Abstract
In this paper, we investigate cooperative secure transmission in non-orthogonal multiple access (NOMA) networks where a source (Alice) intends to transmit confidential messages to one legitimate user with high-level security requirement (LU1), and serve another normal one (LU2) simultaneously. In order to enhance the transmission security, a cooperative jammer (Charlie) is employed to confuse multiple non-colluding eavesdroppers (Eves). Taking both secrecy outage restriction of LU1 and the desired quality of service (QoS) requirement of LU2 into consideration, we propose an adaptive power allocation strategy for maximizing secrecy rate. Numerical results are provided to validate that our proposed scheme significantly outperforms the conventional NOMA secure transmission scheme.
1. Introduction
Non-orthogonal multiple access (NOMA), which has shown the potential to significantly improve spectral efficiency, is envisaged as a promising technique for the 5G wireless networks [1,2]. In contrast to the conventional orthogonal multiple access (OMA), NOMA exploits the power domain to serve multiple users simultaneously [3]. Based on multi-antenna techniques, cooperative communication techniques have become attractive strategies to further enhance the performance of wireless systems for the noticeable properties of achieving spatial degrees of freedom and diversity gains [4,5]. The cooperative nodes mainly play two roles including cooperative relaying (CR) [4] and cooperative jamming (CJ) [5]. Specifically, thanks to their benefit of easy deployment, the helper nodes can be adaptively selected to play different roles based on their location [6]. Inspired by its superior performance in improving spectrum efficiency and realizing larger coverage, intensive efforts have been devoted to investigating cooperative NOMA recently for further transmission reliability improvement [7,8,9,10,11]. In [7], users with better channel conditions acted as relays to forward messages for users with low link quality. The authors in [8] have derived the exact expression of the average achievable rate in cooperative NOMA systems. The primary long-distance transceivers were able to achieve spectrum sharing via a NOMA relay in [9]. In the work of [10], the impact of the number of transmit antennas at the base station on outage performance in a multiple-antenna NOMA system has been studied. In [11], aiming to provide FD relaying operation by relying only on low-complexity single antenna relays, a novel buffer-aided algorithm has been presented for two-hop NOMA networks.
Due to the open nature of wireless channels, cooperative NOMA systems offer new possibilities and opportunities for security challenge. Recently, emerging as promising solutions to against eavesdropping and guarantee secure transmission, physical layer security techniques have attracted considerable attention and applied in cooperative NOMA systems [12,13,14,15,16,17,18]. In [12], the authors considered both amplify-and-forward (AF) and decode-and-forward (DF) protocols, and derived analytical expressions for secrecy outage probability (SOP) and secrecy capacity. To maximize the capacity of the systems, a secure two-way relay selection method was proposed for multiple relays networks with two pairs of cellular users [13]. In the work of [14], a novel NOMA-inspired jamming and relaying scheme has been developed to enhance the physical layer security of untrusted relay networks. In [15], an artificial noise (AN)-aided cooperative jamming scheme for multi-input single-output NOMA Cognitive radio networks (CRNs) using simultaneous wireless information and power transfer technology has been proposed to improve the security of the primary network. The works in [16] analyzed analytical and asymptotical expressions of SOP under both random and max-min relay selection schemes for jammer-aided cooperative NOMA networks. In [17], a multi-antenna full-duplex (FD) relay has been introduced in a cooperative NOMA system with two users, and a full-duplex-jamming (FDJam) scheme has been proposed to guarantee the secure transmission for the user with a weak channel. To increase secrecy rate and reduce information leakage, a new cooperative non-orthogonal jamming decode-and-forward (JDF) scheme has been proposed where the source actively sends jamming signals while the relay is forwarding [18].
To the best of our knowledge, there is a lack of research focused on the robust secrecy rate maximization (SRM) problem subject to secrecy outage constraint in jammer-aided cooperative NOMA systems. In this paper, we study cooperative secure transmission in two-user MISO-NOMA networks where one user (LU1) desires a high data rate with security requirement, while the other one (LU2) only subject to a predefined quality of service (QoS) requirement. This scenario commonly exists in many practical applications. For example, some users with high secrecy priority (bank staffs, government officers, etc) will pay more attention to security while others may have low or no secrecy requirements (e.g., a public weather alert). Different from [19,20], a friendly jammer exploiting AN beamforming is employed to disturb multiple eavesdroppers in these considered networks. Specifically, in [16,17,18], the power allocation factor is considered to be fixed in jammer-aided cooperative NOMA networks, while, in this paper, taking both security and performance guarantee into account, an efficient adaptive approach has been developed to obtain the optimal power allocation factor for the secrecy rate maximization. In addition, we define the effective sum rate as the sum rate of the secrecy rate at LU1 and the transmission rate at LU2. Then, the ratio of the effective sum rate to the total power consumption can be defined as effective energy efficiency (EE) accordingly. Simulation results are provided to indicate significant improvements in secrecy performance and effective EE by the proposed scheme compared with the conventional NOMA secure scheme.
Our specific contributions of this paper are summarized as follows:
- Taking multiple eavesdroppers into consideration, we investigate physical layer security in cooperative MISO-NOMA networks. We first derive an accurate closed form expression for SOP. Then, we transform the objective function in the SRM problem under certain SOP into a strictly concave function through strict mathematical proofs.
- Different from the work of [21] in which only one user was served by Alice, in this paper, we investigate cooperative secure transmission in NOMA networks where a source (Alice) intends to transmit confidential messages to one legitimate user with high-level security requirement (LU1), and serve another normal one (LU2) simultaneously. In particular, we consider the upper bound of the power Alice allocates to LU2 to guarantee the QoS constraint at LU2. In addition, we have made a comprehensive discussion and developed an adaptive approach based on different cases to obtain the optimal power allocation factor for solving the SRM problem under certain SOP.
- Numerical results are provided to verify that the proposed scheme enables dynamic transmission. Both the effectiveness and flexibility of our scheme in achieving higher secrecy performance and effective EE have also been demonstrated.
The rest of this paper is organized as follows. The system model and problem formulation is described in Section 2. The proposed scheme is presented in Section 3. Numerical results are provided in Section 4. Finally, the paper is concluded in Section 5.
Notations: Boldface upper and lower cases denote matrices and vectors, respectively. represents identity matrix. denotes the n-dimensional complex space and circularly symmetric complex Gaussian random vector submits to , with mean and covariance matrix . null(X) is the null space of X. Subscripts stands for max-function max. is the probability measure. Exponential distribution with parameter and Gamma distribution with shape parameter and rate parameter is denoted as and , respectively.
2. System Model and Problem Formulation
2.1. System Model
A MISO-NOMA wireless network is considered as shown in Figure 1, in which the source (Alice) intends to serve two single-antenna legitimate users (e.g., LU1 and LU2) in the presence of non-colluding single-antenna eavesdroppers (Eves). Meanwhile, a cooperative jammer (Charlie) is employed to enhance the secrecy performance of the system. Alice and Charlie are assumed to be equipped with and () antennas, respectively. In addition, the set of Eves is defined as .
Figure 1.
Secure transmission in cooperative MISO-NOMA networks.
The channels from Alice to the legitimate users and the m-th Eve are denoted by and , respectively, and we also denote the channels from Charlie to the legitimate users and the m-th Eve by and , respectively. All the channels involved are modeled as quasi-static independent and identically distributed (i.i.d) Rayleigh fading channels. Since the eavesdroppers are passive, we further assume that the perfect knowledge of all the legitimate channels is known at all nodes, while only the statistical CSIs of Eves’ channels are available. Without loss of generality, it is assumed that the channels between Alice and the legitimate users follow the order of [19,22].
For the implementation of NOMA, Alice transmits two information signals and to LU1 and LU2, respectively. We denote as the signals transmitted by Alice, and can be constructed as
where stands for the transmit power budget of Alice and . We denote and as the fraction of the power allocated for and , respectively. Following the NOMA protocol, are allocated with more power, thus the power allocation coefficients satisfy the conditions that and [3]. In addition, aiming to guarantee the effective channel gain of LU1, Alice adopts maximal ratio transmission (MRT), and the beamforming vector is given by [20].
Specifically, in this considered systems, Charlie is employed as an auxiliary node to enhance secrecy performance by generating AN. To eliminate the additional interference at the legitimate users and confuse Eves at the same time, i.e., [23], the transmitted signal at Charlie can be designed as
where represents the transmit power constraint at Charlie, is an orthonormal basis for null(), and denotes the Gaussian jamming signal with distribution .
From Equations (1) and (2), the observed signals at the k-th user and the m-th Eve can be expressed as
where and denote additive complex white Gaussian noise (AWGN) at the k-th user and the m-th Eve, respectively.
In NOMA systems, the legitimate users employ successive interference cancellation (SIC) to detect received signals. Accordingly, LU1 firstly decodes by treating as interference and then applies SIC to decode its intended information . As a result, the signal-to-interference-plus-noise ratio (SINR) at LU1 and LU2 can be described as
In the work of [19], the eavesdropper’s interception capability has been overestimated, while, in this paper, we extend this assumption to a more general case that the eavesdroppers are regarded as ordinary users, which owe no decoding ability [24,25]. Hence, the received SINR of at the m-th Eve can be given by
In order to guarantee secure transmission, the Wyner’s encoding scheme is adopted by Alice, and the transmission rate at users and secrecy rate are denoted as [26] and , respectively. The redundancy rate can be utilized for anti-eavesdropping. According to [5,13,21], in non-colluding Eves scenario, the maximal eavesdropped information is determined by the maximal SNR among all the Eves, thus , and the secrecy outage occurs when . Therefore, the secrecy outage probability (SOP) of LU1 can be described as [5]
Since represents the redundant rate that can be utilized for anti-eavesdropping at LU1, finally, we can rewrite the expression of SOP as
2.2. Problem Formulation
First, we denote the minimum transmission rate required by LU2 as . Hence, the SRM problem under certain SOP can be written as
where represents the maximum allowable SOP. To simplify our analysis, we define and denote the maximum achievable SINR at LU1 as . Consequently, problem (11) can be equivalently reformulated as
3. Proposed Solution for SRM Problem under Certain SOP Constraint
In this section, we develop an efficient adaptive approach to maximize in (12). Particularly, notice from (12) that a threshold in terms of should be provided to meet the desired QoS requirement at LU2. Otherwise, the CJ scheme in [21] is exploited in our considered systems to satisfy secure transmission for LU1.
3.1. Solution for SOP Constraint
Firstly, we assume the QoS requirement at LU2 is satisfied and focus on deriving a more general analysis for the expression of SOP in (12). For simplifying our analysis, we denote , and define new variables as follows:
With the aid of stochastic theory knowledge, , , where , can be easily verified, respectively. According to [5,21,27], due to the fact that the entries of follow independent , the square of each entry’s modulus follows exponential distribution with mean 1, hence we have [28]. Finally, , where can be obtained. As such, the SOP expression in (12) can be rewritten as
From Equations (13)–(17), a closed form expression of can be achieved by referring to [21], and we omit the detailed calculation here for simplicity. Then, can be re-expressed as
Proposition 1.
A closed form expression for the SOP constraint in the SRM problem (12) can be described as
where , and .
Proof.
Since multiple non-colluding Eves are considered in this paper, the SINR at each Eve is independent of each other due to the fact that the functions of independent random variables are independent [5,21]. Thus, the SOP constraint in (12) can be rewritten as
Then, substituting (18) into (20) and doing some transformation, we can obtain Proposition 1. □
3.2. Power Allocation Optimization for LU1
Analyzing Proposition 1, the following results can be obtained and utilized to facilitate our analysis.
Lemma 1.
is a monotonically increasing function of .
Proof.
According to (19), it can be easily verified that . Taking the derivatives on both sides of (17), we have
Thus, the first derivative of can be given by
Hence, . Lemma 1 is established. □
Lemma 2.
is a monotonically increasing function of .
Proof.
From (22), can be calculated as
and it is obvious that the numerator of (23) strictly increases with respect to , while the denominator strictly decreases with respect to . This completes the proof of Lemma 2. □
Proposition 2.
is a strictly concave function of .
Proof.
According to (12), can be given by
Note that the first term on the right-hand side of (25) is shown to be a strictly decreasing function of , and increasing function of for the second one, respectively. Hence, can be obtained. Based on convex optimization theory [29], we can conclude Proposition 2. □
Recalling the transmission rate constraint of LU2 in problem (12), the upper bound of can be calculated by
Then, taking into account, we utilize the aforementioned results to derive an efficient approach for solving (10). The details are discussed in the following different cases.
(1) Case 1: . The given QoS requirement at LU2 can not be satisfied. Thus, Alice stops serving LU2, and adopts the conventional orthogonal multiple access (OMA) CJ scheme in [21] to guarantee secure transmission for LU1. Note that the restriction of will be replaced by .
(2) Case 2: . From (12), the required transmission rate of LU2 will always be established if . Hence, (10) can be simplified as
and the CJ scheme in [21] is implemented to solve the SRM problem in (12). Specifically, in this situation, can be regarded as artificial noise generated by Alice to strengthen the secrecy performance of LU1.
(3) Case 3: . There must be a trade-off between secrecy rate and QoS. We denote and as the unique optimal solution that satisfies and the corresponding maximum secrecy rate, respectively. Next, different cases are characterized below:
- (a)
- . can be easily verified. Thus, we have , if ; otherwise, .
- (b)
- . Based on the characteristics of the concave function, there must exist a unique . Hence, if , we have ; otherwise, .
- (c)
- . According to (25), we have , and it is optimal for Alice to stop secure transmission, which leads to and .
In the light of the above conclusion, we summarize the details of the overall algorithm in Algorithm 1.
| Algorithm 1 Solution to the SRM problem in (12). | |
| Input:, , , , , , , , , ; | |
| Output:; | |
| 1: | calculate according to (26); |
| 2: | if , |
| Alice stops serving LU2. In addition, the CJ scheme in [21] is carried out at Alice to guarantee secure transmission for LU1; | |
| 3: | else if , |
| the CJ scheme in [21] is implemented to solve the SRM problem in (12); | |
| 4: | else |
| the solution to obtain has been discussed in Case 3; | |
| 5: | end if |
| 6: | return; |
4. Numerical Results
Numerical simulations are presented in this section to compare the proposed scheme with the proposed adaptive scheme with Alice-aided AN beamforming (without relying on Charlie), the Non-CJ-NOMA scheme in [19] and the CJ-OMA scheme (only for LU1) in [21]. We adopt the basic setting , , , , dB, dB, dB, and bit/s/Hz. Note that the aforementioned second scheme is named the Alice-aided scheme, in which AN beamforming is exploited by Alice but not Charlie, and Alice allocates to generate AN for fairness. Here, all the simulation results are averaged over 200 channel realizations.
Figure 2 and Figure 3 compare the secrecy rates and the transmission rates at LU2 achieved by different schemes, respectively. It can be shown that the proposed scheme suffers an inevitable loss of secrecy performance for providing service to LU2 by the NOMA principle compared with the CJ-OMA scheme. From Figure 2, obviously, the secrecy rate of the proposed scheme outperforms the Non-CJ-NOMA scheme, especially when dB and . This is mainly due to the fact that the proposed scheme consists of adaptive strategy adjustment while the NON-CJ-NOMA scheme fails to work in this case. In addition, we can observe from Figure 2 that, thanks to the external jamming signal from Charlie for anti eavesdropping, a much higher secrecy rate can be achieved by the proposed scheme against the Alice-aided scheme when dB. Specifically, when dB, the desired QoS constraint at LU2 can not be satisfied, Alice stops serving LU2 and the CJ scheme in [21] is carried out. When dB, Alice begins to provide service to Rx2 by NOMA principle, and the at LU1 first decreases to zero when dB then increases as increases. Similar results are provided by the adaptive Alice-aided scheme that the QoS requirement at LU2 can not be met when dB, and in this case Alice only provides service to LU1 by adopting the CJ scheme in [21]. Then, the secrecy rate decreases to zero when dB due to the transmit strategy adjustment, and Alice begins to serve both LU1 and LU2 simultaneously when dB. Figure 3 validates the effectiveness of the proposed power allocation strategy that, as increases from −3 dB to 19 dB, is set to be and remains at . Compared with the Non-CJ scheme, when the required QoS at LU2 is satisfied, more power could be allocated to LU1 thanks to the jamming signals generated by Charlie in the proposed scheme. In addition, although both the proposed scheme and the Alice-aided scheme consist of adaptive power allocation adjustment, it can be observed that the first scheme outperforms the second one in a wide range of . The reason is that, compared to the Alice-aided scheme, in the systems exploiting the proposed scheme, the SOP constraint can be satisfied much more easily with the aid of external jamming from Charlie, thus more power could be allocated to serve both LU1 and LU2.
Figure 2.
Secrecy rate vs. the transmit power of Alice .
Figure 3.
Transmission rate vs. the transmit power of Alice .
Figure 4 and Figure 5 demonstrate the effective sum rate and the effective EE performance of all the four schemes, respectively. As shown in Figure 4 and Figure 5, we observe that significantly higher performance of both effective sum rate and effective EE can be achieved by the proposed scheme in a wide range of the total transmit power. Specifically, it can be observed from Figure 5 that there exists a close match between the curves of the proposed scheme and the Alice-aided scheme. This observation indicates that though introducing a cooperative jammer in our considered systems may lead to higher total power consumption, a relatively sufficient effective EE can be achieved by the proposed scheme.
Figure 4.
Effective sum rate vs. the transmit power of Alice .
Figure 5.
Effective energy efficiency vs. the total transmit power + .
5. Conclusions
In this paper, we investigate secure transmission in cooperative MISO-NOMA networks. An efficient adaptive scheme has been developed to solve the SRM problem under certain SOP for the user with high-level security requirement and meanwhile guarantee the predefined transmission rate for another user. Numerical results have been provided to confirm the effectiveness and flexibility of the proposed scheme in enhancing secrecy performance and effective EE. In our future work, imperfect CSI will be further considered to study the secrecy performance of cooperative NOMA networks.
Author Contributions
Conceptualization, Y.C.; Funding acquisition, Z.Z.; Methodology, Z.Z.; Software, Y.C.; Supervision, Z.Z and B.L.; Validation, Y.C.; Writing—original draft, Y.C.; Writing—review and editing, Y.C. and B.L. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by the NSFC under Grant Nos. 61571003, 61671128, 61831004, and 61871070, and in part by the Guangdong province Key project of science and technology under Grant No. 2018B01015001.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Dai, L.; Wang, B.; Yuan, Y.; Han, S.; I, C.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
- Anwar, A.; Seet, B.C.; Hasan, M.A.; Li, X.J. A Survey on Application of Non-Orthogonal Multiple Access to Different Wireless Networks. Electronics 2019, 8, 1135. [Google Scholar] [CrossRef]
- Ding, Z.; Lei, X.; Karagiannidis, G.K.; Schober, R.; Yuan, J.; Bhargava, V.K. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends. IEEE J. Sel. Areas Commun. 2017, 35, 2181–2195. [Google Scholar] [CrossRef]
- Wang, C.; Chen, H.; Yin, Q.; Feng, A.; Molisch, A.F. Multi-User Two-Way Relay Networks with Distributed Beamforming. IEEE Trans. Wirel. Commun. 2011, 10, 3460–3471. [Google Scholar] [CrossRef]
- Chen, Y.; Zhang, Z. UAV-Aided Secure Transmission in MISOME Wiretap Channels With Imperfect CSI. IEEE Access 2019, 7, 98107–98121. [Google Scholar] [CrossRef]
- Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Commun. Surv. Tutur. 2019, 21, 2734–2771. [Google Scholar] [CrossRef]
- Ding, Z.; Peng, M.; Poor, H.V. Cooperative Non-Orthogonal Multiple Access in 5G Systems. IEEE Commun. Lett. 2015, 19, 1462–1465. [Google Scholar] [CrossRef]
- Jiao, R.; Dai, L.; Zhang, J.; MacKenzie, R.; Hao, M. On the Performance of NOMA-Based Cooperative Relaying Systems Over Rician Fading Channels. IEEE Trans. Veh. Technol. 2017, 66, 11409–11413. [Google Scholar] [CrossRef]
- Chen, B.; Chen, Y.; Chen, Y.; Cao, Y.; Zhao, N.; Ding, Z. A Novel Spectrum Sharing Scheme Assisted by Secondary NOMA Relay. IEEE Wirel. Commun. Lett. 2018, 7, 732–735. [Google Scholar] [CrossRef]
- Le, C.B.; Do, D.T.; Voznak, M. Wireless-powered Cooperative MIMO NOMA Networks: Design and Performance Improvement For Cell-Edge Users. Electronics 2019, 8, 328. [Google Scholar] [CrossRef]
- Nomikos, N.; Trakadas, P.; Hatziefremidis, A. Full-Duplex NOMA Transmission with Single-Antenna Buffer-Aided Relays. Electronics 2019, 8, 1482. [Google Scholar] [CrossRef]
- Chen, J.; Yang, L.; Alouini, M. Physical Layer Security for Cooperative NOMA Systems. IEEE Trans. Veh. Technol. 2018, 67, 4645–4649. [Google Scholar] [CrossRef]
- Feng, Y.; Yan, S.; Liu, C.; Yang, Z.; Yang, N. Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1670–1683. [Google Scholar] [CrossRef]
- Lv, L.; Zhou, F.; Chen, J.; Al-Dhahir, N. Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3191–3205. [Google Scholar] [CrossRef]
- Zhou, F.; Chu, Z.; Sun, H.; Hu, R.Q.; Hanzo, L. Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT. IEEE J. Sel. Areas Commun. 2018, 36, 918–931. [Google Scholar] [CrossRef]
- Yu, C.; Ko, H.; Peng, X.; Xie, W.; Zhu, P. Jammer-aided Secure Communications for Cooperative NOMA Systems. IEEE Commun. Lett. 2019, 23, 1935–1939. [Google Scholar] [CrossRef]
- Yuan, C.; Tao, X.; Li, N.; Ni, W.; Liu, R.P.; Zhang, P. Analysis on Secrecy Capacity of Cooperative Non-Orthogonal Multiple Access With Proactive Jamming. IEEE Trans. Veh. Technol. 2019, 68, 2682–2696. [Google Scholar] [CrossRef]
- Cao, Y.; Zhao, N.; Pan, G.; Chen, Y.; Fan, L.; Jin, M.; Alouini, M. Secrecy Analysis for Cooperative NOMA Networks With Multi-Antenna Full-Duplex Relay. IEEE Trans. Commun. 2019, 67, 5574–5587. [Google Scholar] [CrossRef]
- Feng, Y.; Yan, S.; Yang, Z. Secure Transmission to the Strong User in Non-Orthogonal Multiple Access. IEEE Commun. Lett. 2018, 22, 2623–2626. [Google Scholar] [CrossRef]
- Lv, L.; Ding, Z.; Ni, Q.; Chen, J. Secure MISO-NOMA Transmission With Artificial Noise. IEEE Trans. Veh. Technol. 2018, 67, 6700–6705. [Google Scholar] [CrossRef]
- Hu, L.; Wen, H.; Wu, B.; Tang, J.; Pan, F.; Liao, R. Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers. IEEE Trans. Veh. Technol. 2018, 67, 2108–2117. [Google Scholar] [CrossRef]
- Tran, T.N.; Voznak, M. Multi-Points Cooperative Relay in NOMA System with N-1 DF Relaying Nodes in HD/FD Mode for N User Equipments with Energy Harvesting. Electronics 2019, 8, 167. [Google Scholar] [CrossRef]
- Zhu, J.; Wang, Z.; Li, Q.; Chen, H.; Ansari, N. Mitigating Intended Jamming in mmWave MIMO by Hybrid Beamforming. IEEE Wirel. Commun. Lett. 2019, 8, 1617–1620. [Google Scholar] [CrossRef]
- Yu, C.; Yu, L.; Wu, Y.; He, Y. Transmit-Power Minimization for NOMA-Enabled Traffic Offloading With Security Provisioning. IEEE Commun. Lett. 2018, 22, 986–989. [Google Scholar] [CrossRef]
- Zhao, N.; Wang, W.; Wang, J.; Chen, Y.; Lin, Y.; Ding, Z.; Beaulieu, N.C. Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks. IEEE Trans. Commun. 2019, 67, 2294–2305. [Google Scholar] [CrossRef]
- Zhang, Z.; Chen, H.; Hua, M.; Li, C.; Huang, Y.; Yang, L. Double Coded Caching in Ultra Dense Networks: Caching and Multicast Scheduling via Deep Reinforcement Learning. IEEE Trans. Commun. 2020, 68, 1071–1086. [Google Scholar] [CrossRef]
- Li, X.; Zhao, M.; Zhang, C.; Khan, W.U.; Wu, J.; Rabie, K.M.; Kharel, R. Security Analysis of Multi-Antenna NOMA Networks under I/Q Imbalance. Electronics 2019, 8, 1327. [Google Scholar] [CrossRef]
- Li, Y.; Yin, Q.; Sun, L.; Chen, H.; Wang, H. A Channel Quality Metric in Opportunistic Selection With Outdated CSI Over Nakagami- m Fading Channels. IEEE Trans. Veh. Technol. 2012, 61, 1427–1432. [Google Scholar] [CrossRef]
- Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).




