enhance the total secrecy rate of the system than the preceding method of the ZFBF []. The SOP and BER were also reduced. The capacity and throughput were significantly increased in the proposed method, which is shown in Simulation results. Therefore, this new beamforming technique shows the performance of their robustness, which may be used in another part of technology, like Internet of Things (IoT)-based CRN, to secure the communication as possible.

7. Conclusions

In this paper, a downlink beamforming technique was proposed for the secure communication in a two-cell MIMO-NOMA-based CRN. There were no other limitations for the number of antennas at the BS. This was achieved by the signal alignment matrix that aligns the interference channel matrix, before the implementation of the proposed method. The proposed technique is very effective in enlarging the total secrecy rate of the CRN systems.
For the future work, the proposed method may be used in IoT-based cognitive radio networks. The IoT users in the CRN are sensed as per the RF spectrum slot to give the logistic and disaster response. So, there is a need for the accurate spectrum decision framework in 5G engineering.
The spectrum decision, which is taken by an unlicensed SUs of a CRN, holds an important role in CR-based IoT in 5G network. The proposed method can be very useful for taking the optimistic spectrum decision in IoT-based cognitive radio networks.

Author Contributions

Conceptualization, H.S.M.A.; methodology, H.S.M.A.; formal analysis, H.S.M.A. and T.L.; investigation, H.S.M.A. and T.L.; data curation, H.S.M.A.; writing-original draft preparation, H.S.M.A.; writing-review and editing, H.S.M.A. and T.L.; software, H.S.M.A. and T.L.; supervision, T.L.; project administration, H.S.M.A. and T.L.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

CRNcognitive radio network
NOMAnon-orthogonal multiple access
MIMOmultiple-input-multiple-output
5Gfifth generation
SUssecondary users
PUsprimary users
SCsubcarrier
CJcooperative jamming
SSPAsmart sensor protocol algorithm
PLSphysical layer security
ZFBFzero forcing beamforming
BFbeamforming
CSTNcognitive satellite terrestrial network
SDAsoftware defined architecture
MISOME-SWIPTmultiple input, single output multiple-eavesdropper simultaneous wireless information and power transferring
SEEsecrecy energy efficiency
CSIchannel state information
UPAuniform planar array
BSbase station
AoAangle of arrival
Eveseavesdropper
SRsecrecy rate
IPFiterative penalty function
MISOmulti-input single-output
STsecondary transmitter
SRsecondary receiver
PSpower splitting
SDRsoftware defined radio
PSOparticle swarm optimization
EPSequal power splitting
MMSEminimum mean square error
NMSEnormalized mean square error
MLmaximum likelihood
SICsuccessive interference cancellation
OTPopportunistic transmission protocol
MUDmultiuser detection
MC DS-CDMAmulticarrier direct-sequence code-division multiple access
ICinterference cancellation
UEuser equipment
AWGNadditive white Gaussian noise
CoBFcoordinated beamforming
SNRsignal to noise ratio
RFradio frequency
IoTInternet of Things
SOPsecrecy outage probability

References

  1. Zeng, M.; Yadav, A.; Dobre, O.A.; Tsiropoulos, G.I.; Poor, H.V. Capacity comparison between MIMO-NOMA and MIMO-OMA with multiple users in a cluster. IEEE J. Sel. Areas Commun. 2017, 35, 2413–2424. [Google Scholar] [CrossRef]
  2. Islam, S.M.R.; Zeng, M.; Dobre, O.A.; Kwak, K.S. Resource allocation for downlink NOMA systems: Key techniques and open issues. IEEE Wirel. Commun. 2018, 25, 40–47. [Google Scholar] [CrossRef]
  3. Shin, W.; Vaezi, M.; Lee, B.; Love, D.J.; Lee, J.; Poor, H.V. Coordinated beamforming for multi-cell MIMO-NOMA. IEEE Commun. Lett. 2017, 21, 84–87. [Google Scholar] [CrossRef]
  4. Ding, Z.; Adachi, F.; Poor, H.V. The application of MIMO to nonorthogonal multiple access. IEEE Trans. Wirel. Commun. 2016, 15, 537–552. [Google Scholar] [CrossRef]
  5. Ding, Z.; Schober, R.; Poor, H.V. A general MIMO framework for NOMA downlink and uplink transmission based on signal alignment. IEEE Trans. Wirel. Commun. 2016, 15, 4438–4454. [Google Scholar] [CrossRef]
  6. Xu, L.; Nallanathan, A.; Pan, X.; Yang, J.; Liao, W. Security-Aware Resource Allocation with Delay Constraint for NOMA-Based Cognitive Radio Network. IEEE Trans. Inf. Forensics Secur. 2018, 13, 366–376. [Google Scholar] [CrossRef]
  7. Duan, W.; Jiang, X.Q.; Wen, M.; Wang, J.; Zhang, G. Two-Stage Superposed Transmission for Cooperative Noma Systems. IEEE Access 2018, 6, 3920–3931. [Google Scholar] [CrossRef]
  8. Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
  9. Jiang, M.; Li, Y.; Zhang, Q.; Li, Q.; Qin, J. Secure beamforming in downlink MIMO nonorthogonal multiple access networks. IEEE Signal Process. Lett. 2017, 24, 1852–1856. [Google Scholar] [CrossRef]
  10. Zhang, H.; Yang, N.; Long, K.; Pan, M.; Karagiannidis, G.K.; Leung, V.C. Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation. IEEE J. Sel. Areas Commun. 2018, 36, 1441–1452. [Google Scholar] [CrossRef]
  11. Chen, J.; Yang, L.; Alouini, M.S. Physical layer security for cooperative NOMA systems. IEEE Trans. Veh. Technol. 2018, 67, 4645–4649. [Google Scholar] [CrossRef]
  12. Nibedita, N.; Sudhan, M.; Hsiao-Chun, W. Secure Beamforming for MIMO-NOMA Based Cognitive Radio Network. IEEE Commun. Lett. 2018, 22, 1708–1711. [Google Scholar]
  13. Lin, M.; Lin, Z.; Zhu, W.P.; Wang, J.B. Joint Beamforming for Secure Communication in Cognitive Satellite Terrestrial Networks. IEEE J. Sel. Areas Commun. 2018, 36, 1017–1029. [Google Scholar] [CrossRef]
  14. Dong, Y.; Hossaini, M.J.; Cheng, J.; Leung, V.C. Robust Energy Efficient Beamforming in MISOME-SWIPT Systems with Proportional Secrecy Rate. IEEE J. Sel. Areas Commun. 2018, 37, 202–215. [Google Scholar] [CrossRef]
  15. Lin, Z.; Lin, M.; Wang, J.B.; Huang, Y.; Zhu, W.P. Robust Secure Beamforming for 5G Cellular Networks Coexisting with Satellite Networks. IEEE J. Sel. Areas Commun. 2018, 36, 932–945. [Google Scholar] [CrossRef]
  16. Pham, V.T.; Koo, I. Optimal Multiuser MISO Beamforming for Power-Splitting SWIPT Cognitive Radio Networks. IEEE Access 2017, 5, 14141–14153. [Google Scholar]
  17. Irfan, A.; Hedi, K.; Adnan, S.; Ahmed, M.; Kwang, S.K.; Eli De, P.; Ingrid, M. A Survey on Hybrid Beamforming Techniques in 5G: Architecture and System Model Perspectives. IEEE Commun. Surv. Tutor. 2018, 20, 3060–3097. [Google Scholar]
  18. Deepanramkumar, P.; Karuppiah, M.; Hafizul, I.S.K.; Mohammad, S.O. Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES. Int. J. Commun. Syst. 2018, 31, e3805. [Google Scholar]
  19. Ehab, A.; Mahamod, I.; Rosdiadee, N.; Nor, F.A. Beamforming techniques for massive MIMO systems in 5G: Overview, classification, and trends for future research. Front. Inf. Technol. Electron. Eng. 2017, 18, 753–772. [Google Scholar]
  20. Ju, M.; Qian, J.; Li, Y.; Tan, G.; Li, X. Comparison of multiuser MIMO systems with MF, ZF and MMSE receivers. In Proceedings of the IEEE Third International Conference on Information Science and Technology (ICIST), Yangzhou, China, 23–25 March 2013. [Google Scholar]
  21. Lin, H.; Shin, W.Y. Non-Orthogonal Random Access in MIMO Cognitive Radio Networks: Beamforming, Power Allocation, and Opportunistic Transmission. PLoS ONE 2017, 12, e0169902. [Google Scholar] [CrossRef]
  22. Sun, F.; de Elisabeth, C. Leakage-Based MMSE Beamforming Design for a MIMO Interference Channel. IEEE Signal Process. Lett. 2012, 19, 368–371. [Google Scholar] [CrossRef]
  23. Yang, L.L.; Wang, L.C. Zero-Forcing and Minimum Mean-Square Error Multiuser Detection in Generalized Multicarrier DS-CDMA Systems for Cognitive Radio. EURASIP J. Wirel. Commun. Netw. 2008, 2008, 541410. [Google Scholar] [CrossRef]
  24. Masterson, C. Massive MIMO and Beamforming: The Signal Processing Behind the 5G Buzzwords. Analog Dialogue 2017, 51, 10. [Google Scholar]
  25. Yang, Z.; Ding, Z.; Fan, P.; Al-Dhahir, N. A general power allocation scheme to guarantee quality of service in downlink and uplink NOMA systems. IEEE Trans. Wirel. Commun. 2016, 15, 7244–7257. [Google Scholar] [CrossRef]
  26. Eiichi, Y.; Tomoo, U.; Zen, K.; Satoru, Y.; Takeshi, M.; Fumihiko, M.; Masakazu, W. MMSE Beam Forming on Fast-Scanning Phased Array Weather Radar. IEEE Trans. Geosci. Remote Sens. 2013, 51, 3077–3088. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.