Next Article in Journal
Experimental Study on Plasma Flow Control of Symmetric Flying Wing Based on Two Kinds of Scaling Models
Previous Article in Journal
Symmetries in the Quantum Rabi Model

Symmetry 2019, 11(10), 1260;

Secure Beamforming in 5G-Based Cognitive Radio Network
Department of Electronics and Communication Engineering, PSG College of Technology, Peelamedu, Coimbatore 641004, India
Authors to whom correspondence should be addressed.
Received: 14 August 2019 / Accepted: 18 September 2019 / Published: 9 October 2019


Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intended to access the primary channels. At the same time, the primary user also returns to the channel before the SUs access ends. This similar way of accessing the primary channel will cause interference between the users. Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive radio network. The simulation result provides better evidence for the performance of the proposed technique.
cognitive radio network; non-orthogonal multiple-access; multiple-input multiple-output; 5G engineering

1. Introduction

The future technique of 5G-based cognitive radio network (CRN) has high throughput and low latency with a wide range of connectivity. This target was achieved by the non-orthogonal multiple-access (NOMA) technique to reuse the resources in spatial [1] and temporal varieties. A NOMA uses the distinct channel gains within the same cell and assigns the same frequency to a number of users. A NOMA is combined with a multiple-input multiple-output (MIMO) system [2] to obtain a high diversity and a high spectral efficiency in a multi-cell substructure. A serious interference will be caused due to the high spectral efficiency in NOMA network. Thus, security is needed for the design of communication systems in the MIMO-NOMA framework [1,2]. The transmitting and receiving beamforming techniques were used in [3] to reduce the inter- and intra-cell interferences. The eavesdroppers may secretly listen to the channel by simply ignoring the receiving beamformer technique. The signal alignment and the receiving beamformer methods were used in [4,5] to control the interference and raise the total throughput. The greedy algorithm and a convex approximation method were used in [6] to solve the scheduling problem. A two-stage transmission [7] scheme was used in the cooperative NOMA system model. During the first stage, the source transmits the code symbol to the relay and the destination. At the last stage, the relay decodes and forwards a new code symbol to the destination with the corresponding power allocation factor. The artificial noise method was used in [8] to secure the transmission in the MIMO-NOMA system model. The convex optimization problem was solved in [9] for the better MIMO-NOMA network. In [10], an investigation was based on the joint subcarrier (SC) assignment and the power allocation problem in NOMA features in the presence of eavesdroppers. The cooperative jamming (CJ) technique and the smart sensor protocol algorithm (SSPA) were implemented in the security of the better communication link. Then, the overall energy efficiency was increased. The relay-based downlink NOMA network contains the physical layer security (PLS) and was considered in [11]. The receiver beamforming technique used in [3,4,5,8,9] does not provide a beneficial assurance for the system security in a multi-cell network.
In this article, the proposed beamforming technique was compared with the existing zero forcing technique, which was used in [12]. The simulation results provide better evidence for the enhancement of the proposed method.

2. Related Work and Contributions

2.1. Zero-Forcing Beamforming (ZFBF) Related Works

A downlink cascaded transmitting ZFBF technique [12] was proposed to secure the communications in a two-cell MIMO-NOMA-based CRN. This technique was combined with the proposed method for better security in the MIMO-NOMA network. It should be noted that this article uses an existing method in which the proposed technique has improved greatly.
In [13], a beamforming (BF) scheme was proposed to use the interference as a green source for the enhancement of PLS in the satellite network. The ZFBF technique was used as a sub-method for the secure communication in the cognitive satellite terrestrial network (CSTN) with a sphere decoder algorithm (SDA).
The joint design of the beamforming vector and an artificial noise covariance matrix was investigated [14] for the multiple-input-single-output-multiple eavesdropper simultaneous wireless information and power transfer (MISOME-SWIPT) systems. In the MISOME-SWIPT system, the base station (BS) sends an information signal to the honest user equipment and transmits a jamming signal to the eavesdropper. A secret energy efficiency (SEE) maximization problem was proposed for the MISOME-SWIPT system with an imperfect channel state information (CSI). A ZFBF method was used in the MISOME-SWIPT system to perform the task, but did not show better improvement than SEE.
In [15], a uniform planar array (UPA) at the BS was applied for the robust security of 5G cellular networks coexisting with a satellite network. Then, a known imperfect angle of arrival (AoA)-based CSI was assumed of a multiple Eves. The constrained optimization problem was formulated to maximize the secrecy rate (SR) of the cellular user under the limitations of the transmit power at the BS. Two robust BF methods were proposed to solve the complex optimization problem for both an uncoordinated and a coordinated Eves. The authors then converted the non-convex problem into a convex one, and further proposed an iterative penalty function (IPF)-based algorithm to obtain the optimal beamforming weight vectors. ZFBF methods were also used as one of the methods to solve the same problem, but the performance was not higher than that of an IPF-based algorithm.
In [16], an optimal multiuser multiple-input single-output (MISO) beamforming for power splitting SWIPT CRN was studied. A multi-antenna secondary trasnsmitter (ST) sent a data stream to multiple single antenna single receivers (SRs) equipped with a power splitting (PS) structure for an information decoding and an energy harvesting. A non-convex problem occurred in this structure, which was solved by an optimal method. First, the problem with fixed PS ratios was solved using the software-defined ratio (SDR) technique and the optimal PS ratios were found using the particle swarm optimization (PSO) method. The overall EPS technique was used to solve the problem, which showed a better performance than all other methods. A ZFBF technique was also proposed to solve the problem. It showed a better performance than the optimal methods, but a slightly worse performance compared with the equal power splitting (EPS) method.

2.2. Mimimum Mean Squared Error (MMSE) Related Works

In [17], the authors surveyed the hybrid beamforming methods for the Massive MIMO communications in the context of a hybrid transceiver. This method also included an MMSE regularization for a hybrid precoding in the mmWave massive MIMO systems.
An MMSE MIMO-orthogonal frequency division multiplexing (OFDM) detector was proposed in [18] to balance an error performance and the spectral efficiency. It used maximum likelihood (ML), simple MMSE, and ordered successive interference cancellation (SIC) methods. This method was used in 5G CRN in massive MIMO to develop a secure transmission and to mitigate an interference and a peak-to-average power ratio.
In [19], the objective of an MMSE receiver was used to reduce the MSE of the estimated signal in contrast to the transmitted signal. The massive MIMO system performance was examined under the characteristics of a different linear receiver. A performance of an MMSE receiver in a realistic system was found in [20] under interference conditions.
In [21], an opportunistic transmission protocol (OTP) was examined according to the three types of beamforming techniques. One of the most perfect beamforming techniques is MMSE-SIC detection method. In this article, all the beamforming techniques and the OTPs were executed by the secondary user (SU) in a decentralized process.
Reference [22] proposed a transmit filter design using an MMSE approach to ensure a low complexity for a MIMO interference channel. The MMSE scheme combined the signal and the interference leakage of each transmitter.
Both a ZFBF scheme and the MMSE methods were used in [23]. In this article, a multi-user detection (MUD) method is examined in multicarrier-direct-sequence code-division multiple-access (MC DS-CDMA), which inspired a low complexity and a high flexibility. A scope of a low-complexity MUDs was derived based on the ZF, MMSE, and interference cancellation (IC) principles. The proposed MUD was implemented using a modular structure and most of the modules were independent of each other.
The proposed contribution contains the integration of a zero forcing and the MMSE technique, which are implemented in the desired signal vector. The proposed technique is also known as the regularized zero forcing method [24]. However, the proposed method power transmission is limited by the iterative solutions of the normalized mean square error method. This provides an enhanced solution in the secrecy rate when compared to the existing zero forcing technique. In the proposed method, the bit error rate (BER) and the secrecy outage probability (SOP) are greatly reduced. The throughput and the channel capacity are increased.

3. System Model

3.1. Secure Beamforming in 5G-Based CRN

Beamforming [24] is a fast and an accurate process that is properly focused on the target user equipment (UE). The process of beamforming is demonstrated Figure 1. The process, in which a UE has a rapid movement, is not an easy task. It is able to adapt the radiation model of an antenna to a certain structure. It steers a power in a specific direction toward a user. This is the actual process of beamforming, which is shown in Figure 2.
Massive MIMO was examined as a part of beamforming. The CSI is a collection of spatial transfer functions between each antenna and a user terminal. The spatial information is found in the matrix (G), as shown in Figure 3.
The research focuses on securing the CSI by aligning the signal matrix after applying the proposed method to reduce an interference in the channel matrix.

3.2. Proposed Beamformer

A cellular MIMO-NOMA-based CRN has two cells. Its BS with L clusters is shown in Figure 4 [12]. Each cluster has two users: One is the primary user (PU) and the other is a secondary user (SU). The BS and the two users of each cluster contains M and N antennas, respectively. Then, c∈{A,B} indicates a cell and l ∈ L ≝ {1, 2, …, L} represents the cluster, and u ∈ {pu, su} denotes each user, respectively. The radius of a cell is ro, in which the BS is situated at the center of an each cell. In this model, a cell is divided into two discs, namely D1 and D2. They are the inner and outer discs in a cell. The D1 contains the radius of ri and D2 contains the radius ro, which lies within the circle of radius ri. This model is easily extended for multi-cell framework [3] in any pairing order [25].
The channel gain of an uth users on a lth cluster of cth cell is given by [12],
G u l , c = F u l , c P ( d u l , c )
where F u l , c indicates a Rayleigh fading channel, which means ( σ u l , c ) 2 is for variance calculations. For N x M dimensions, the channel gain matrices are given as G u l , c .
Let P ( d u l , c ) = ( d u l , c ) υ indicate a large-scale path loss and υ denote the path loss exponent. d u l , c specifies the distance between the BS and a uth user. Likewise, the inter-cell channel-gain for the PU in the lth cluster of a cth cell is denoted by I pu l , c .
The licensed PUs need to be served first in the presence of a several SUs, but they are shared at the same time and frequency. The SU and the PU data in a cluster are retrieved using a SIC. The existing (L−1) clusters are denoted as an intruder in the fundamental clusters. In a multi-cell framework, all the PUs in a cell are specified as an intruder by another cell user. This does not occur in the case of SUs, which are within the same cell. This says that each of the clusters need to be secured from all other cell clusters, as well as in the PUs. This is solved by a proposed technique in the transmitter. The proposed technique consists of an incorporation of a ZFBF and an MMSE method. Nevertheless, the proposed technique implementation in the BS is not possible. This is because of the number of antennas in the BS is lesser than the entire number of antennas present in the clusters. This is also solved by a proposed technique.

3.3. Proposed Technique in Cascaded Transmission of MIMO-NOMA Network

The cascaded transmission of this approach is used in MIMO-NOMA-based CRN for the secure communication in the multi-cell framework. The intruders will make an attempt to secretly listen to the channel information. The BS does not want the intruders to prevent the data using receiving beamformers. The proposed technique is applied at the BS for the determination of an information leakage within the same and the adjacent cells. The received signal of the PU and the SU in the lth cluster of a cell A is expressed as [24]
R su l , A = G su l ,   A m = 1 L v m , A + w su l , A
R pu l , A = G pu l ,   A m = 1 L v m , A + I pu l , A m = 1 L v m ,   B + w pu l , A
Let v l ,   A be the M × 1 superposition signal vector for the lth cluster of the cell A. Note that v l , A ∊ ℂMx1 is the transmitting proposed vector and w pu l , A , w su l , A is the AWGN process. It will be present in the receiver side of the PU and SU of the lth cluster in the cell A. Assume l ∈ L ≝ {1, 2, …, L}.
The secrecy Rate of a PU and a SU is derived as
S su l , A [ log 2 ( 1 + ψ | G su l , A v l , A | 2 ) max m , m l log 2 ( 1 + ψ | G su m , A v m , A | 2 ) ] +
S pu l , A [ log 2 ( 1 + ψ | G pu l , A v l , A | 2 ) Y 1 Y 2 ] +
where ψ is the signal to noise ratio (SNR) transmission at the BS. The idea of [e]+ is defined as max(0,e). Y 1 max m , m l log 2 ( 1 + ψ | G pu m , A v m , A | 2 ) and Y 2 max m log 2 ( 1 + ψ | I pu m , A v m , B | 2 ) . In Equations (4) and (5), the second term on the right hand side (RHS) contains the formulation of an information leakage for the lth cluster in the same cell. In Equation (5), the third term on the RHS contains the formulation of an information leakage for the lth cluster in the neighboring cell. The information leakage will be overcome by applying the proposed technique in the BS, by knowing that the BS has a CSI for all the users. The CSI is evaluated at the receiving end and it responds to the BS by a feedback channel.
Consider a proposed technique in the BS within the same cell without applying a signal alignment in the interfering channel matrix. A proposed technique is used to secure the data in every cluster within the same cell and in the neighboring cell. A proposed technique of v l , A needs to be designed at the BS as a non-trivial solution in Equation (6). A non-trivial solution will exist if M ≥ 2N (L−1). So, there must be a large number of antennas in the BS. The proposed method will serve as ( M + 1 ) / 3 in a multi-cell framework. This indicates that the number of antennas in the BS will be larger than the number of clusters. Therefore, this will reduce the overall throughput. This problem will be overcome by an alignment matrix Q A MxS . This will align the interference channel matrix in a cell for a different dimension. Then v l , A = Q A V l , A where V l , A Sx 1 is a proposed vector for the lth cluster in a cell A. The BS will perform a precoding in an aligned interference channel matrix. The precoding must be in NxM dimensions for the better generation of a non-trivial solutions. So, there are no limitations in the number of antennas that is used in the BS. At the same time, the number of clusters is restricted by the antenna in the BS is also eliminated. The Equation (6) is derived by applying an alignment matrix Q A . The area of an aligned channel matrix is 2N(L−1) × A, which is derived from the Equation (7). The ‘S’ value is nominated to get a non-trivial solution of an Equation (7). The alignment matrix Q A is constituted as Q 2 A Q 1 A where Q 2 A is initialized to align the interference channel matrix in a neighboring cell. Then, Q 1 A is a proposed transmitting vector to overcome the data leakage in the neighboring cell. The proposed transmitting vector Q 1 A for the neighboring cell will satisfy the following term as:
[ G pu 1 , A   G su 1 , A     G pu l 1 , A   G su l 1 , A   G pu l + 1 , A   G su l + 1 , A     G pu L , A   G su L , A ] G v l , A = 0
[ G pu 1 , A Q A   G su 1 , A Q A     G pu l 1 , A Q A   G su l 1 , A Q A   G pu l + 1 , A Q A   G su l + 1 , A Q A     G pu L , A Q A   G su L , A Q A ] G V l , A = 0
[ H pu 1 , B Q 2 A   H pu 2 , B Q 2 A     H pu L , B Q 2 A ] T Q 1 A = 0
where, H pu L , B Q A V l , A span   ( H pu L , B )   Q A V l , A
A non-trivial solution of Q 1 A PxS ,   Q 2 A MxP is aligned with the interference channel matrix in a neighboring cell as P > NL for the Equation (8). The solution is given as [24]:
X 1 A = span   { H ¯ G ( H ¯ H ¯ G + β I d ) 1 H ¯ }
where H ¯ [ H pu 1 , B Q 2 A   H pu 2 , B Q 2 A     H pu L , B Q 2 A ] T . The condition of M>N is unrelated for a non-trivial solution of Q 1 A in an Equation (9). The regularization term of β contains a normalized mean square error (NMSE) method of an optimization that allows the balance between the noise covariance and the transmit power. Let I d be the identity matrix of NxM dimensions.
Let V l , A represent the determination of a non-trivial solutions for the Equation (7). Assuming g p u L , A G p u L , A Q A and g s u L , A G s u L , A Q A in Equation (7), Equation (10) is as follows:
G ¯ [ g pu 1 , A   g su 1 , A     g pu l 1 , A   g su l 1 , A   g pu l + 1 , A   g su l + 1 , A     g pu L , A   g su L , A ] T
Then, the solution is given as
V l , A = span   { G ¯ G ( G ¯ G ¯ G + β I ) 1 G ¯ }
The MMSE method, along with the transmitting ZFBF approach, is spanned to obtain a proposed solution in the Equation (11). The regularization term of β contains a stability in the transmit power and a noise variance [24] which is denoted as C x and C v . Then, the term β for a cell A is expressed as
β I = C x MC v S I
Assume S be the data symbol that contains a s pu l , A , s su l , A for the cluster l of cell A. Let C x be the transmit power and is expressed as [26],
C x = E [ ω ω G ] [ 1 L l = 1 L ω l , u ω G l , u ] I d NxM
Then, ω be the power allocation coefficient that contains a ω pu l , A , ω su l , A for the PUs and the SUs and is assumed as ω pu l , A + ω su l , A = 1 .
Let l be the number of clusters, be the Hadamard product, and I d NxM be the N×xM identity matrix. Equation (13) assumes that the signal source from different positions are uncorrelated. Let C v be the noise covariance matrix, expressed as
C v = E [ ww G ] σ w 2 I d NxM
where σ w 2 is a variance of the thermal noise and is assumed as additive white Gaussian noise (AWGN). The MMSE strikes the balance of obtaining a maximum signal amplification and then reducing the interference. This view that the signal processing complexity will help to obtain a good solution.
In the proposed method, the re-iteration of a transmit power C x has taken place in the MMSE iterative solutions [26]. The iteration is declared through a data symbol.
C x ( s 1 ) = [ 1 L l = 1 L ω l ω G l ] I d NxM
The iteration has been terminated by the NMSE solutions and is expressed as [26]
C x | C x ( s 1 ) = ϑ s = 1 u u = pu su [ l = 1 L ω ^ l , u ( s ) ω ^ l , u ( s 1 ) 2 l = 1 L ω ^ l , u ( s 1 ) 2 ] I d NxM
So, instead of the Equation (13), we apply an iterated transmitted power [26] as shown in the above Equation (16) for the better MMSE solutions. Therefore, the proposed technique obtains an enhanced solution compared with the existing method.
The above proposed solution is situated at the BS and the derivation for the secrecy rate is calculated as follows [12]:
S su l , A log 2 ( 1 + ψ | G su l , A v l , A | 2 )
S pu l , A log 2 ( 1 + ψ | G pu l , A v l , A | 2 )
The total secrecy rate in a cluster is given by
S total l , A = S pu l , A +   S su l , A
The proposed method in an Equation (16) will convert a total secrecy rate of a cluster to the total throughput of a cluster.
The BER from the above formulation is calculated as
BER u = 1 2 Q ( 2 E [ | v l ,   A | ] 2 w u l , A )
where Q (.) is the Gaussian Q-function and is defined as
Q ( W ) = 1 2 π w e   z 2 2 d z
The channel capacity is also greatly increased by the proposed method and is formulated as
C u = C h B l o g 2 ( 1 + v l ,   A w u l , A ChB )
where B is the channel bandwidth, which is taken at 1 MHz.
The throughput of the channel can be expressed as
T u = ψ [ | G u l , A v l ,   A | ] 2
The proposed technique is skillful in allocating the multi-cells and multi-clusters in which the number of antennas is not limited at the BS.

3.4. Secrecy Outage Probability

The secrecy outage probability of the PU and the SU in a cluster was analyzed in consent with the CR power allocation policy. This says that the PU permits the SU to reuse the spectrum by assuring a PUs quality of service. The PU will obtain a target data rate of D pu l ,   A by modifying the power allocation coefficient of ω p u l , A . Then, the limitation is given by
ψ | G pu l , A v l , A | 2 ω pu l , A ψ | G pu l , A v l , A | 2 ω su l , A +   1 >   ε pu l , A
where ε pu l , A = 2 D pu l ,   A 1 . This gives a following alternative as
ω su l , A = max ( 0 ,   ψ | G pu l , A v l , A | 2 ε pu l , A ( 1 + ε pu l , A ) ψ | G pu l , A v l , A | 2 )
The target data rate is not achieved, even when the full power is assigned to it. Thus, the secrecy outage probability of the PU and the SU is implied as follows:
SOP pu l , A Pr [ log 2 ( 1 + ψ | G pu l , A v l , A | 2 ) < D pu l ,   A ]
SOP su l , A Pr [ log 2 ( 1 + ψ | G su l , A v l , A | 2 ) < D su l ,   A ]
Let the asymptotic expression of channel gain and proposed vector will be taken as
| G pu l , A v l , A | 2 ( N ( S 1 ) ,   ( σ p u l , A ) 2 )
| G su l , A v l , A | 2 ( N ( S 1 ) ,   ( σ s u l , A ) 2 )
Then, applying the gamma function in the above assumption is given [12] as
1 ( N ( S 1 ) ) γ ( N ( S 1 ) ,   J 3 ( σ p u k , A ) 2 ) 1 q ( r ψ ) q f = 1 6 θ f f
Let q ( N ( S 1 ) ) and r J 3 ( σ p u l , A ) 2 , where γ ( q ,   r ) 0 r φ q 1 exp ( φ ) d φ denotes the lower incomplete gamma function as φ = f r 6 ψ and θ f = ( i 6 ) a 1 , f = e f r 6 ψ . The asymptotic expression of Equation (12) is obtained by applying the Simpson’s 1/3 numerical integration method [12]. Here, J 3 ε p u l , A ψ ω p u l , A and | G pu l , A v l , A | 2 Z ( N ( S 1 ) ,   ( σ p u l , A ) 2 ) . The secrecy outage at PU is same as the conventional orthogonal multiple-access systems [5]. Then, the secrecy outage at SU is found in three different scenarios as: Event T1 for ω s u k , A = 0 , Event T2 for ω s u l , A > 0 where the SU is unable to decode the message for both the PU and the SU [5], and Event T3 for ω s u l , A > 0 where the SU is unable to decode its own message but it is able to decode the message for PU [5]. The probability of a T1 is expressed as
P ( T 1 ) = P [ ψ Z ε p u l , A < 0 ] 1 q ( r ψ ) q f = 1 6 θ f f
The probability of T2 is found as P ( T 2 ) = 0 . Then, the probability of T3 is calculated as [12]
P ( T 3 ) = P [ X ψ Z ε p u l , A ( 1 + ε p u l , A ) Z < ε s u l , A ,   Z > ε p u l , A ψ ]
where D s u k , A is the target data rate of SU and ε s u l , A D s u l , A 1 and | G su l , A v l , A | 2 X ψ ( N ( S 1 ) , ( σ s u l , A ) 2 ) . Then, P(E3) [12] will be
P ( T 3 ) = 0 ε p u l , A ψ J 4 f Z ( z ) f X ( x ) d z d x
where, J 4 ε s u l , A ( 1 + ε p u l , A ) x y ψ ε p u l , A . Combining P(E1), P(E2), and P(E3), one can obtain the asymptotic expression for the secrecy outage probability of SU as in [12] as
S O P s u k , A 1 q ( r ψ ) q f = 1 6 θ i i + ( ε p u k , A ψ ) q [ 1 + J 5 ψ ]
J 5 = ( ε s u k , A ( 1 + ε p u k , A ) ( σ p u k , A ) 2 ) ( σ p u k , A ) 2 ( q 1 ) q
The above equation was taken from the reference [12] and was applied here to obtain the analytical solutions for both the PU and the SUs. The asymptotic outage performance of the PU and the SU is shown in the simulation results.

4. Numerical Evaluation

The numerical rating of the proposed method was conducted in this section and the results were compared with the existing cascaded ZFBF techniques [12]. A proposed technique has a greater performance than the existing technique. The simulation parameter, which is used in the proposed technique, is shown in Table 1.
This article was implemented using the software named ‘Matlab’ (The MathWorks, Inc., Natick, MA, USA) of version R2017b in the platform of 64-bit version in the x86 instruction set.
In Figure 5, the secrecy rate of the PU and the SU is plotted to the transmitting SNR. The proposed method was also compared with the existing method of coordinated beamforming (CoBF) technique [3] and the cascading ZFBF techniques [12], respectively. The secrecy rate of the proposed method is increased with the SNR and its performances are higher than the existing methods. The CoBF technique is implemented in both the transmitting and receiving beamformers. The interference channel matrix is aligned by the transmitting beamforming technique and nullified by the receiving beamformer. Likewise, the cascaded ZFBF technique performs better than the CoBF technique [3], but the proposed performance provides a better result compared with the cascaded ZFBF method [12]. Nevertheless, an eavesdropper obstructs the interference in which the receiving beamformer is not used. The interference alignment and the proposed method are applied at the BS. Therefore, the secrecy rate increases with the SNR.
The secrecy outage probability for the PU and the SU estimates for the different target data rate as, D pu l ,   A and D su l ,   A . Then, the secrecy outage probability of the SU is SOP su l , A , which is higher than the secrecy outage probability of the PU as, SOP pu l , A . The probability of the secrecy outage will be increased, as the target data rate has a larger value.
The output results, which are shown in Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9, respectively, show the effectiveness of the proposed method.

5. Motivation and Contribution of the Article

This article clearly described the proposed technique, which is one of the best beamforming techniques to reduce the interference in the MIMO-NOMA-based CRN. The MMSE method, along with the NMSE iterations, were used to limit the power transmission for the better exposure of the proposed performance. The number of antennas at the BS was not limited because the signal alignment matrix was used at the BS to align the channel matrix. The motivation of an article was to enhance the secure transmission of the data packets by reducing the interference as effectively as possible. The simulation results show the effectiveness of the proposed technique.

6. Discussion

This article shows the highlighted secrecy rate and effectively reduces the outage probability compared with the previous results [12]. The proposed technique in the article was used in securing the beamforming in the 5G technology without causing interference during a data transmission between a cluster from one cell to another cell. The findings of the proposed method are oriented to the MMSE technique, which belongs to one of the beamforming techniques in the MIMO. Here, the proposed MMSE iterative technique was used to enhance the secrecy rate by cancelling the interference as possible.
The proposed method normally uses the technique that is oriented to MMSE will enhance the total secrecy rate of the system than the preceding method of the ZFBF [12]. The SOP and BER were also reduced. The capacity and throughput were significantly increased in the proposed method, which is shown in Simulation results. Therefore, this new beamforming technique shows the performance of their robustness, which may be used in another part of technology, like Internet of Things (IoT)-based CRN, to secure the communication as possible.

7. Conclusions

In this paper, a downlink beamforming technique was proposed for the secure communication in a two-cell MIMO-NOMA-based CRN. There were no other limitations for the number of antennas at the BS. This was achieved by the signal alignment matrix that aligns the interference channel matrix, before the implementation of the proposed method. The proposed technique is very effective in enlarging the total secrecy rate of the CRN systems.
For the future work, the proposed method may be used in IoT-based cognitive radio networks. The IoT users in the CRN are sensed as per the RF spectrum slot to give the logistic and disaster response. So, there is a need for the accurate spectrum decision framework in 5G engineering.
The spectrum decision, which is taken by an unlicensed SUs of a CRN, holds an important role in CR-based IoT in 5G network. The proposed method can be very useful for taking the optimistic spectrum decision in IoT-based cognitive radio networks.

Author Contributions

Conceptualization, H.S.M.A.; methodology, H.S.M.A.; formal analysis, H.S.M.A. and T.L.; investigation, H.S.M.A. and T.L.; data curation, H.S.M.A.; writing-original draft preparation, H.S.M.A.; writing-review and editing, H.S.M.A. and T.L.; software, H.S.M.A. and T.L.; supervision, T.L.; project administration, H.S.M.A. and T.L.


This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.


CRNcognitive radio network
NOMAnon-orthogonal multiple access
5Gfifth generation
SUssecondary users
PUsprimary users
CJcooperative jamming
SSPAsmart sensor protocol algorithm
PLSphysical layer security
ZFBFzero forcing beamforming
CSTNcognitive satellite terrestrial network
SDAsoftware defined architecture
MISOME-SWIPTmultiple input, single output multiple-eavesdropper simultaneous wireless information and power transferring
SEEsecrecy energy efficiency
CSIchannel state information
UPAuniform planar array
BSbase station
AoAangle of arrival
SRsecrecy rate
IPFiterative penalty function
MISOmulti-input single-output
STsecondary transmitter
SRsecondary receiver
PSpower splitting
SDRsoftware defined radio
PSOparticle swarm optimization
EPSequal power splitting
MMSEminimum mean square error
NMSEnormalized mean square error
MLmaximum likelihood
SICsuccessive interference cancellation
OTPopportunistic transmission protocol
MUDmultiuser detection
MC DS-CDMAmulticarrier direct-sequence code-division multiple access
ICinterference cancellation
UEuser equipment
AWGNadditive white Gaussian noise
CoBFcoordinated beamforming
SNRsignal to noise ratio
RFradio frequency
IoTInternet of Things
SOPsecrecy outage probability


  1. Zeng, M.; Yadav, A.; Dobre, O.A.; Tsiropoulos, G.I.; Poor, H.V. Capacity comparison between MIMO-NOMA and MIMO-OMA with multiple users in a cluster. IEEE J. Sel. Areas Commun. 2017, 35, 2413–2424. [Google Scholar] [CrossRef]
  2. Islam, S.M.R.; Zeng, M.; Dobre, O.A.; Kwak, K.S. Resource allocation for downlink NOMA systems: Key techniques and open issues. IEEE Wirel. Commun. 2018, 25, 40–47. [Google Scholar] [CrossRef]
  3. Shin, W.; Vaezi, M.; Lee, B.; Love, D.J.; Lee, J.; Poor, H.V. Coordinated beamforming for multi-cell MIMO-NOMA. IEEE Commun. Lett. 2017, 21, 84–87. [Google Scholar] [CrossRef]
  4. Ding, Z.; Adachi, F.; Poor, H.V. The application of MIMO to nonorthogonal multiple access. IEEE Trans. Wirel. Commun. 2016, 15, 537–552. [Google Scholar] [CrossRef]
  5. Ding, Z.; Schober, R.; Poor, H.V. A general MIMO framework for NOMA downlink and uplink transmission based on signal alignment. IEEE Trans. Wirel. Commun. 2016, 15, 4438–4454. [Google Scholar] [CrossRef]
  6. Xu, L.; Nallanathan, A.; Pan, X.; Yang, J.; Liao, W. Security-Aware Resource Allocation with Delay Constraint for NOMA-Based Cognitive Radio Network. IEEE Trans. Inf. Forensics Secur. 2018, 13, 366–376. [Google Scholar] [CrossRef]
  7. Duan, W.; Jiang, X.Q.; Wen, M.; Wang, J.; Zhang, G. Two-Stage Superposed Transmission for Cooperative Noma Systems. IEEE Access 2018, 6, 3920–3931. [Google Scholar] [CrossRef]
  8. Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
  9. Jiang, M.; Li, Y.; Zhang, Q.; Li, Q.; Qin, J. Secure beamforming in downlink MIMO nonorthogonal multiple access networks. IEEE Signal Process. Lett. 2017, 24, 1852–1856. [Google Scholar] [CrossRef]
  10. Zhang, H.; Yang, N.; Long, K.; Pan, M.; Karagiannidis, G.K.; Leung, V.C. Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation. IEEE J. Sel. Areas Commun. 2018, 36, 1441–1452. [Google Scholar] [CrossRef]
  11. Chen, J.; Yang, L.; Alouini, M.S. Physical layer security for cooperative NOMA systems. IEEE Trans. Veh. Technol. 2018, 67, 4645–4649. [Google Scholar] [CrossRef]
  12. Nibedita, N.; Sudhan, M.; Hsiao-Chun, W. Secure Beamforming for MIMO-NOMA Based Cognitive Radio Network. IEEE Commun. Lett. 2018, 22, 1708–1711. [Google Scholar]
  13. Lin, M.; Lin, Z.; Zhu, W.P.; Wang, J.B. Joint Beamforming for Secure Communication in Cognitive Satellite Terrestrial Networks. IEEE J. Sel. Areas Commun. 2018, 36, 1017–1029. [Google Scholar] [CrossRef]
  14. Dong, Y.; Hossaini, M.J.; Cheng, J.; Leung, V.C. Robust Energy Efficient Beamforming in MISOME-SWIPT Systems with Proportional Secrecy Rate. IEEE J. Sel. Areas Commun. 2018, 37, 202–215. [Google Scholar] [CrossRef]
  15. Lin, Z.; Lin, M.; Wang, J.B.; Huang, Y.; Zhu, W.P. Robust Secure Beamforming for 5G Cellular Networks Coexisting with Satellite Networks. IEEE J. Sel. Areas Commun. 2018, 36, 932–945. [Google Scholar] [CrossRef]
  16. Pham, V.T.; Koo, I. Optimal Multiuser MISO Beamforming for Power-Splitting SWIPT Cognitive Radio Networks. IEEE Access 2017, 5, 14141–14153. [Google Scholar]
  17. Irfan, A.; Hedi, K.; Adnan, S.; Ahmed, M.; Kwang, S.K.; Eli De, P.; Ingrid, M. A Survey on Hybrid Beamforming Techniques in 5G: Architecture and System Model Perspectives. IEEE Commun. Surv. Tutor. 2018, 20, 3060–3097. [Google Scholar]
  18. Deepanramkumar, P.; Karuppiah, M.; Hafizul, I.S.K.; Mohammad, S.O. Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES. Int. J. Commun. Syst. 2018, 31, e3805. [Google Scholar]
  19. Ehab, A.; Mahamod, I.; Rosdiadee, N.; Nor, F.A. Beamforming techniques for massive MIMO systems in 5G: Overview, classification, and trends for future research. Front. Inf. Technol. Electron. Eng. 2017, 18, 753–772. [Google Scholar]
  20. Ju, M.; Qian, J.; Li, Y.; Tan, G.; Li, X. Comparison of multiuser MIMO systems with MF, ZF and MMSE receivers. In Proceedings of the IEEE Third International Conference on Information Science and Technology (ICIST), Yangzhou, China, 23–25 March 2013. [Google Scholar]
  21. Lin, H.; Shin, W.Y. Non-Orthogonal Random Access in MIMO Cognitive Radio Networks: Beamforming, Power Allocation, and Opportunistic Transmission. PLoS ONE 2017, 12, e0169902. [Google Scholar] [CrossRef]
  22. Sun, F.; de Elisabeth, C. Leakage-Based MMSE Beamforming Design for a MIMO Interference Channel. IEEE Signal Process. Lett. 2012, 19, 368–371. [Google Scholar] [CrossRef]
  23. Yang, L.L.; Wang, L.C. Zero-Forcing and Minimum Mean-Square Error Multiuser Detection in Generalized Multicarrier DS-CDMA Systems for Cognitive Radio. EURASIP J. Wirel. Commun. Netw. 2008, 2008, 541410. [Google Scholar] [CrossRef]
  24. Masterson, C. Massive MIMO and Beamforming: The Signal Processing Behind the 5G Buzzwords. Analog Dialogue 2017, 51, 10. [Google Scholar]
  25. Yang, Z.; Ding, Z.; Fan, P.; Al-Dhahir, N. A general power allocation scheme to guarantee quality of service in downlink and uplink NOMA systems. IEEE Trans. Wirel. Commun. 2016, 15, 7244–7257. [Google Scholar] [CrossRef]
  26. Eiichi, Y.; Tomoo, U.; Zen, K.; Satoru, Y.; Takeshi, M.; Fumihiko, M.; Masakazu, W. MMSE Beam Forming on Fast-Scanning Phased Array Weather Radar. IEEE Trans. Geosci. Remote Sens. 2013, 51, 3077–3088. [Google Scholar]
Figure 1. Beamforming of user qeuipment (UE).
Figure 1. Beamforming of user qeuipment (UE).
Symmetry 11 01260 g001
Figure 2. Beamforming toward a user.
Figure 2. Beamforming toward a user.
Symmetry 11 01260 g002
Figure 3. Traditional beamforming.
Figure 3. Traditional beamforming.
Symmetry 11 01260 g003
Figure 4. A two-cell network of multiple-input-multiple-output0non-orthogonal multiple access (MIMO-NOMA)-based cognitive radio network (CRN).
Figure 4. A two-cell network of multiple-input-multiple-output0non-orthogonal multiple access (MIMO-NOMA)-based cognitive radio network (CRN).
Symmetry 11 01260 g004
Figure 5. Secrecy rate.
Figure 5. Secrecy rate.
Symmetry 11 01260 g005
Figure 6. Secrecy outage probability.
Figure 6. Secrecy outage probability.
Symmetry 11 01260 g006
Figure 7. Bit error rate of the ZFBF and the proposed technique.
Figure 7. Bit error rate of the ZFBF and the proposed technique.
Symmetry 11 01260 g007
Figure 8. Channel capacity of zero forcing beamforming (ZFBF) and the proposed technique.
Figure 8. Channel capacity of zero forcing beamforming (ZFBF) and the proposed technique.
Symmetry 11 01260 g008
Figure 9. Throughput of the ZFBF and the proposed technique.
Figure 9. Throughput of the ZFBF and the proposed technique.
Symmetry 11 01260 g009
Table 1. Simulation parameters.
Table 1. Simulation parameters.
Network Size200 × 200 m2
Channel Bandwidth1 MHz
Rayleigh fading channel, σ u 2 0.8
Path-loss exponent, υ 3
Radius of inner disc, ri10
Radius of outer disc, ro20
Data rate for PU, D pu l ,   A 0.25, 1
Data rate for SU, D su l ,   A 1, 4
Number of antennas for BS, M2
Number of antennas for user, N2
Number of clusters of each cell, L4
Number of cells, C2
Number of bits/symbols, Bi106 bits

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (
Back to TopTop