## 1. Introduction

Today, the development of smart devices has led to the increase in the number of wireless connections, the mobile data rate, and the consumed energy in the next generation of wireless communication systems [

1,

2]. The users always wants to connect and get the data quickly and safely. Therefore, in order to deploy and improve the range of the wireless communication system and the connection speed, non-orthogonal multiple access (NOMA) has recently received great attention from researchers in the field of wireless systems as a promising technique to achieve enhanced spectrum efficiency of the 5G mobile network [

3,

4]. In the NOMA technique, the users can share both time and frequency resources and only adjust their power allocation ratios. In particular, the user with better channel conditions can be allocated to a channel that is occupied by a user with poor channel conditions. The users with strong channel conditions can serve as relays to enhance the system performance by using successive interference cancellation (SIC) [

5].

In recent times, there has been many research investigations into NOMA in wireless communication systems [

6,

7,

8]. Cooperative NOMA can achieve the maximum diversity gain for wireless networks. The researchers in [

6] studied the cooperative relaying system using the NOMA technique to improve the spectral efficiency. In [

7], the authors considered the performance of the NOMA system in amplify-and-forward (AF) relaying systems to increase the data transmission rate for 5G communications. Approaches based on the role of chaos in game theory have been investigated in [

9,

10] and can be applied in multiple access schemes. The combination of cooperative communication and PLS is an effective approach to overcome the disadvantages of the fading environment, as well as to increase the security capacity of the wireless network.

PLS has been presented by published researches in [

8,

11]. In [

8], the authors evaluated the secrecy performance of cooperative protocols with relay selection methods under the impact of co-channel interference. The authors in [

11] studied the impact of correlated fading on the secrecy performance of multiple DFrelaying with the optimal relay selection method. Besides, the authors researched the NOMA technique combined with PLS in [

12,

13]. In [

12], the authors solved the problem of maximizing the minimum confidential information rate among users subject to the secrecy outage constraint and instantaneous transmit power constraint. Cooperative NOMA systems with PLS were investigated in [

13] in cases of both AF and DF operations.

In addition, the underlay cognitive radio networks applying the NOMA technique were also proposed by some authors in [

14,

15,

16,

17]. In [

14], a cooperative transmission scheme has been proposed for a downlink NOMA in CR systems, and this research exploited the maximal spatial diversity. Considering the security principle [

18,

19,

20], the authors in [

19] studied secure communication in cognitive DF relay networks in which a pair of cognitive relays is opportunistically selected for security protection against eavesdroppers. In [

20], the authors investigated tradeoffs between security and reliability in cooperative cognitive radio networks with the NOMA solution.

In most of the above research, the authors have not considered the combination of NOMA with PLS in UCCN. Excited by the above ideas, in this article, we propose a UCCN using the NOMA scheme in which the intermediate relays help to decode and forward two signals ${x}_{1}$ and ${x}_{2}$ from a source node to two destination nodes D_{1} and D_{2}, respectively, under wiretapping of an eavesdropper. The best relay selection strategy is investigated in three types of relay selection criteria: the first and second best relay selection is based on maximizing the value of the channel gains from the links R${}_{i}$-D_{1}, R${}_{i}$-D_{2}, respectively; the third one is to ensure the minimum value of the channel gains from the R${}_{i}$-E link. Then, we analyze and evaluate the secrecy performances of the transmissions ${x}_{1}$ and ${x}_{2}$ in the proposed UCCN-NOMA scheme in terms of the SOPs over Rayleigh fading channels to advance the spectral efficiency and secure communication in which the best intermediate relay supports power to the destination nodes and perform digital network coding (DNC) to compress the received data and then to forward the signals to the destination nodes.

The article is summarized with the main contributions as follows. Firstly, we propose a DF-formed cooperation UCCN scheme in which the best relay uses the NOMA and considers PLS to enhance the system performance in 5G wireless networks. Secondly, the SOPs over Rayleigh fading channels are derived and are confirmed by Monte Carlo simulations. Thirdly, the secrecy performances of the transmissions

${x}_{1}$ and

${x}_{2}$ in the three best relay selection strategies are compared with each other in the proposed UCCN-NOMA system. The organization of paper is as follows:

Section 2 describes a UCCN system model with the best relay using NOMA combined with PLS and the operation methods of the proposed system;

Section 3 analyses the results of the SOPs for the eavesdropping of the signals

${x}_{1}$ and

${x}_{2}$ in the proposed UCCN-NOMA system; the simulation results are presented in

Section 4; and

Section 5 summarizes our conclusions.

## 2. System Model

In this paper, as shown in

Figure 1, we consider a wireless communication system of a UCCN, which contains one source node S, two destination nodes D

${}_{1}$ and D

${}_{2}$, multi-wireless relay nodes using the NOMA principle, and one eavesdropper node E to wiretap the signals of the links S-D

${}_{1}$ and S-D

${}_{2}$. In this figure, we assume that the communication between the source S and the destinations D

${}_{1}$ and D

${}_{2}$ is not transmitted directly, and they are linked through the intermediate relays with the presence of the eavesdropper E. Hence, the source node transmits its packets to the destination nodes (

${x}_{1}$ is sent to D

${}_{1}$, and

${x}_{2}$ is sent to D

${}_{2}$). The R

${}_{i}$-D

${}_{2}$ link distance is farther than the R

${}_{i}$-D

${}_{1}$ link distance. In order to transmit data optimally, the best relay node using the NOMA method was selected to help the source node exchange data with destination nodes D

${}_{1}$ and D

${}_{2}$. The best relay selection strategy is presented by three types of relay selection criteria: the first and second best relay selection is based on the maximum channel gain of the links R

${}_{i}$-D

${}_{1}$ and R

${}_{i}$-D

${}_{2}$, respectively; the third one is to ensure the minimum channel gain of the link R

${}_{i}$-E.

There are some assumptions as follows. Firstly, each node has a private antenna. Secondly, the variances of zero-mean white Gaussian noises (AWGNs) are equal, denoted similarly as N

${}_{0}$. Thirdly, all channels are designated for flat and block Rayleigh fading. Finally, the channel state information (CSI) regarding the sources-to-eavesdropper, sources-to-relays, and relays-to eavesdropper channels is known at the source node S and the destination nodes D

${}_{1}$ and D

${}_{2}$ [

5].

In

Figure 1,

$({h}_{S{R}_{i}},\phantom{\rule{0.166667em}{0ex}}{d}_{S{R}_{i}})$,

$({h}_{ji},\phantom{\rule{0.166667em}{0ex}}{d}_{ji})$ are Rayleigh fading channel coefficients and the link distances of S-R

${}_{i}$, R

${}_{i}$-D

${}_{k}$, R

${}_{i}$-E, and R

${}_{i}$-Pu, respectively, where

$j\in \left\{1,\right.\left.4\right\}$,

$i\in \left\{1,\right.\left.M\right\}$, and

$k\in \left\{1,\right.\left.2\right\}$. Hence, the random variables

${g}_{ji}=|{h}_{ji}{|}^{2}$ have an exponential distribution with the parameter

${\lambda}_{j}={d}_{ji}^{\beta}$, where

$\beta $ is a path-loss exponent. The respectively distances of R

${}_{i}$-D

${}_{k}$, R

${}_{i}$-E, and R

${}_{i}$-Pu are illustrated in

Figure 1. The cumulative distribution function (cdf) and probability density function (pdf) of random variables

${g}_{ji}$ are expressed as

${F}_{{g}_{ji}}\left(a\right)=1-{e}^{-{\lambda}_{j}a}$ and

${f}_{{g}_{ji}}\left(a\right)={\lambda}_{j}{e}^{-{\lambda}_{j}a}$, respectively. With the assumptions in this paper, the fading channels

${h}_{ji}$ are fixed during a block time

T, and the variables

${h}_{ji}$ are independent and identically distributed between two continuous block times.

Based on a time division channel model, the operation method of the proposed UCCN-NOMA system is divided into two timeslots as presented in

Figure 2. In the first timeslot, the source node S broadcasts its signal

${x}_{s}$, which contains signals

${x}_{1}$ and

${x}_{2}$, to the best relay

${R}_{b}$. The signal

${x}_{s}$ is created by the superposition coding method [

21]. The selection criteria of the best relay

${R}_{b}$ will be discussed in the next section. The best relay

${R}_{b}$ uses the SIC technique to decode the signals

${x}_{1}$ and

${x}_{2}$ sequentially based on the allocated powers to the signals

${x}_{1}$ and

${x}_{2}$ at the source node S. In the second timeslot, the best relay

${R}_{b}$ combines the signals

${x}_{1}$ and

${x}_{2}$ to the coded signal

${x}_{R}$ by the superposition coding and then sends the signal

${x}_{R}$ to the destinations D

${}_{1}$ and D

${}_{2}$. The transmitted

${x}_{R}$ can be wiretapped by the eavesdropper E in the wireless environment.

## 3. Secrecy Outage Probability Analysis

In this section, we analyze the sum SOP for the eavesdropping of the signals ${x}_{1}$ and ${x}_{2}$ in the proposed UCCN-NOMA system. We assume that a node successfully and safely decodes the received packet if its achievable secrecy capacity is larger than a target secrecy capacity SC_{th}.

At the first timeslot, the source node S creates the signal

${x}_{s}$ by the superposition coding [

21] and then broadcasts the

${x}_{s}$ to all of the relays R

${}_{i}$. The signal

${x}_{s}$ is given by:

where

${P}_{s}$ is the power at source node S,

${\alpha}_{1}$ and

${\alpha}_{2}$ are the power allocation coefficients, and

${x}_{1}$ and

${x}_{2}$ are the messages sent to D

${}_{1}$ and D

${}_{2}$. Following the principle of the NOMA, we assume that

${\alpha}_{1}>{\alpha}_{2}$ with

${\alpha}_{1}+{\alpha}_{2}=1$.

The received signal at the relay R

${}_{i}$ from the source node S for the decoding of

${x}_{1}$ and

${x}_{2}$ is given by:

where

${n}_{{R}_{i}}$ denote the AWGNs at the relay R

${}_{i}$ with the same variance N

${}_{0}$,

$E\left\{\right|{x}_{1}{|}^{2}\}=1$,

$E\left\{\right|{x}_{2}{|}^{2}\}=1$ (

$E\left\{x\right\}$ denotes the expectation process of

x).

Based on the NOMA scheme, firstly, the relay R

${}_{i}$ decodes

${x}_{1}$ from (

1) and removes it using SIC, then

${x}_{2}$ will be decoded and forward to D

${}_{2}$ without the component

$\sqrt{{\alpha}_{2}{P}_{s}}{h}_{S{R}_{i}}{x}_{1}$ in (

2). Therefore, the signal received at R

${}_{i}$ after decoding

${x}_{1}$ is expressed as follows:

In the second timeslot, the signals received at the destinations D

${}_{1}$ and D

${}_{2}$ related to links R

${}_{i}$-D

${}_{1}$ and R

${}_{i}$-D

${}_{2}$, respectively, can be written as:

where

${n}_{{D}_{k}}$ denote the AWGNs at the destination D

${}_{k}$ with the same variance N

${}_{0}$ and P

${}_{R}$ is the transmit power of the relay R

${}_{i}$.

Similarly, the node E also wiretaps the packets

${x}_{1}$ and

${x}_{2}$ from R

${}_{i}$, respectively, and the received signals at node E are obtained as follows:

where

${n}_{E}$ denote the AWGNs at E with the same variance N

${}_{0}$.

In the system model, under the interference constraint at the Pu node, the relays R

${}_{i}$ have to adjust their transmitting powers so that the interference power at the Pu must be less than a threshold value,

${I}_{th}$. The maximum powers of nodes S and R

${}_{i}$ are given, respectively, as:

With Formulas (

4) and (

5), the received signal-to-interference and noise ratios (SINRs) at the destination D

${}_{k}$ for decoding the information signals

${x}_{1}$ and

${x}_{2}$ are obtained, respectively, as follows:

Applying Formulas (

6) and (

7), the received SINRs at the node E for eavesdropping the information signal

${x}_{1}$ of D

${}_{1}$ and the signal

${x}_{2}$ of D

${}_{2}$ from the relay R

${}_{i}$ are obtained, respectively, as follows:

Applying the Shannon capacity formula, the achievable rates of the links R

${}_{i}$-Y are formulated as:

where the ratio 1/2 represents the fact that data transmission is split into two time slots, and

$Y\in \left\{E,{D}_{k}\right\}$.

The secrecy capacity of the UCCN system with DF-based NOMA for the R

${}_{i}$-D

${}_{k}$ communication can be expressed as:

where

${\left[x\right]}^{+}=max\left(0,x\right)$;

$w\in \left\{1,\right.\left.3\right\}$;

$S{C}_{{R}_{bw}{D}_{k}}^{{x}_{k}}$ are the secrecy capacities from the relay R

${}_{i}$ to the destination D

${}_{k}$, given, respectively, as:

#### 3.1. The Sum SOP of the Secrecy Transmission in the Proposed UCCN-NOMA System with the Best Relay Selection: Case ST1

In this section, firstly, we find the best relay

${R}_{{b}_{1}}$ based on the maximum channel gain of the R

${}_{i}$-D

${}_{1}$ link. Then, we calculate the SOPs of the ST1case in which the destination nodes D

${}_{1}$ and D

${}_{2}$ do not get the signal safely from the source node S through

${R}_{{b}_{1}}$ under the malicious attempt of the eavesdropper E. Finally, we calculate their sum SOPs to compare fairly with the sum SOPs of the ST2 and ST3 cases in

Section 3.2 and

Section 3.3.

First, the best relay is selected based on a criterion as follows:

From the definition of

${R}_{{b}_{1}}$ in (

16), the CDF of

${g}_{2{b}_{1}}$ is obtained as:

The pdf of

${g}_{2{b}_{1}}$ is inferred as:

The next, we calculate the SOP of the ST1 case in which the destination node D

${}_{1}$ does not receive the signal safely from the best relay under the malicious attempt of the eavesdropper E, presented by a math expression as follows:

Substituting Formula (

15) into (

19),

${P}_{\mathrm{ST}1}^{out\_{D}_{1}}$ is obtained as:

Replacing Formula (

13) in (

20),

${P}_{\mathrm{ST}1}^{out\_{D}_{1}}$ is expressed as:

where

$\theta ={2}^{2S{C}_{th}}-1$.

In this paper, we consider the worst case in which the node E can take the data of D

${}_{1}$ with the best conditions. From (

21), we have an upper constraint of

${P}_{\mathrm{ST}1}^{out\_{D}_{1}}$ as follows:

where

$\phantom{\rule{0.166667em}{0ex}}\phantom{\rule{0.166667em}{0ex}}{P}_{R}=\frac{{I}_{th}}{{g}_{1i}}$,

$Q=\frac{{I}_{th}}{{N}_{0}}$,

${\mathrm{A}}_{1}=Pr\left[{g}_{4{b}_{1}}>\frac{{g}_{2{b}_{1}}x}{(\theta +1)(Q{\alpha}_{2}{g}_{2{b}_{1}}+x)}-\frac{\theta x}{(\theta +1)Q{\alpha}_{1}}\right]$,

${\mathrm{A}}_{2}={\mathrm{P}}_{\mathrm{r}}\left[{g}_{4{b}_{1}}>\frac{{g}_{2{b}_{1}}x}{\left(\theta +1\right)\left({\alpha}_{2}Q{g}_{2{b}_{1}}+x\right)}-\frac{\theta x}{\left(\theta +1\right)Q{\alpha}_{1}};\frac{{g}_{2{b}_{1}}x}{\left(\theta +1\right)\left({\alpha}_{2}Q{g}_{2{b}_{1}}+x\right)}>\frac{\theta x}{\left(\theta +1\right)Q{\alpha}_{1}}\right],$

To solve

${P}_{\mathrm{ST}1}^{out\_upper}$ in (

22), we use two lemmas as follows:

**Lemma** **1.** A${}_{1}$ is obtained by a closed-form expression as follows:where $\psi =\frac{\theta}{Q({\alpha}_{1}-\theta {\alpha}_{2})}$. **Lemma** **2.** The following expression is valid for A${}_{2}$: **Proof.** The proof of Lemma 2 is presented clearly in

Appendix B.

The exact upper expression ${P}_{\mathrm{ST}1}^{out\_upper}$ of the SOP ${P}_{\mathrm{ST}1}^{out\_{D}_{1}}$ is provided in the following theorem. ☐

**Theorem** **1.** The upper expression ${P}_{\mathrm{ST}1}^{out\_upper}$ is obtained by the expression as:where ${\mathrm{I}}_{1}=\underset{0}{\overset{\infty}{\int}}{\displaystyle \underset{px}{\overset{\infty}{\int}}\left[\begin{array}{c}exp\left(-{\lambda}_{1}x+nx-\frac{{\lambda}_{4}x}{\left(\theta +1\right){\alpha}_{2}Q}+\frac{{\lambda}_{2}x}{{\alpha}_{2}Q}\right)\hfill \\ \times exp\underset{px}{\overset{\infty}{\int}}exp\left(\frac{{\lambda}_{4}{x}^{2}}{\left(\theta +1\right){\alpha}_{2}Q\mathrm{z}}-\frac{{\lambda}_{2}z}{{\alpha}_{2}Q}\right){\left(1-exp(-\frac{{\lambda}_{2}\left(z-x\right)}{{\alpha}_{2}Q})\right)}^{M-1}\hfill \end{array}\right]}\phantom{\rule{0.166667em}{0ex}}dzdx$ and $n=\frac{{\lambda}_{4}\theta}{\left(\theta +1\right){\alpha}_{1}Q}$.

**Proof.** Substituting Lemma 1 and Lemma 2 into (

22),

${P}_{\mathrm{ST}1}^{out\_upper}$ is shown in two cases as:

-When

${\alpha}_{1}\le \theta {\alpha}_{2}$:

-When

${\alpha}_{1}>\theta {\alpha}_{2}$:

where

$\phi =\frac{xy}{(\theta +1)\left({\alpha}_{2}Qy+x\right)}-\frac{\theta x}{\left(\theta +1\right){\alpha}_{1}Q}.$A

${}_{3}$ in (

26b) is calculated as

where

${C}_{m}^{n}=\frac{\left(m\right)!}{n!\left(m-n\right)!}.$The A

${}_{4}$ in (

26b) is presented as:

By setting

$z={\alpha}_{2}Qy+x$, A

${}_{4}$ in (

28) is given as:

where

$p={\alpha}_{2}Q\psi +1.$Substituting A

${}_{3}$ in (

27) and A

${}_{4}$ in (

29) into (

26b),

${P}_{\mathrm{ST}1}^{out\_upper}$ is obtained as:

With the results of (

29) and (

26b), Theorem 1 in (

25) is proven successfully.

Finally, we calculate the SOP of the ST1 case in which the destination node D

${}_{2}$ does not receive the signal safely from the source node S through the best relay R

${}_{b1}$ under the malicious attempt of the eavesdropper E as follows:

Substituting Formula (

15) into (

31),

${P}_{\mathrm{ST}1}^{out\_{D}_{2}}$ is obtained as:

Replacing Formula (

13),

$\phantom{\rule{0.166667em}{0ex}}\phantom{\rule{0.166667em}{0ex}}{P}_{R}=\frac{{I}_{th}}{{g}_{1i}}$,

$Q=\frac{{I}_{th}}{{N}_{0}}$ into (

32),

${P}_{\mathrm{ST}1}^{out\_{D}_{2}}$ is expressed as:

By performing the pdf of the random variables

${g}_{1{b}_{1}}$,

${g}_{4{b}_{1}}$ and the cdf of the random variable

${g}_{3{b}_{1}}$, (

33) is achieved by the closed-form expression as:

Finally, from (

25) and (

34), the sum SOP of ST1 is constrained by the upper expression as:

$Sum\phantom{\rule{0.166667em}{0ex}}{P}_{S\mathrm{T}1}^{out}={P}_{S\mathrm{T}1}^{out\_{D}_{1}}\phantom{\rule{0.166667em}{0ex}}+\phantom{\rule{0.166667em}{0ex}}{P}_{S\mathrm{T}1}^{out\_{D}_{2}}$
☐

#### 3.2. The SOP of the Secrecy Transmission in the Proposed UCCN-NOMA System with the Best Relay Selection: Case ST2

Similar to

Section 3.1, first, we find the best relay

${R}_{{b}_{2}}$ based on the maximum channel gain of the R

${}_{i}$-D

${}_{2}$ link. Next, we calculate the SOPs of the ST2 case in which the destination nodes D

${}_{1}$, D

${}_{2}$ do not receive the signal safely from the source node S through

${R}_{{b}_{2}}$ under the malicious attempt of the eavesdropper E. Finally, we calculate their sum SOPs.

Firstly, we calculate the best relay similarly as the expression of the best relay

${R}_{{b}_{1}}$ in

Section 3.1, and the best relay

${R}_{{b}_{2}}$ is selected based on a criterion as follows:

The cdf and pdf of the random variable

${g}_{3{b}_{2}}$ is expressed similarly as (

17) and (

18) and is shown as

${F}_{{{g}_{3}}_{{b}_{2}}}\left(a\right)={\left(1-{e}^{-{\lambda}_{3}a}\right)}^{M}$,

${f}_{{{g}_{3}}_{{b}_{2}}}\left(a\right)=M{\lambda}_{3}{e}^{-{\lambda}_{3}a}{\left(1-{e}^{-{\lambda}_{3}a}\right)}^{M-1}.$ The SOP of the ST2 case occurs when the destination D

${}_{2}$ does not receive signals

${x}_{2}$ safely from the source node S. The SOP of the ST2 is obtained by a math expression as follows:

Substituting Formula (

15) into (

37),

${P}_{\mathrm{ST}2}^{out\_{D}_{2}}$ is calculated as:

Replacing Formula (

13),

$\phantom{\rule{0.166667em}{0ex}}\phantom{\rule{0.166667em}{0ex}}{P}_{R}=\frac{{I}_{th}}{{g}_{1i}}$,

$Q=\frac{{I}_{th}}{{N}_{0}}$ into (

37),

${P}_{\mathrm{ST}2}^{out\_{D}_{2}}$ is expressed as:

Similar to (

33), the probability

${P}_{\mathrm{ST}2}^{out\_{D}_{2}}$ in (

39) is shown by the closed-form expression as follows:

Second, we calculate the SOP of the ST2 case in which the destination node D

${}_{1}$ does not receive the signal safely from the source node S through the best relay R

${}_{b2}$ under the malicious attempt of the eavesdropper E as follows:

By substituting (

9) and (

13) into (

40), we have an expression of

${P}_{\mathrm{ST}2}^{out\_{D}_{1}}$ as follows:

Similar to solving

${P}_{\mathrm{ST}1}^{out\_{D}_{1}}$, we consider the worst case in which the node E can take data

${x}_{1}$ with the best condition. We rewrite (

41), an upper constraint of

${P}_{\mathrm{ST}2}^{out\_{D}_{1}}$, as follows:

We calculate

${P}_{\mathrm{ST}2}^{out\_{D}_{1}}$ similar to

${P}_{\mathrm{ST}1}^{out\_{D}_{1}}$, and after some algebra, the probability of

${P}_{\mathrm{ST}2}^{out\_{D}_{1}}$ can be expressed as:

where

${\mathrm{I}}_{2}=\underset{0}{\overset{\infty}{\int}}\underset{px}{\overset{\infty}{\int}}\left[\begin{array}{c}exp\left(-{\lambda}_{1}x+nx-\frac{{\lambda}_{4}x}{\left(\theta +1\right){\alpha}_{2}Q}+\frac{{\lambda}_{2}x}{{\alpha}_{2}Q}\right)\hfill \\ \times exp\underset{px}{\overset{\infty}{\int}}exp\left(\frac{{\lambda}_{4}{x}^{2}}{\left(\theta +1\right){\alpha}_{2}Q\mathrm{z}}-\frac{{\lambda}_{2}z}{{\alpha}_{2}Q}\right)\hfill \end{array}\right]\phantom{\rule{0.166667em}{0ex}}dzdx$.

From Formulas (

40) and (

43), we have the sum SOPs of ST2 constrained by the upper expression as:

$Sum\phantom{\rule{0.166667em}{0ex}}{P}_{S\mathrm{T}2}^{out}={P}_{S\mathrm{T}2}^{out\_{D}_{1}}\phantom{\rule{0.166667em}{0ex}}+\phantom{\rule{0.166667em}{0ex}}{P}_{S\mathrm{T}2}^{out\_{D}_{2}}$ #### 3.3. The SOP of the Secrecy Transmission in the Proposed UCCN-NOMA System with the Best Relay Selection: Case ST3

In this case, we find the best relay

${R}_{{b}_{3}}^{}$ based on the minimum channel gain of the R

${}_{i}$-E link. The SOPs of the ST3 case in which the destination nodes D

${}_{1}$ and D

${}_{2}$ do not receive the signal safely from the source node S under the malicious attempt of the eavesdropper E are expressed next. Finally, we calculate their sum SOPs. The best relay selection is given as:

The cdf and pdfof the random variable

${g}_{4{b}_{3}}$ are calculated as:

The SOP of the ST3 case is similar to those in

Section 3.1 and

Section 3.2 and is shown by two math expressions, respectively, as follows:

By replacing Formula (

13),

${P}_{R}=\frac{{I}_{th}}{{g}_{1i}}$,

$Q=\frac{{I}_{th}}{{N}_{0}}$ into (

48) and (

49), finally, we can easily calculate the probability

${P}_{\mathrm{ST}3}^{out\_{D}_{2}}$,

${P}_{\mathrm{ST}3}^{out\_{D}_{1}}$, respectively, as:

-When

${\alpha}_{1}\le \theta {\alpha}_{2}$:

-When

${\alpha}_{1}>\theta {\alpha}_{2}$:

where

${\mathrm{I}}_{3}=\underset{0}{\overset{\infty}{\int}}\underset{px}{\overset{\infty}{\int}}\left[\begin{array}{c}exp\left(-{\lambda}_{1}x+\frac{M{\lambda}_{4}\theta}{\left(\theta +1\right){\alpha}_{1}Q}x-\frac{M{\lambda}_{4}x}{\left(\theta +1\right){\alpha}_{2}Q}+\frac{{\lambda}_{2}x}{{\alpha}_{2}Q}\right)\hfill \\ \times exp\underset{px}{\overset{\infty}{\int}}exp\left(\frac{M{\lambda}_{4}{x}^{2}}{\left(\theta +1\right){\alpha}_{2}Q\mathrm{z}}-\frac{{\lambda}_{2}z}{{\alpha}_{2}Q}\right)\hfill \end{array}\right]\phantom{\rule{0.166667em}{0ex}}dtdx.$From Formulas (

51), (

52a), and (

52b),

$Sum\phantom{\rule{0.166667em}{0ex}}{P}_{S\mathrm{T}3}^{out}$ is obtained as:

$Sum\phantom{\rule{0.166667em}{0ex}}{P}_{S\mathrm{T}3}^{out}={P}_{S\mathrm{T}3}^{out\_{D}_{1}}\phantom{\rule{0.166667em}{0ex}}+\phantom{\rule{0.166667em}{0ex}}{P}_{S\mathrm{T}3}^{out\_{D}_{2}}$
I

${}_{1}$ in (

35), I

${}_{2}$ in (

45), and I

${}_{3}$ in (

53) contain the complex integrals, and solving of these integrals is not practical. However, we can use numerical methods to find the value of I

${}_{1}$, I

${}_{2}$, and I

${}_{3}$.

## 4. Simulation Results

In this section, the SOPs of ST1, ST2 and ST3 are analyzed and evaluated using the theoretical analyses and the Monte Carlo simulations. In the two-dimensional plane, the coordinates of S, R

${}_{i}$, D

${}_{1}$, D

${}_{2}$, Pu, and E were set as S(0, 0), R

$\left({x}_{R},0\right)$, D

${}_{1}$(1, 0), D

${}_{2}$$\left({x}_{{D}_{2}},{y}_{{D}_{2}}\right)$, Pu

$\left({x}_{Pu},{y}_{Pu}\right)$, E

$\left({x}_{E},{y}_{E}\right)$, respectively, satisfying

$\left(0<{x}_{R},{x}_{{D}_{2}},{x}_{E}\right)$. Therefore,

${d}_{S{R}_{b}}={x}_{R}$,

${d}_{{R}_{b}{D}_{1}}={x}_{{D}_{1}}-{x}_{R}$,

${d}_{{R}_{b}{D}_{2}}=\sqrt{{\left({x}_{{D}_{2}}-{x}_{R}\right)}^{2}+{y}_{{D}_{2}}^{2}}$,

${d}_{{R}_{b}Pu}=\sqrt{{\left({x}_{Pu}-{x}_{R}\right)}^{2}+{y}_{Pu}^{2}}$, and

${d}_{{R}_{b}E}=\sqrt{{\left({x}_{E}-{x}_{R}\right)}^{2}+{{y}_{E}}^{2}}$. We assumed that the target secrecy capacity and the path-loss exponent were set to constants,

$S{C}_{th}=1$ (bits/s/Hz) and

$\beta =3$. The value range of

$\beta $ can be from 2–7, which depends on the transmission environments. To simplify the presentation, the parameters used to simulate and analyze are summarized in

Table 1 as follows.

Figure 3 presents the sum SOPs of ST1, ST2 and ST3 versus Q(dB) when the symmetric network model is considered with M = 3,

${\alpha}_{1}=0.8$,

${\alpha}_{2}=0.2$,

$\beta =3$, SC

${}_{th}$ = 1 (bit/s/Hz),

${d}_{{R}_{b}Pu}=1$,

${d}_{{R}_{b}{D}_{1}}=0.5$,

${d}_{{R}_{b}{D}_{2}}=1$,

${d}_{{R}_{b}E}=1$. As shown in

Figure 3, we can see that the secrecy performance of ST3 outperformed ST1 and ST2. The sum SOPs of ST1, ST2 and ST3 decreased when Q(dB) increased due to the increment of transmit powers. This can be explained by applying the NOMA technique and the selected relay method as in

Section 3.1,

Section 3.2 and

Section 3.3.

In

Figure 4, we compare the sum SOPs with two defined thresholds in two values: Case 1, SC

${}_{th}$ = 0.7 (bit/s/Hz), and Case 2, SC

${}_{th}$ = 1 (bit/s/Hz). It is clear that the lower the threshold is, the better the sum SOPs becomes. Lastly, the simulation results in

Figure 3 and

Figure 4 were suitable for the theoretical results of ST1, ST2, and ST3. Hence, we can conclude that the derived formulas during the analysis were accurate.

Figure 5 presents the sum SOPs versus the location of the eavesdropper node E when the symmetric network model is considered with M = 3,

${\alpha}_{1}=0.8$,

${\alpha}_{2}=0.2$,

$\beta =3$, Q (dB) = 10 dB, SC

${}_{th}$ = 1 (bit/s/Hz), and

${d}_{{R}_{b}E}$ moves from one to three. In

Figure 5, the sum SOPs of ST3 are also smaller than the sum SOPs of ST1 and ST2. The simulation results and the theoretical results are logical. In addition, we can see that if the

${d}_{{R}_{b}E}$ value increased, the sum SOPs decreased. This result means that the security of the system is very good when eavesdropper node E is far from the source and cooperative relay.

Figure 6 presents the sum SOPs versus Q(dB) when M = 3,

${\alpha}_{1}=0.8$,

${\alpha}_{2}=0.2$,

$\beta =3$, SC

${}_{th}$ = 1 (bit/s/Hz),

${d}_{{R}_{b}{D}_{2}}=0.6$, and

${d}_{{R}_{b}{D}_{2}}=1$. As can be observed from

Figure 6, the sum SOPs of ST1, ST2, and ST3 decreased at the higher Q(dB) regions. This clear because the proposed UCCN-NOMA system used NOMA, and the considered PLS with the best relay selection achieved higher secrecy efficiency. When link distance

${d}_{{R}_{b}{D}_{2}}=0.6$, the security of the system is better than when

${d}_{{R}_{b}{D}_{2}}=1$. However, the security of system in ST2 is smaller than two for the remaining cases due to D

${}_{2}$ being near the relay.

In

Figure 7, we investigate the impact of power allocation coefficients on the security performance of the UCCN system with the NOMA solution. In this figure, we show the impacts of varying

${\alpha}_{1}$ and

${\alpha}_{2}$ on the system. When

${\alpha}_{1}$ increased, the SOPs of the secrecy transmission of the signals

${x}_{1}$ and

${x}_{2}$ decreased and moved to small values. It is noticed that the power allocation coefficients in

Figure 7 can result in significant capacity gains in the UCCN system with NOMA and the best relay selection solution.