SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA, Vol.17, No.5, October 2019, pp.2200~2207
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i5.11111 ◼ 2200
Received September 5, 2018; Revised January 1, 2019; Accepted March 12, 2019
Comparison study on secrecy probability of AF-NOMA
and AF-OMA networks
Dinh-Thuan Do*1
, Minh-Sang Van Nguyen2
, Thi-Anh Hoang3
1
Wireless Communications Research Group, Ton Duc Thang University, Ho Chi Minh City, Vietnam
1
Faculty of Electrical & Electronics Engineering, Ton Duc Thang University,
Ho Chi Minh City, Vietnam
2,3
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Vietnam
*Corresponding author, e-mail: dodinhthuan@tdtu.edu.vn1
, nguyenvanminhsang@iuh.edu.vn2
,
hoangthianh@iuh.edu.vn3
Abstract
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of
non-orthogonal multiple access (NOMA) considered in this study. This system model employs
Amplify-and-Forward (AF) relaying scheme to serve far users. In this scheme, a transmitter sends
confidential signal to far users. It can be raised falling performance in the presence of an external
eavesdropper in such NOMA system. With regard to orthogonal multiple access (OMA), performance of
NOMA system model is compared. In particular, tradeoff the SPSC performance and transmit SNR is
examined. In this study, the SPSC is evaluated as the secrecy metric to limit impacts of the practical
passive eavesdropper in real scenario. It is confirmed that the secrecy performance of NOMA is
significantly lower than OMA due to related parameters characterization in NOMA, and it should be
controlled by varying related coefficients. As main results, both of NOMA and OMA against to impact of
eavesdropper is studied in terms of analytically result and numerically result.
Keywords: non-orthogonal multiple access, physical layer security, secrecy outage probability
Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
In order to satisfy the continuous progress of mobile users and fast development of
Internet of things (IoT), new techniques should be addressed. In this circumstance, the fifth
generation (5G) wireless communication networks have challenges on an explosive demand on
low latency and massive connection while they are under limited radio resources.
Non-orthogonal multiple access (NOMA) has shown the potential, and it is considered as a
promising technology in 5G networks [1–3]. Main advantages including improved spectral
efficiency, enlarge connections, and low access latency. Compared with the traditional
orthogonal multiple access (OMA), NOMA simultaneously serves a many user with the same
radio resource by using superposition coding, at transmitter. At receiver side, by implementing
the successive interference cancellation (SIC), different users with different power levels can be
detected after eliminating the multiuser interference.
In NOMA, user fairness is also a important feature of NOMA. In comparison with
conventional waterfilling power allocation, NOMA intends to distribute less power to users
with better channel conditions and more power to users with worse channel conditions, and
hence an improved trade-off between system throughput and user fairness is resolved.
Therefore, multiple users are operated at the same time, frequency and spreading codes but
different power level, which leads to an increase in spectral efficiency and user fairness is
guaranteed as well.
In [4-8], the reliability of wireless network will be improved as relay is employed.
The outage and throughput performance of such relaying scheme provide large coverage and
high-speed data rates for next generation wireless networks. Deploying relaying scheme to
NOMA, the authors in [9] investigated for cooperative NOMA (C-NOMA) networks in term of
the achievable average rate. In [10], multiple-antenna cooperative network is applied to NOMA
to improve the system performance, and the system outage probability was then analyzed.
TELKOMNIKA ISSN: 1693-6930 ◼
Comparison study on secrecy probability of AF-NOMA and AF-OMA… (Dinh-Thuan Do)
2201
The multiple-input-multipleoutput (MIMO) assisted NOMA networks are examined in
term of ergodic capacity maximization problem and they presented an optimal power allocation
scheme [11]. In [12], a cellular downlink NOMA networks were studied in two metrics such as
the outage behavior and the ergodic sum rate. Generally, improved system capacity and
enhanced reliability are main characterization in C-NOMA networks which continous attracted
some attentions. In [13], NOMA was applied to improve the spectral efficiency as coordinated
directed and relay transmission are joint deployed. In [14], the authors proposed a new
detection scheme to perform applications in the C-NOMA network. They presented a suboptimal
and practical power allocation strategy [14].
Additionally, as a reliable additional layer of network, physical layer security (PLS) has
been proposed to protect against wiretapping. PLS has many advantages in comparison with
conventional cryptographic methodologies. We can enhance network security by deploying
the main characterization of wireless channels as they are in random manner. Recently, a lot of
paper from the research community to show the performance of PLS, e.g., in relay
networks [15] and cognitive relay networks [16]. Interestingly, it can be incooperate emerging
techniques [17-21] with NOMA to form reliable NOMA. The recent works reported in [22-25]
exhibits benefits as implementation of NOMA, and they need be considered secure
performance as existence of eavesdropper. Motivated by above analysis and interesting results
presented in [15], this paper first introduces analytical expressions of SPSC performance to
compare with OMA scheme by controlling related coefficients consisting of SNR, power
allocation factor.
2. System model
This paper introduces in Figure 1 new model including a base station (S), two users
with strong user D1, and weak user D2, a helping relay, and unwanted eavesdropper (E) in a
NOMA-aware cellular network. Regarding wireless channel, all the channels follow independent
Rayleigh distribution fading. It worth noting that in non-secure circumstance, signal obtained
the messages from relay to users can be overhear by user E, including the forwarding signal at
relays, and corresponding decoding procedure. All links at each node pair of S-R, R-D1, R-D2,
R-E have channel gains are represented by
2
SR
h ,
2 2
1 2
,D D
g g , and
2
E
g , respectively. Then,
SR
 , 1D
 , 2D
 and E
 are called as the Rayleigh channel coefficients corresponding to channel
2
SR
h ,
2 2
1 2
,D D
g g , and
2
E
g , respectively. Next, , R
P P are transmit power at node S and R and
noise power terms denoting as 0
N at normal nodes are the same, and node E is E
N . In
considered situation, node S is located in the center of the cell, and user D1 located cell-center
while user D2 and user E are very close to the cell-edge. In this scenario no direct links are
existed between S and the users, as well as E. We further assume that single antennas
equipped at all nodes in the network.
Figure 1. System model of secure NOMA as existence of eavesdropper
Relay- R
S
D1
D2
E
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2200-2207
2202
To perform NOMA transmission, the received signal at the relay R is given by
( )1 1 2 2 ,NOMA
SR SR SRy h Ps Ps n = + + (1)
where 1 2,s s are the normalized signal dedicated for D1, D2, respectively, SRn is AWGN noise It
is assumed that    2 2
1 2 1E s E s= = . In NOMA, 1 2,  are denoted as power allocation factors and
we assume that 1 2  to stipulate better fairness between the users. It is further required
1 2 1 + = .
In the second time slot, the relay amplifies and forwards its received signals by using
AF schem to the two NOMA users. Then, the received signal at the user iD is
 , 1,2NOMA NOMA
RD Di SR RDy g y n i= + =
, (2)
where  is the amplifying factor given by 2
0
R
SR
P
P h N
 =
+
, RDn is AWGN noise.
Based received signal at destination, we obtain the following instantaneous
signal-to-interference-plus-noise ratio (SINR) as
2 22
1 1
2 2 2 22
2 1 1
1
1
SR D
SR D D SR
NOMA h g
h g g h


  
=
+ ++
,
(3)
2 22
2 2
2 2
2
2
1
SR D
D SR
NOMA h g
g h


 
=
+ +
.
(4)
then, the instantaneous rates are computed at Di
( )2
0.5log 1 ,
NOMA NOMA
Di i
R = + (5)
where 0 0RP N P N = = stands for transmit SNR at node S. In trusted relay-based NOMA,
the parallel interference cancellation (PIC) is used at E to distinguish the superimposed mixture.
Then, we can express the channel capacity from the relay to E as
( )2
0.5log 1 ,
NOMA NOMA
Ei Ei
R = + (6)
where
2 2 2
2 2
1
NOMA E SR E i
Ei
E E SR
h g
g h
 

 
=
+ +
is the received SINR at E, while E ERP N = is the average
SNR of the illegal link between the relay and E.
It is denoted
NOMA
Ei
R as channel capacity at , 1, 2i
D i = , the AF-based NOMA systems
obtain secrecy rate of the for user , 1, 2i
D i = is given by
,
NOMA NOMA NOMA
i Di Ei
R R
+
= −   (7)
where    max , 0 .x x
+
=
TELKOMNIKA ISSN: 1693-6930 ◼
Comparison study on secrecy probability of AF-NOMA and AF-OMA… (Dinh-Thuan Do)
2203
3. SPSC in NOMA
In NOMA systems, SPSC is important metric to examine performance in situation that
using the helping relay to forward two signals from the S to far users consisting of D1 and D2.
In principle, SPSC is defined as probability to its related instantaneous rates is positive umber.
In particular, we calculate SPSC as
( )
( )
1 2
1 1 2 2
Pr 0 0
Pr , .
NOMA NOMA
NOMA NOMA NOMA NOMA
E E
NOMA
AFSPSC or 
   
=  
=  
(8)
In such case 1 2 1, ,
NOMA NOMA NOMA
E   and 2
NOMA
E
 are correlated and these factors results
in untractable exact computation. Fortunately, it can be achieved the following upper bounds as
2
1
2
2
1
NOMA 

  ,
2 22
2
2 22
SR E
E SR
NOMA h g
g h

 
 
+
and
2 2 2
2 2
, 1, 2E SR E i
E E SR
NOMA
Ei
h g
i
g h
 
 
  =
+
then, approximate expression of
NOMA
AFSPSC can be obtained as
2 2 2 2 2 22 2 2
1 2 2
2 2 2 2 2 2
2
1
2
2
Pr , .E SR E SR E E SR E
E E SR E SR E E SR
NOMA
AF
h g h g h g
SPSC
g h g h g h
    
     


  
+ + +
 
 
  (9)
it is noted that using inequality ( )  min ,xy x y x y+  , we further compute SPSC as
( )
( ) ( )
2
2 221
12
2
2 2 2 2
2
min , ,
Pr .
min , min ,
SR E E
NOMA
AF
SR D SR E E
SPSC
h g
h g h g

  

   

 
 
 
 
 
 
(6)
(10)
to address this, we use the fact ( ) ( ) ( )1 2 1 1 2Pr , Pr Pr ,e e e e e= − , where 2e denotes
the complementary event of 2e . Then, we have
( ) ( )1
2 2 2 2
2 ,min , min ,SR D SR E Ee h g h g   = 
(11)
( )2
2
2 22 1
1 2
2
min ,SR E Ee h g

  

= 
.
(12)
therefore,
NOMA
AFSPSC can be further computed as
( ) ( )1 1 2Pr Pr ,NOMA
AFSPSC e e e= − .
(13)
applying some manipulations, ( )1Pr e is given by
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2200-2207
2204
( ) ( )( )
( )
( )
( )
2
2
0
2 2
1 2
2
Pr min
exp exp
Pr ,
.
E E
SR D E
E E
SR D
E
SR D E E
g
x x dx
e h g 
  
 

 

   

= 
+
= − −
 
 
 
=
+ +
 (14)
therefore, ( )1 2Pr ,e e can be computed as
( ) ( )
( )
( )
( )
2
2
2
11 2
2
2
2 2
Pr , exp exp
1
exp .
E
SR D E
E E
SR D EE
E
SR D E E E
e e x x dx
 
  
 

  

      
 + 
= − − 
 
 + 
= − +   + +   

(15)
finally, AF based NOMA systems is evaluated in term of SPSC metric as
( )
( )2
2
2 2 2
.
1
1 exp SR D ENOMA E
AF E
SR D E E E
SPSC
  

      
  + 
= − − +     + +    
(16)
4. SPSC in Benchmark of OMA
In OMA mode, the received signal at the relay can be written as
OMA
SR SR i SRy h s P n= +
.
(17)
then, the received signal at the user Di is
OMA OMA
RD Di SR RDy g y n= + . (18)
then, it can be formulated the SINR to evaluate performance of D1 by
2 2
1
2 2
1
1
1
D SR
D SR
OMA g h
g h


 
=
+ +
. (19)
similarly, we can be expressed the SINR to examine performance of D2 by
2 2
2
2 2
2
2
1
D SR
D SR
OMA g h
g h


 
=
+ +
.
(20)
next, as existence of eavesdropper at E, SINR is given by
2 2 2
2 2
1
OMA E SR E i
Ei
E E SR
h g
g h
 

 
=
+ +
. (21)
then, SPSC in OMA mode can be written as
TELKOMNIKA ISSN: 1693-6930 ◼
Comparison study on secrecy probability of AF-NOMA and AF-OMA… (Dinh-Thuan Do)
2205
( )
( )
( ) ( )
1 2
1 1 2 2
2 2 2 2
1 2
1 20
Pr 0 0
Pr ,
Pr ,
exp exp .
OMA OMA
OMA OMA OMA OMA
E E
E E
D E D E
E
D D E E
OMA
AFSPSC or
g g g g
x x dx
 
   
 
 

   


=  
=  
  
 − + −
 
 
 
 
 
 

(22)
interestingly, in similar way with previous section, it can be following result
( )1 2
OMA E
AF
E
D D E
SPSC


  


 
+ + 
 
(23)
5. Numerical Results
In this section, the SPSC performance of the downlink AF-NOMA network under
Rayleigh fading channel is evaluated. These numerical examples are performed to validate
derived formula. Moreover, in order to further evaluation in NOMA, the fixed power allocation is
applied. In the following simulations, we set the fixed power allocation factors for NOMA users
as 1 0.85 = . Without loss of generality, we assume the distance in each link of two-hop relaying
NOMA is normalized to unity. The NOMA result will be compared with OMA counterpart.
Figure 2 plots the SPSC probability of considered NOMA scheme versus transmit SNR
at S for a simulation as setting of varying E . It can be seen that the exact analytical results
and simulation results are matched very well. In particular, at low SNR of E , the SPSC will be
improved. Another important observation is that the SPSC remains constant at high
SNR regime.
In Figure 3, the SPSC versus power allocation factor of
2
1
 is presented in different
impact of parameters related to the eavesdropper. In this case, our parameter is 30 = (dB).
Obviously in this case, the SPSC curves match exactly with the Monte Carlo simulation results.
It is worth noting that the setting of reasonable power allocation factor to achieve optimal
secure performance.
Figure 2. NOMA mode: SPSC vs
the transmit SNR
Figure 3. NOMA mode: SPSC vs
the transmit SNR with different impacts
of eavesdropper
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2200-2207
2206
Figure 4 illustrates SPSC probability versus E as we change  . It can be observed
that the analytical results meet with that in low range of target rate. One can observe that
adjusting the target rates of NOMA users will affect the outage behaviors of considered scheme.
As the value of target rates increases, the outage performance will become worse. This
illustration indicates that our derived expressions are tight result for evaluation in related
NOMA networks.
Figure 5 plots SPSC performance between OMA and NOMA system versus SNR. Here,
we set several cases of SNR of eavesdropper to show its impacts. Furthermore, the AF-based
NOMA scheme is significantly better than OMA scheme in terms of SPSC performance. This
phenomenon indicates that it is of significance to consider the impact of E for such NOMA
scheme when designing practical cooperative NOMA systems.
Figure 4. NOMA mode: SPSC theo E
as varying 
Figure 5. Comparison on SPSC between
OMA and NOMA
6. Conclusion
This paper studied a novel downlink cooperative communication system that compare
NOMA and OMA scenarios in analytical model for SPSC analysis with respect to AF relaying
technique. The impacts of related various parameters in these systems are considered in term
of SPSC performance. Additionally, influence of the SNR of eavesdropper on SPSC
performance in both NOMA and OMA. Especially, the SPSC is achieved at high level as high
transmit SNR can be selected to guarantee quality of secured system. The performance
comparison of the suggested schemes was verified by the numerical results. More importantly,
reducing impact of eavesdropper on strong and weak users of both NOMA and OMA in the
system to approach reasonable performance requirements.
Acknowledgement
This research is funded by Foundation for Science and Technology Development of
Ton Duc Thang University (FOSTECT), website: http://fostect.tdt.edu.vn, under Grant
FOSTECT.2017.BR.21.
References
[1] L Dai, B Wang, Y Yuan, S Han, C-L I, Z Wang. Non-orthogonal multiple access for 5G: solutions,
challenges, opportunities, and future research trends. IEEE Commun. Mag. Sept. 2015. 53(9): 74-81.
[2] F Zhou, Y Wu, RQ Hu, Y Wang, KK Wong. Energy efficient NOMA enabled heterogeneous cloud
radio access networks. IEEE Network. Mar. 2018. 32(2): 152-160.
[3] Z Ding, Y Liu, J Choi, Q Sun, M Elkashlan, CLI, HV Poor. Application of non-orthogonal multiple
access in LTE and 5G networks. IEEE Commun. Mag. 2017. 55(2): 185–191.
TELKOMNIKA ISSN: 1693-6930 ◼
Comparison study on secrecy probability of AF-NOMA and AF-OMA… (Dinh-Thuan Do)
2207
[4] Dinh-Thuan Do, H-S. Nguyen. A Tractable Approach to Analyze the Energy-Aware Two-way
Relaying Networks in Presence of Co-channel Interference. EURASIP Journal on Wireless
Communications and Networking. 2016; 2016: 271.
[5] H-S Nguyen, A-H Bui, Dinh-Thuan Do, M Voznak. Imperfect Channel State Information of AF and DF
Energy Harvesting Cooperative Networks. China Communications. 2016; 13(10): 11-19.
[6] Dinh-Thuan Do. Energy-aware two-way relaying networks under imperfect hardware: optimal
throughput design and analysis. Telecommunication Systems. 2016; 62(2): 449-459.
[7] X-X Nguyen, Dinh-Thuan Do. Maximum Harvested Energy Policy in Full-Duplex Relaying Networks
with SWIPT. International Journal of Communication Systems (Wiley). 2017. 30(17).
[8] T-L Nguyen, Dinh-Thuan Do. A new look at AF two-way relaying networks: energy harvesting
architecture and impact of co-channel interference. Annals of Telecommunications. 2017; 11(72):
669–678.
[9] J Kim, I Lee. Capacity analysis of cooperative relaying systems using non-orthogonal multiple
access. IEEE Commun. Lett. 2015; 19(11): 1949–1952.
[10] J Men, J Ge. Non-orthogonal multiple access for multiple-antenna relaying networks. IEEE Commun.
Lett. 2015; 19(10): 1686–1689.
[11] Q Sun, SF Han, C-L I, ZG Pan. On the ergodic capacity of MIMO NOMA systems. IEEE Wireless
Commun. Lett. 2015; 4(4): 405–408.
[12] Z Ding, Z Yang, P Fan, HV Poor. On the performance of non-orthogonal multiple access in 5G
systems with randomly deployed users. IEEE Signal Process. Lett. 2014; 21(12): 1501–1505.
[13] J Kim, I Lee. Non-orthogonal multiple access in coordinated direct and relay transmission. IEEE
Commun. Lett. 2015; 19(11): 2037–2040.
[14] M Xu, F Ji, MW Wen, W Duan. Novel receiver design for the cooperative relaying system with
non-orthogonal multiple access. IEEE Commun. Lett. 2016; 20(8): 1679–1682.
[15] J Chen, L Yang, M-S. Alouini. Physical layer security for cooperative NOMA systems. IEEE Trans.
Veh. Technol. 2018; 67(5): 4645–4649.
[16] NQ Le, Dinh-Thuan Do, B An. Secure wireless powered relaying networks: energy harvesting policies
and performance analysis. International Journal of Communication Systems (Wiley). 2017; 30(18).
[17] T-T Nguyen, T-P Hoac, Dinh-Thuan Do, V-H Phan, T-L Dao. Android application for WiFi based
indoor position: System design and performance analysis. in Proc. of 2016 International Conference
on Information Networking (ICOIN). 2016; 1(1): 1-4.
[18] H-S Nguyen, Dinh-Thuan Do, T-S Nguyen, M Voznak. Exploiting hybrid time switching-based and
power splitting-based relaying protocol in wireless powered communication networks with outdated
channel state information. Journal for Control, Measurement, Electronics, Computing and
Communications. 2017; 58(1): 111-118.
[19] Dinh-Thuan Do, H-S Nguyen, M Voznak, T-S Nguyen. Wireless powered relaying networks under
imperfect channel state information: system performance and optimal policy for instantaneous rate.
Radioengineering. 2017; 26(3): 869-877.
[20] X-X. Nguyen, Dinh-Thuan Do. Optimal power allocation and throughput performance of full-duplex
DF relaying networks with wireless power transfer-aware channel. EURASIP Journal on Wireless
Communications and Networking. 2017: (1)152: 1-16.
[21] KT Nguyen, Dinh-Thuan Do, XX Nguyen, NT Nguyen, DH Ha. Wireless information and power
transfer for full duplex relaying networks: performance analysis. in Proc. of Recent Advances in
Electrical Engineering and Related Sciences (AETA 2015), HCMC, Vietnam. 2015; 53-62.
[22] Dinh-Thuan Do, C-B Le. Application of NOMA in Wireless System with Wireless Power Transfer
Scheme: Outage and Ergodic Capacity Performance Analysis. Sensors. 2018; 18(10): 3501.
[23] T-L Nguyen, Dinh-Thuan Do. Exploiting Impacts of Intercell Interference on SWIPT-assisted
Non-orthogonal Multiple Access. Wireless Communications and Mobile Computing. 2018; 1-12.
[24] Dinh-Thuan Do, M-S Van Nguyen, T-A. Hoang, M Voznak. NOMA-Assisted Multiple Access Scheme
for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement. Sensors. 2019;
19(3): 736.
[25] Dinh-Thuan Do, T-T T Nguyen. Exact Outage Performance Analysis of Amplify-andForward-Aware
Cooperative NOMA. TELKOMNIKA Telecommunication Computing Electronics and Control. 2018;
16(5): 1966-1973.

More Related Content

What's hot

Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...IRJET Journal
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationSachin Talakeri
 
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...AIRCC Publishing Corporation
 
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...ijcsit
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136IJRAT
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
 
Comparison Static ICIC and Adaptive ICIC on TD-LTE
Comparison Static ICIC and Adaptive ICIC on TD-LTEComparison Static ICIC and Adaptive ICIC on TD-LTE
Comparison Static ICIC and Adaptive ICIC on TD-LTERay KHASTUR
 
Performance Evaluation of DCF Length for High Scalability NG-PON2
Performance Evaluation of DCF Length for High Scalability NG-PON2Performance Evaluation of DCF Length for High Scalability NG-PON2
Performance Evaluation of DCF Length for High Scalability NG-PON2TELKOMNIKA JOURNAL
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksPanimalar Engineering College
 
Iaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd Iaetsd
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
 
Electronics and Communication Engineering : Analog circuits, THE GATE ACADEMY
 Electronics and Communication Engineering : Analog circuits, THE GATE ACADEMY Electronics and Communication Engineering : Analog circuits, THE GATE ACADEMY
Electronics and Communication Engineering : Analog circuits, THE GATE ACADEMYklirantga
 

What's hot (20)

72 129-135
72 129-13572 129-135
72 129-135
 
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
 
Ijecet 06 09_002
Ijecet 06 09_002Ijecet 06 09_002
Ijecet 06 09_002
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial Modulation
 
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
 
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
 
Comparison Static ICIC and Adaptive ICIC on TD-LTE
Comparison Static ICIC and Adaptive ICIC on TD-LTEComparison Static ICIC and Adaptive ICIC on TD-LTE
Comparison Static ICIC and Adaptive ICIC on TD-LTE
 
Performance Evaluation of DCF Length for High Scalability NG-PON2
Performance Evaluation of DCF Length for High Scalability NG-PON2Performance Evaluation of DCF Length for High Scalability NG-PON2
Performance Evaluation of DCF Length for High Scalability NG-PON2
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
 
1 6
1 61 6
1 6
 
Iaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance on
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
Iv2415471554
Iv2415471554Iv2415471554
Iv2415471554
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Electronics and Communication Engineering : Analog circuits, THE GATE ACADEMY
 Electronics and Communication Engineering : Analog circuits, THE GATE ACADEMY Electronics and Communication Engineering : Analog circuits, THE GATE ACADEMY
Electronics and Communication Engineering : Analog circuits, THE GATE ACADEMY
 
HetNet
HetNet HetNet
HetNet
 
Cellular Networks
Cellular NetworksCellular Networks
Cellular Networks
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 

Similar to Secrecy Probability Comparison of AF-NOMA and AF-OMA Networks

Exploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMAExploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMATELKOMNIKA JOURNAL
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...TELKOMNIKA JOURNAL
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATELKOMNIKA JOURNAL
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...TELKOMNIKA JOURNAL
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...nooriasukmaningtyas
 
Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...TELKOMNIKA JOURNAL
 
Non orthogonal multiple access
Non orthogonal multiple accessNon orthogonal multiple access
Non orthogonal multiple accessShalikramRajpoot
 
non-orthogonalmultipleaccess-191112035136.pdf
non-orthogonalmultipleaccess-191112035136.pdfnon-orthogonalmultipleaccess-191112035136.pdf
non-orthogonalmultipleaccess-191112035136.pdfahmadirfan98
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkTELKOMNIKA JOURNAL
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
 
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...journalBEEI
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...journalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...journalBEEI
 
Dynamic user grouping based NOMA
Dynamic user grouping based  NOMADynamic user grouping based  NOMA
Dynamic user grouping based NOMAShubhamSingh1797
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
 
Enhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antennaEnhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antennaTELKOMNIKA JOURNAL
 

Similar to Secrecy Probability Comparison of AF-NOMA and AF-OMA Networks (20)

Exploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMAExploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMA
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
Tractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMATractable computation in outage performance analysis of relay selection NOMA
Tractable computation in outage performance analysis of relay selection NOMA
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...Study on transmission over Nakagami-m fading channel for multiple access sche...
Study on transmission over Nakagami-m fading channel for multiple access sche...
 
Non orthogonal multiple access
Non orthogonal multiple accessNon orthogonal multiple access
Non orthogonal multiple access
 
non-orthogonalmultipleaccess-191112035136.pdf
non-orthogonalmultipleaccess-191112035136.pdfnon-orthogonalmultipleaccess-191112035136.pdf
non-orthogonalmultipleaccess-191112035136.pdf
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...Performance of cluster-based cognitive multihop networks under joint impact o...
Performance of cluster-based cognitive multihop networks under joint impact o...
 
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...Joint impacts of relaying scheme and wireless power transfer in multiple acce...
Joint impacts of relaying scheme and wireless power transfer in multiple acce...
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
 
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...Implement of multiple access technique by wireless power transfer and relayin...
Implement of multiple access technique by wireless power transfer and relayin...
 
Dynamic user grouping based NOMA
Dynamic user grouping based  NOMADynamic user grouping based  NOMA
Dynamic user grouping based NOMA
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
 
Enhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antennaEnhancement algorithm for reverse loop technique on planar reverse loop antenna
Enhancement algorithm for reverse loop technique on planar reverse loop antenna
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Secrecy Probability Comparison of AF-NOMA and AF-OMA Networks

  • 1. TELKOMNIKA, Vol.17, No.5, October 2019, pp.2200~2207 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i5.11111 ◼ 2200 Received September 5, 2018; Revised January 1, 2019; Accepted March 12, 2019 Comparison study on secrecy probability of AF-NOMA and AF-OMA networks Dinh-Thuan Do*1 , Minh-Sang Van Nguyen2 , Thi-Anh Hoang3 1 Wireless Communications Research Group, Ton Duc Thang University, Ho Chi Minh City, Vietnam 1 Faculty of Electrical & Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam 2,3 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Vietnam *Corresponding author, e-mail: dodinhthuan@tdtu.edu.vn1 , nguyenvanminhsang@iuh.edu.vn2 , hoangthianh@iuh.edu.vn3 Abstract The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogonal multiple access (NOMA) considered in this study. This system model employs Amplify-and-Forward (AF) relaying scheme to serve far users. In this scheme, a transmitter sends confidential signal to far users. It can be raised falling performance in the presence of an external eavesdropper in such NOMA system. With regard to orthogonal multiple access (OMA), performance of NOMA system model is compared. In particular, tradeoff the SPSC performance and transmit SNR is examined. In this study, the SPSC is evaluated as the secrecy metric to limit impacts of the practical passive eavesdropper in real scenario. It is confirmed that the secrecy performance of NOMA is significantly lower than OMA due to related parameters characterization in NOMA, and it should be controlled by varying related coefficients. As main results, both of NOMA and OMA against to impact of eavesdropper is studied in terms of analytically result and numerically result. Keywords: non-orthogonal multiple access, physical layer security, secrecy outage probability Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction In order to satisfy the continuous progress of mobile users and fast development of Internet of things (IoT), new techniques should be addressed. In this circumstance, the fifth generation (5G) wireless communication networks have challenges on an explosive demand on low latency and massive connection while they are under limited radio resources. Non-orthogonal multiple access (NOMA) has shown the potential, and it is considered as a promising technology in 5G networks [1–3]. Main advantages including improved spectral efficiency, enlarge connections, and low access latency. Compared with the traditional orthogonal multiple access (OMA), NOMA simultaneously serves a many user with the same radio resource by using superposition coding, at transmitter. At receiver side, by implementing the successive interference cancellation (SIC), different users with different power levels can be detected after eliminating the multiuser interference. In NOMA, user fairness is also a important feature of NOMA. In comparison with conventional waterfilling power allocation, NOMA intends to distribute less power to users with better channel conditions and more power to users with worse channel conditions, and hence an improved trade-off between system throughput and user fairness is resolved. Therefore, multiple users are operated at the same time, frequency and spreading codes but different power level, which leads to an increase in spectral efficiency and user fairness is guaranteed as well. In [4-8], the reliability of wireless network will be improved as relay is employed. The outage and throughput performance of such relaying scheme provide large coverage and high-speed data rates for next generation wireless networks. Deploying relaying scheme to NOMA, the authors in [9] investigated for cooperative NOMA (C-NOMA) networks in term of the achievable average rate. In [10], multiple-antenna cooperative network is applied to NOMA to improve the system performance, and the system outage probability was then analyzed.
  • 2. TELKOMNIKA ISSN: 1693-6930 ◼ Comparison study on secrecy probability of AF-NOMA and AF-OMA… (Dinh-Thuan Do) 2201 The multiple-input-multipleoutput (MIMO) assisted NOMA networks are examined in term of ergodic capacity maximization problem and they presented an optimal power allocation scheme [11]. In [12], a cellular downlink NOMA networks were studied in two metrics such as the outage behavior and the ergodic sum rate. Generally, improved system capacity and enhanced reliability are main characterization in C-NOMA networks which continous attracted some attentions. In [13], NOMA was applied to improve the spectral efficiency as coordinated directed and relay transmission are joint deployed. In [14], the authors proposed a new detection scheme to perform applications in the C-NOMA network. They presented a suboptimal and practical power allocation strategy [14]. Additionally, as a reliable additional layer of network, physical layer security (PLS) has been proposed to protect against wiretapping. PLS has many advantages in comparison with conventional cryptographic methodologies. We can enhance network security by deploying the main characterization of wireless channels as they are in random manner. Recently, a lot of paper from the research community to show the performance of PLS, e.g., in relay networks [15] and cognitive relay networks [16]. Interestingly, it can be incooperate emerging techniques [17-21] with NOMA to form reliable NOMA. The recent works reported in [22-25] exhibits benefits as implementation of NOMA, and they need be considered secure performance as existence of eavesdropper. Motivated by above analysis and interesting results presented in [15], this paper first introduces analytical expressions of SPSC performance to compare with OMA scheme by controlling related coefficients consisting of SNR, power allocation factor. 2. System model This paper introduces in Figure 1 new model including a base station (S), two users with strong user D1, and weak user D2, a helping relay, and unwanted eavesdropper (E) in a NOMA-aware cellular network. Regarding wireless channel, all the channels follow independent Rayleigh distribution fading. It worth noting that in non-secure circumstance, signal obtained the messages from relay to users can be overhear by user E, including the forwarding signal at relays, and corresponding decoding procedure. All links at each node pair of S-R, R-D1, R-D2, R-E have channel gains are represented by 2 SR h , 2 2 1 2 ,D D g g , and 2 E g , respectively. Then, SR  , 1D  , 2D  and E  are called as the Rayleigh channel coefficients corresponding to channel 2 SR h , 2 2 1 2 ,D D g g , and 2 E g , respectively. Next, , R P P are transmit power at node S and R and noise power terms denoting as 0 N at normal nodes are the same, and node E is E N . In considered situation, node S is located in the center of the cell, and user D1 located cell-center while user D2 and user E are very close to the cell-edge. In this scenario no direct links are existed between S and the users, as well as E. We further assume that single antennas equipped at all nodes in the network. Figure 1. System model of secure NOMA as existence of eavesdropper Relay- R S D1 D2 E
  • 3. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 5, October 2019: 2200-2207 2202 To perform NOMA transmission, the received signal at the relay R is given by ( )1 1 2 2 ,NOMA SR SR SRy h Ps Ps n = + + (1) where 1 2,s s are the normalized signal dedicated for D1, D2, respectively, SRn is AWGN noise It is assumed that    2 2 1 2 1E s E s= = . In NOMA, 1 2,  are denoted as power allocation factors and we assume that 1 2  to stipulate better fairness between the users. It is further required 1 2 1 + = . In the second time slot, the relay amplifies and forwards its received signals by using AF schem to the two NOMA users. Then, the received signal at the user iD is  , 1,2NOMA NOMA RD Di SR RDy g y n i= + = , (2) where  is the amplifying factor given by 2 0 R SR P P h N  = + , RDn is AWGN noise. Based received signal at destination, we obtain the following instantaneous signal-to-interference-plus-noise ratio (SINR) as 2 22 1 1 2 2 2 22 2 1 1 1 1 SR D SR D D SR NOMA h g h g g h      = + ++ , (3) 2 22 2 2 2 2 2 2 1 SR D D SR NOMA h g g h     = + + . (4) then, the instantaneous rates are computed at Di ( )2 0.5log 1 , NOMA NOMA Di i R = + (5) where 0 0RP N P N = = stands for transmit SNR at node S. In trusted relay-based NOMA, the parallel interference cancellation (PIC) is used at E to distinguish the superimposed mixture. Then, we can express the channel capacity from the relay to E as ( )2 0.5log 1 , NOMA NOMA Ei Ei R = + (6) where 2 2 2 2 2 1 NOMA E SR E i Ei E E SR h g g h      = + + is the received SINR at E, while E ERP N = is the average SNR of the illegal link between the relay and E. It is denoted NOMA Ei R as channel capacity at , 1, 2i D i = , the AF-based NOMA systems obtain secrecy rate of the for user , 1, 2i D i = is given by , NOMA NOMA NOMA i Di Ei R R + = −   (7) where    max , 0 .x x + =
  • 4. TELKOMNIKA ISSN: 1693-6930 ◼ Comparison study on secrecy probability of AF-NOMA and AF-OMA… (Dinh-Thuan Do) 2203 3. SPSC in NOMA In NOMA systems, SPSC is important metric to examine performance in situation that using the helping relay to forward two signals from the S to far users consisting of D1 and D2. In principle, SPSC is defined as probability to its related instantaneous rates is positive umber. In particular, we calculate SPSC as ( ) ( ) 1 2 1 1 2 2 Pr 0 0 Pr , . NOMA NOMA NOMA NOMA NOMA NOMA E E NOMA AFSPSC or      =   =   (8) In such case 1 2 1, , NOMA NOMA NOMA E   and 2 NOMA E  are correlated and these factors results in untractable exact computation. Fortunately, it can be achieved the following upper bounds as 2 1 2 2 1 NOMA     , 2 22 2 2 22 SR E E SR NOMA h g g h      + and 2 2 2 2 2 , 1, 2E SR E i E E SR NOMA Ei h g i g h       = + then, approximate expression of NOMA AFSPSC can be obtained as 2 2 2 2 2 22 2 2 1 2 2 2 2 2 2 2 2 2 1 2 2 Pr , .E SR E SR E E SR E E E SR E SR E E SR NOMA AF h g h g h g SPSC g h g h g h                 + + +       (9) it is noted that using inequality ( )  min ,xy x y x y+  , we further compute SPSC as ( ) ( ) ( ) 2 2 221 12 2 2 2 2 2 2 min , , Pr . min , min , SR E E NOMA AF SR D SR E E SPSC h g h g h g                       (6) (10) to address this, we use the fact ( ) ( ) ( )1 2 1 1 2Pr , Pr Pr ,e e e e e= − , where 2e denotes the complementary event of 2e . Then, we have ( ) ( )1 2 2 2 2 2 ,min , min ,SR D SR E Ee h g h g   =  (11) ( )2 2 2 22 1 1 2 2 min ,SR E Ee h g      =  . (12) therefore, NOMA AFSPSC can be further computed as ( ) ( )1 1 2Pr Pr ,NOMA AFSPSC e e e= − . (13) applying some manipulations, ( )1Pr e is given by
  • 5. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 5, October 2019: 2200-2207 2204 ( ) ( )( ) ( ) ( ) ( ) 2 2 0 2 2 1 2 2 Pr min exp exp Pr , . E E SR D E E E SR D E SR D E E g x x dx e h g                =  + = − −       = + +  (14) therefore, ( )1 2Pr ,e e can be computed as ( ) ( ) ( ) ( ) ( ) 2 2 2 11 2 2 2 2 2 Pr , exp exp 1 exp . E SR D E E E SR D EE E SR D E E E e e x x dx                     +  = − −     +  = − +   + +     (15) finally, AF based NOMA systems is evaluated in term of SPSC metric as ( ) ( )2 2 2 2 2 . 1 1 exp SR D ENOMA E AF E SR D E E E SPSC              +  = − − +     + +     (16) 4. SPSC in Benchmark of OMA In OMA mode, the received signal at the relay can be written as OMA SR SR i SRy h s P n= + . (17) then, the received signal at the user Di is OMA OMA RD Di SR RDy g y n= + . (18) then, it can be formulated the SINR to evaluate performance of D1 by 2 2 1 2 2 1 1 1 D SR D SR OMA g h g h     = + + . (19) similarly, we can be expressed the SINR to examine performance of D2 by 2 2 2 2 2 2 2 1 D SR D SR OMA g h g h     = + + . (20) next, as existence of eavesdropper at E, SINR is given by 2 2 2 2 2 1 OMA E SR E i Ei E E SR h g g h      = + + . (21) then, SPSC in OMA mode can be written as
  • 6. TELKOMNIKA ISSN: 1693-6930 ◼ Comparison study on secrecy probability of AF-NOMA and AF-OMA… (Dinh-Thuan Do) 2205 ( ) ( ) ( ) ( ) 1 2 1 1 2 2 2 2 2 2 1 2 1 20 Pr 0 0 Pr , Pr , exp exp . OMA OMA OMA OMA OMA OMA E E E E D E D E E D D E E OMA AFSPSC or g g g g x x dx                  =   =       − + −              (22) interestingly, in similar way with previous section, it can be following result ( )1 2 OMA E AF E D D E SPSC          + +    (23) 5. Numerical Results In this section, the SPSC performance of the downlink AF-NOMA network under Rayleigh fading channel is evaluated. These numerical examples are performed to validate derived formula. Moreover, in order to further evaluation in NOMA, the fixed power allocation is applied. In the following simulations, we set the fixed power allocation factors for NOMA users as 1 0.85 = . Without loss of generality, we assume the distance in each link of two-hop relaying NOMA is normalized to unity. The NOMA result will be compared with OMA counterpart. Figure 2 plots the SPSC probability of considered NOMA scheme versus transmit SNR at S for a simulation as setting of varying E . It can be seen that the exact analytical results and simulation results are matched very well. In particular, at low SNR of E , the SPSC will be improved. Another important observation is that the SPSC remains constant at high SNR regime. In Figure 3, the SPSC versus power allocation factor of 2 1  is presented in different impact of parameters related to the eavesdropper. In this case, our parameter is 30 = (dB). Obviously in this case, the SPSC curves match exactly with the Monte Carlo simulation results. It is worth noting that the setting of reasonable power allocation factor to achieve optimal secure performance. Figure 2. NOMA mode: SPSC vs the transmit SNR Figure 3. NOMA mode: SPSC vs the transmit SNR with different impacts of eavesdropper
  • 7. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 5, October 2019: 2200-2207 2206 Figure 4 illustrates SPSC probability versus E as we change  . It can be observed that the analytical results meet with that in low range of target rate. One can observe that adjusting the target rates of NOMA users will affect the outage behaviors of considered scheme. As the value of target rates increases, the outage performance will become worse. This illustration indicates that our derived expressions are tight result for evaluation in related NOMA networks. Figure 5 plots SPSC performance between OMA and NOMA system versus SNR. Here, we set several cases of SNR of eavesdropper to show its impacts. Furthermore, the AF-based NOMA scheme is significantly better than OMA scheme in terms of SPSC performance. This phenomenon indicates that it is of significance to consider the impact of E for such NOMA scheme when designing practical cooperative NOMA systems. Figure 4. NOMA mode: SPSC theo E as varying  Figure 5. Comparison on SPSC between OMA and NOMA 6. Conclusion This paper studied a novel downlink cooperative communication system that compare NOMA and OMA scenarios in analytical model for SPSC analysis with respect to AF relaying technique. The impacts of related various parameters in these systems are considered in term of SPSC performance. Additionally, influence of the SNR of eavesdropper on SPSC performance in both NOMA and OMA. Especially, the SPSC is achieved at high level as high transmit SNR can be selected to guarantee quality of secured system. The performance comparison of the suggested schemes was verified by the numerical results. More importantly, reducing impact of eavesdropper on strong and weak users of both NOMA and OMA in the system to approach reasonable performance requirements. Acknowledgement This research is funded by Foundation for Science and Technology Development of Ton Duc Thang University (FOSTECT), website: http://fostect.tdt.edu.vn, under Grant FOSTECT.2017.BR.21. References [1] L Dai, B Wang, Y Yuan, S Han, C-L I, Z Wang. Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. Sept. 2015. 53(9): 74-81. [2] F Zhou, Y Wu, RQ Hu, Y Wang, KK Wong. Energy efficient NOMA enabled heterogeneous cloud radio access networks. IEEE Network. Mar. 2018. 32(2): 152-160. [3] Z Ding, Y Liu, J Choi, Q Sun, M Elkashlan, CLI, HV Poor. Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Commun. Mag. 2017. 55(2): 185–191.
  • 8. TELKOMNIKA ISSN: 1693-6930 ◼ Comparison study on secrecy probability of AF-NOMA and AF-OMA… (Dinh-Thuan Do) 2207 [4] Dinh-Thuan Do, H-S. Nguyen. A Tractable Approach to Analyze the Energy-Aware Two-way Relaying Networks in Presence of Co-channel Interference. EURASIP Journal on Wireless Communications and Networking. 2016; 2016: 271. [5] H-S Nguyen, A-H Bui, Dinh-Thuan Do, M Voznak. Imperfect Channel State Information of AF and DF Energy Harvesting Cooperative Networks. China Communications. 2016; 13(10): 11-19. [6] Dinh-Thuan Do. Energy-aware two-way relaying networks under imperfect hardware: optimal throughput design and analysis. Telecommunication Systems. 2016; 62(2): 449-459. [7] X-X Nguyen, Dinh-Thuan Do. Maximum Harvested Energy Policy in Full-Duplex Relaying Networks with SWIPT. International Journal of Communication Systems (Wiley). 2017. 30(17). [8] T-L Nguyen, Dinh-Thuan Do. A new look at AF two-way relaying networks: energy harvesting architecture and impact of co-channel interference. Annals of Telecommunications. 2017; 11(72): 669–678. [9] J Kim, I Lee. Capacity analysis of cooperative relaying systems using non-orthogonal multiple access. IEEE Commun. Lett. 2015; 19(11): 1949–1952. [10] J Men, J Ge. Non-orthogonal multiple access for multiple-antenna relaying networks. IEEE Commun. Lett. 2015; 19(10): 1686–1689. [11] Q Sun, SF Han, C-L I, ZG Pan. On the ergodic capacity of MIMO NOMA systems. IEEE Wireless Commun. Lett. 2015; 4(4): 405–408. [12] Z Ding, Z Yang, P Fan, HV Poor. On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Process. Lett. 2014; 21(12): 1501–1505. [13] J Kim, I Lee. Non-orthogonal multiple access in coordinated direct and relay transmission. IEEE Commun. Lett. 2015; 19(11): 2037–2040. [14] M Xu, F Ji, MW Wen, W Duan. Novel receiver design for the cooperative relaying system with non-orthogonal multiple access. IEEE Commun. Lett. 2016; 20(8): 1679–1682. [15] J Chen, L Yang, M-S. Alouini. Physical layer security for cooperative NOMA systems. IEEE Trans. Veh. Technol. 2018; 67(5): 4645–4649. [16] NQ Le, Dinh-Thuan Do, B An. Secure wireless powered relaying networks: energy harvesting policies and performance analysis. International Journal of Communication Systems (Wiley). 2017; 30(18). [17] T-T Nguyen, T-P Hoac, Dinh-Thuan Do, V-H Phan, T-L Dao. Android application for WiFi based indoor position: System design and performance analysis. in Proc. of 2016 International Conference on Information Networking (ICOIN). 2016; 1(1): 1-4. [18] H-S Nguyen, Dinh-Thuan Do, T-S Nguyen, M Voznak. Exploiting hybrid time switching-based and power splitting-based relaying protocol in wireless powered communication networks with outdated channel state information. Journal for Control, Measurement, Electronics, Computing and Communications. 2017; 58(1): 111-118. [19] Dinh-Thuan Do, H-S Nguyen, M Voznak, T-S Nguyen. Wireless powered relaying networks under imperfect channel state information: system performance and optimal policy for instantaneous rate. Radioengineering. 2017; 26(3): 869-877. [20] X-X. Nguyen, Dinh-Thuan Do. Optimal power allocation and throughput performance of full-duplex DF relaying networks with wireless power transfer-aware channel. EURASIP Journal on Wireless Communications and Networking. 2017: (1)152: 1-16. [21] KT Nguyen, Dinh-Thuan Do, XX Nguyen, NT Nguyen, DH Ha. Wireless information and power transfer for full duplex relaying networks: performance analysis. in Proc. of Recent Advances in Electrical Engineering and Related Sciences (AETA 2015), HCMC, Vietnam. 2015; 53-62. [22] Dinh-Thuan Do, C-B Le. Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage and Ergodic Capacity Performance Analysis. Sensors. 2018; 18(10): 3501. [23] T-L Nguyen, Dinh-Thuan Do. Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-orthogonal Multiple Access. Wireless Communications and Mobile Computing. 2018; 1-12. [24] Dinh-Thuan Do, M-S Van Nguyen, T-A. Hoang, M Voznak. NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement. Sensors. 2019; 19(3): 736. [25] Dinh-Thuan Do, T-T T Nguyen. Exact Outage Performance Analysis of Amplify-andForward-Aware Cooperative NOMA. TELKOMNIKA Telecommunication Computing Electronics and Control. 2018; 16(5): 1966-1973.