Skip to main content
Top
Published in: Telecommunication Systems 1/2024

07-11-2023

On the leakage-rate performance of untrusted relay-aided NOMA under co-channel interference

Authors: Volkan Ozduran, Nikolaos Nomikos

Published in: Telecommunication Systems | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This study seeks an answer for the impact of the co-channel interference on the leakage rate of illegitimate relay-assisted power-domain non-orthogonal multiple access (NOMA) networks. The power-domain NOMA-based uni-/bi-directional information exchange through an illegitimate half-/full-duplex relay is adopted in the system model. Moreover, a limited number of co-channel interferers and friendly jammers are affected by the illegitimate relay in the network. Extensive computer simulations, analytical, and asymptotic results reveal that as the illegitimate relay is affected by a limited number of friendly jammers and co-channel interferers, its achievable rate cannot be enhanced and saturates at high signal-to-noise ratio. Results also show that the co-channel interference causes system coding gain losses on the users’ outage performance. In addition, the illegitimate relay remains active between \(-\,10\) and 25 dB for uni-/bi-directional information exchange. After 25 dB, the illegitimate relay saturates and experiences outages. Additionally, the order of decoding also impacts the illegitimate relay’s performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Saito, Y., Kishiyama, Y., Benjebbour, A., Nakamura, T., Li, A., & Higuchi, K. (2013). Non-orthogonal multiple access (NOMA) for cellular future radio access. In 2013 IEEE 77th vehicular technology conference (VTC spring) (pp. 1–5). Saito, Y., Kishiyama, Y., Benjebbour, A., Nakamura, T., Li, A., & Higuchi, K. (2013). Non-orthogonal multiple access (NOMA) for cellular future radio access. In 2013 IEEE 77th vehicular technology conference (VTC spring) (pp. 1–5).
2.
go back to reference Ding, Z., Liu, Y., Choi, J., Sun, Q., Elkashlan, M., Chih-Lin, I., & Poor, H. V. (2017). Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Communications Magazine, 55(2), 185–191.CrossRef Ding, Z., Liu, Y., Choi, J., Sun, Q., Elkashlan, M., Chih-Lin, I., & Poor, H. V. (2017). Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Communications Magazine, 55(2), 185–191.CrossRef
3.
go back to reference Ozduran, V., Cioffi, J. M., & Yarman, S. B. (2013). Opportunistic source-pair selection (OSPS) method for multiuser bi-directional wireless relaying networks. In 2013 IEEE 14th workshop on signal process. advances in wireless communications (SPAWC) (pp. 565–569). Ozduran, V., Cioffi, J. M., & Yarman, S. B. (2013). Opportunistic source-pair selection (OSPS) method for multiuser bi-directional wireless relaying networks. In 2013 IEEE 14th workshop on signal process. advances in wireless communications (SPAWC) (pp. 565–569).
5.
go back to reference Ozduran, V., Huda Mahmood, N., & Nomikos, N. (2022). Performance analysis of power-domain non-orthogonal multiple access for full-duplex two-way relaying. Transactions on Emerging Telecommunications Technologies, 33(7), e4487.CrossRef Ozduran, V., Huda Mahmood, N., & Nomikos, N. (2022). Performance analysis of power-domain non-orthogonal multiple access for full-duplex two-way relaying. Transactions on Emerging Telecommunications Technologies, 33(7), e4487.CrossRef
6.
go back to reference Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael. Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael.
7.
go back to reference Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, 120–126.CrossRef Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, 120–126.CrossRef
8.
go back to reference Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387.CrossRef Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387.CrossRef
9.
go back to reference Sun, L., Zhang, T., Li, Y., & Niu, H. (2012). Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Transactions on Vehicular Technology, 61(8), 3801–3807.CrossRef Sun, L., Zhang, T., Li, Y., & Niu, H. (2012). Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Transactions on Vehicular Technology, 61(8), 3801–3807.CrossRef
10.
go back to reference Duy, T. T., Duong, T. Q., Thanh, T. L., & Bao, V. N. Q. (2015). Secrecy performance analysis with relay selection methods under impact of co-channel interference. IET Communications, 9(11), 1427–1435.CrossRef Duy, T. T., Duong, T. Q., Thanh, T. L., & Bao, V. N. Q. (2015). Secrecy performance analysis with relay selection methods under impact of co-channel interference. IET Communications, 9(11), 1427–1435.CrossRef
11.
go back to reference El-Malek, A. H. A., Salhab, A. M., & Zummo, S. A. (2015) Optimal power allocation for enhancing physical layer security in opportunistic relay networks in the presence of co-channel interference. In 2015 IEEE global communications conference (GLOBECOM) (pp. 1–6). El-Malek, A. H. A., Salhab, A. M., & Zummo, S. A. (2015) Optimal power allocation for enhancing physical layer security in opportunistic relay networks in the presence of co-channel interference. In 2015 IEEE global communications conference (GLOBECOM) (pp. 1–6).
12.
go back to reference Vahidian, S., Aissa, S., & Hatamnia, S. (2015). Relay selection for security-constrained cooperative communication in the presence of eavesdropper’s overhearing and interference. IEEE Wireless Communications Letters, 4(6), 577–580.CrossRef Vahidian, S., Aissa, S., & Hatamnia, S. (2015). Relay selection for security-constrained cooperative communication in the presence of eavesdropper’s overhearing and interference. IEEE Wireless Communications Letters, 4(6), 577–580.CrossRef
13.
go back to reference Hu, W., Li, Z., Li, H., Si, J., & Huang, H. (2017). SRT analysis of relay selection in the presence of multiple co-channel interferers. IET Communications, 11(6), 809–816.CrossRef Hu, W., Li, Z., Li, H., Si, J., & Huang, H. (2017). SRT analysis of relay selection in the presence of multiple co-channel interferers. IET Communications, 11(6), 809–816.CrossRef
14.
go back to reference Renna, F., Laurenti, N., & Poor, H. V. (2012). Physical-layer secrecy for OFDM transmissions over fading channels. IEEE Transactions on Information Forensics and Security, 7(4), 1354–1367.CrossRef Renna, F., Laurenti, N., & Poor, H. V. (2012). Physical-layer secrecy for OFDM transmissions over fading channels. IEEE Transactions on Information Forensics and Security, 7(4), 1354–1367.CrossRef
15.
go back to reference Sun, Y., Ng, D. W. K., & Schober, R. (2017). Resource allocation for secure full-duplex OFDMA radio systems: (Invited paper). In 2017 IEEE 18th international workshop on signal processing advances in wireless communications (SPAWC) (pp. 1–5). Sun, Y., Ng, D. W. K., & Schober, R. (2017). Resource allocation for secure full-duplex OFDMA radio systems: (Invited paper). In 2017 IEEE 18th international workshop on signal processing advances in wireless communications (SPAWC) (pp. 1–5).
16.
go back to reference Ozduran, V. (2018). Physical layer security of multi-user full-duplex one-way wireless relaying network. In 2018 Advances in wireless and optical communications (RTUWO) (pp. 17–22). Ozduran, V. (2018). Physical layer security of multi-user full-duplex one-way wireless relaying network. In 2018 Advances in wireless and optical communications (RTUWO) (pp. 17–22).
17.
go back to reference Ozduran, V. (2019). Secrecy analysis of multi-user half/full-duplex wireless bi-directional relaying network. Balkan Journal of Electrical and Computer Engineering, 7, 342–354.CrossRef Ozduran, V. (2019). Secrecy analysis of multi-user half/full-duplex wireless bi-directional relaying network. Balkan Journal of Electrical and Computer Engineering, 7, 342–354.CrossRef
18.
go back to reference Romero-Zurita, N., Ghogho, M., & McLernon, D. (2011). Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation. Physical Communication, 4(4), 313–321.CrossRef Romero-Zurita, N., Ghogho, M., & McLernon, D. (2011). Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation. Physical Communication, 4(4), 313–321.CrossRef
19.
go back to reference Chen, J., Yang, L., & Alouini, M. (2018). Physical layer security for cooperative NOMA systems. IEEE Transactions on Vehicular Technology, 67(5), 4645–4649.CrossRef Chen, J., Yang, L., & Alouini, M. (2018). Physical layer security for cooperative NOMA systems. IEEE Transactions on Vehicular Technology, 67(5), 4645–4649.CrossRef
20.
go back to reference Yu, C., Ko, H., Peng, X., Xie, W., & Zhu, P. (2019). Jammer-aided secure communications for cooperative NOMA systems. IEEE Communications Letters, 23(11), 1935–1939.CrossRef Yu, C., Ko, H., Peng, X., Xie, W., & Zhu, P. (2019). Jammer-aided secure communications for cooperative NOMA systems. IEEE Communications Letters, 23(11), 1935–1939.CrossRef
21.
go back to reference Abbasi, O., & Ebrahimi, A. (2017). Secrecy analysis of a NOMA system with full duplex and half duplex relay. In 2017 Iran workshop on communication and information theory (IWCIT) (pp. 1–6). Abbasi, O., & Ebrahimi, A. (2017). Secrecy analysis of a NOMA system with full duplex and half duplex relay. In 2017 Iran workshop on communication and information theory (IWCIT) (pp. 1–6).
22.
go back to reference Wang, Z., & Peng, Z. (2019). Secrecy performance analysis of relay selection in cooperative NOMA systems. IEEE Access, 7, 86274–86287.CrossRef Wang, Z., & Peng, Z. (2019). Secrecy performance analysis of relay selection in cooperative NOMA systems. IEEE Access, 7, 86274–86287.CrossRef
23.
go back to reference Yu, C., Ko, H., Peng, X., & Xie, W. (2019). Secrecy outage performance analysis for cooperative NOMA over Nakagami-\(m\) channel. IEEE Access, 7, 79866–79876.CrossRef Yu, C., Ko, H., Peng, X., & Xie, W. (2019). Secrecy outage performance analysis for cooperative NOMA over Nakagami-\(m\) channel. IEEE Access, 7, 79866–79876.CrossRef
24.
go back to reference Zheng, B., Wen, M., Wang, C., Wang, X., Chen, F., Tang, J., & Ji, F. (2018). Secure NOMA based two-way relay networks using artificial noise and full duplex. IEEE Journal on Selected Areas in Communications, 36(7), 1426–1440.CrossRef Zheng, B., Wen, M., Wang, C., Wang, X., Chen, F., Tang, J., & Ji, F. (2018). Secure NOMA based two-way relay networks using artificial noise and full duplex. IEEE Journal on Selected Areas in Communications, 36(7), 1426–1440.CrossRef
25.
go back to reference Lei, H., Yang, Z., Park, K., Ansari, I. S., Pan, G., & Alouini, M. (2019). On physical layer security of multiple-relay assisted NOMA systems. In 2019 IEEE international conference on communications workshops (ICC workshops) (pp. 1–6). Lei, H., Yang, Z., Park, K., Ansari, I. S., Pan, G., & Alouini, M. (2019). On physical layer security of multiple-relay assisted NOMA systems. In 2019 IEEE international conference on communications workshops (ICC workshops) (pp. 1–6).
26.
go back to reference ElHalawany, B. M., Ruby, R., Riihonen, T., & Wu, K. (2018). Performance of cooperative NOMA systems under passive eavesdropping. In 2018 IEEE global communications conference (GLOBECOM) (pp. 1–6). ElHalawany, B. M., Ruby, R., Riihonen, T., & Wu, K. (2018). Performance of cooperative NOMA systems under passive eavesdropping. In 2018 IEEE global communications conference (GLOBECOM) (pp. 1–6).
27.
go back to reference Li, A. (2019). Enhancing the physical layer security of cooperative NOMA system. In 2019 IEEE 3rd information technology, networking, electronic and automation control conference (ITNEC) (pp. 2194–2198). Li, A. (2019). Enhancing the physical layer security of cooperative NOMA system. In 2019 IEEE 3rd information technology, networking, electronic and automation control conference (ITNEC) (pp. 2194–2198).
28.
go back to reference Abolpour, M., Mirmohseni, M., & Aref, M. R. (2019). Outage performance in secure cooperative NOMA. In 2019 Iran workshop on communication and information theory (IWCIT) (pp. 1–6). Abolpour, M., Mirmohseni, M., & Aref, M. R. (2019). Outage performance in secure cooperative NOMA. In 2019 Iran workshop on communication and information theory (IWCIT) (pp. 1–6).
29.
go back to reference Zaghdoud, N., Alouane, W. H., Boujemaa, H., Mnaouer, A. B., & Touati, F. (2019). Secrecy performance of AF relaying in cooperative NOMA over Rician channel. In2019 15th international wireless communications mobile computing conference (IWCMC) (pp. 805–810). Zaghdoud, N., Alouane, W. H., Boujemaa, H., Mnaouer, A. B., & Touati, F. (2019). Secrecy performance of AF relaying in cooperative NOMA over Rician channel. In2019 15th international wireless communications mobile computing conference (IWCMC) (pp. 805–810).
30.
go back to reference Lv, L., Jiang, H., Ding, Z., Yang, L., & Chen, J. (2019). Exploiting adaptive jamming in secure cooperative NOMA with an untrusted relay. In ICC 2019—2019 IEEE international conference on communications (ICC) (pp. 1–6). Lv, L., Jiang, H., Ding, Z., Yang, L., & Chen, J. (2019). Exploiting adaptive jamming in secure cooperative NOMA with an untrusted relay. In ICC 2019—2019 IEEE international conference on communications (ICC) (pp. 1–6).
31.
go back to reference Zheng, B., Wen, M., Chen, F., Tang, J., & Ji, F. (2018). Secure NOMA based full-duplex two-way relay networks with artificial noise against eavesdropping. In 2018 IEEE international conference on communications (ICC) (pp. 1–6). Zheng, B., Wen, M., Chen, F., Tang, J., & Ji, F. (2018). Secure NOMA based full-duplex two-way relay networks with artificial noise against eavesdropping. In 2018 IEEE international conference on communications (ICC) (pp. 1–6).
32.
go back to reference Feng, Y., Yang, Z., & Yan, S. (2017). Non-orthogonal multiple access and artificial-noise aided secure transmission in FD relay networks. In 2017 IEEE Globecom workshops (GC wkshps) (pp. 1–6). Feng, Y., Yang, Z., & Yan, S. (2017). Non-orthogonal multiple access and artificial-noise aided secure transmission in FD relay networks. In 2017 IEEE Globecom workshops (GC wkshps) (pp. 1–6).
33.
go back to reference Zaghdoud, N., Alouane, W. H., Boujemaa, H., & Touati, F. (2019). Secure performance of AF and DF relaying in cooperative NOMA systems. In 2019 19th international conference on sciences and techniques of automatic control and computer engineering (STA) (pp. 614–619). Zaghdoud, N., Alouane, W. H., Boujemaa, H., & Touati, F. (2019). Secure performance of AF and DF relaying in cooperative NOMA systems. In 2019 19th international conference on sciences and techniques of automatic control and computer engineering (STA) (pp. 614–619).
34.
go back to reference Cao, Y., Tang, J., Zhao, N., Chen, Y., Zhang, X. Y., Jin, M., & Alouini, M. (2019). Full-duplex relay assisted secure transmission for NOMA networks. In 2019 IEEE/CIC international conference on communications in China (ICCC) (pp. 596–601). Cao, Y., Tang, J., Zhao, N., Chen, Y., Zhang, X. Y., Jin, M., & Alouini, M. (2019). Full-duplex relay assisted secure transmission for NOMA networks. In 2019 IEEE/CIC international conference on communications in China (ICCC) (pp. 596–601).
35.
go back to reference Liu, F., Li, J., Li, S., & Liu, Y. (2018). Physical layer security of full-duplex two-way AF relaying networks with optimal relay selection. In 2018 IEEE Globecom workshops (GC wkshps) (pp. 1–6). Liu, F., Li, J., Li, S., & Liu, Y. (2018). Physical layer security of full-duplex two-way AF relaying networks with optimal relay selection. In 2018 IEEE Globecom workshops (GC wkshps) (pp. 1–6).
36.
go back to reference Arafa, A., Shin, W., Vaezi, M., & Poor, H. V. (2020). Secure relaying in non-orthogonal multiple access: Trusted and untrusted scenarios. IEEE Transactions on Information Forensics and Security, 15, 210–222.CrossRef Arafa, A., Shin, W., Vaezi, M., & Poor, H. V. (2020). Secure relaying in non-orthogonal multiple access: Trusted and untrusted scenarios. IEEE Transactions on Information Forensics and Security, 15, 210–222.CrossRef
37.
go back to reference Xiang, Z., Yang, W., Pan, G., Cai, Y., & Sun, X. (2019). Secure transmission in non-orthogonal multiple access networks with an untrusted relay. IEEE Wireless Communications Letters, 8(3), 905–908.CrossRef Xiang, Z., Yang, W., Pan, G., Cai, Y., & Sun, X. (2019). Secure transmission in non-orthogonal multiple access networks with an untrusted relay. IEEE Wireless Communications Letters, 8(3), 905–908.CrossRef
38.
go back to reference Xiang, Z., Yang, W., Cai, Y., Ding, Z., & Song, Y. (2020). Secure transmission design in HARQ assisted cognitive NOMA networks. IEEE Transactions on Information Forensics and Security, 15, 2528–2541.CrossRef Xiang, Z., Yang, W., Cai, Y., Ding, Z., & Song, Y. (2020). Secure transmission design in HARQ assisted cognitive NOMA networks. IEEE Transactions on Information Forensics and Security, 15, 2528–2541.CrossRef
39.
go back to reference Khan, W. U., Liu, J., Jameel, F., Khan, M. T. R., Ahmed, S. H., & Jäntti, R. (2020). Secure backscatter communications in multi-cell NOMA networks: Enabling link security for massive IoT networks. In IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 213–218). Khan, W. U., Liu, J., Jameel, F., Khan, M. T. R., Ahmed, S. H., & Jäntti, R. (2020). Secure backscatter communications in multi-cell NOMA networks: Enabling link security for massive IoT networks. In IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 213–218).
40.
go back to reference Khan, W. U., Jameel, F., Li, X., Bilal, M., & Tsiftsis, T. A. (2021). Joint spectrum and energy optimization of NOMA-enabled small-cell networks with QoS guarantee. IEEE Transactions on Vehicular Technology, 70(8), 8337–8342.CrossRef Khan, W. U., Jameel, F., Li, X., Bilal, M., & Tsiftsis, T. A. (2021). Joint spectrum and energy optimization of NOMA-enabled small-cell networks with QoS guarantee. IEEE Transactions on Vehicular Technology, 70(8), 8337–8342.CrossRef
41.
go back to reference Ozduran, V. (2020). Leakage rate analysis with imperfect channel state information for cooperative non-orthogonal multiple access networks. International Journal of Communication Systems, 33(9), e4387. Ozduran, V. (2020). Leakage rate analysis with imperfect channel state information for cooperative non-orthogonal multiple access networks. International Journal of Communication Systems, 33(9), e4387.
42.
go back to reference Sun, Y., Ding, Z., Dai, X., & Karagiannidis, G. K. (2018). A feasibility study on network NOMA. IEEE Transactions on Communications, 66(9), 4303–4317.CrossRef Sun, Y., Ding, Z., Dai, X., & Karagiannidis, G. K. (2018). A feasibility study on network NOMA. IEEE Transactions on Communications, 66(9), 4303–4317.CrossRef
43.
go back to reference Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communications. Cambridge University Press. Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communications. Cambridge University Press.
44.
go back to reference Ikki, S. S., & Aissa, S. (2012). Performance analysis of two-way amplify-and-forward relaying in the presence of co-channel interferences. IEEE Transactions on Communications, 60(4), 933–939.CrossRef Ikki, S. S., & Aissa, S. (2012). Performance analysis of two-way amplify-and-forward relaying in the presence of co-channel interferences. IEEE Transactions on Communications, 60(4), 933–939.CrossRef
45.
go back to reference Zou, Y., Wang, X., Shen, W., & Hanzo, L. (2014). Security versus reliability analysis of opportunistic relaying. IEEE Transactions on Vehicular Technology, 63(6), 2653–2661.CrossRef Zou, Y., Wang, X., Shen, W., & Hanzo, L. (2014). Security versus reliability analysis of opportunistic relaying. IEEE Transactions on Vehicular Technology, 63(6), 2653–2661.CrossRef
46.
go back to reference Gradshteyn, I. S., & Ryzhik, I. M. (2007). Tables of integrals, series and products (7th ed.). Elsevier Inc. Gradshteyn, I. S., & Ryzhik, I. M. (2007). Tables of integrals, series and products (7th ed.). Elsevier Inc.
47.
go back to reference Ibrahim, D. H., Hassan, E. S., & El-Dolil, S. A. (2014). Improving physical layer security in two-way cooperative networks with multiple eavesdroppers. In 2014 9th international conference on informatics and systems (pp. ORDS–8–ORDS–13). Ibrahim, D. H., Hassan, E. S., & El-Dolil, S. A. (2014). Improving physical layer security in two-way cooperative networks with multiple eavesdroppers. In 2014 9th international conference on informatics and systems (pp. ORDS–8–ORDS–13).
48.
go back to reference Ozduran, V., Soleimani-Nasab, E., & Yarman, B. S. (2016). Opportunistic source-pair selection for multi-user two-way AF wireless relaying networks. IET Communications, 10(16), 2106–2118.CrossRef Ozduran, V., Soleimani-Nasab, E., & Yarman, B. S. (2016). Opportunistic source-pair selection for multi-user two-way AF wireless relaying networks. IET Communications, 10(16), 2106–2118.CrossRef
49.
go back to reference Ozduran, V., Yarman, B. S., & Cioffi, J. M. (2019). Opportunistic source-pair selection method with imperfect channel state information for multiuser bi-directional relaying networks. IET Communications, 13(7), 905–917.CrossRef Ozduran, V., Yarman, B. S., & Cioffi, J. M. (2019). Opportunistic source-pair selection method with imperfect channel state information for multiuser bi-directional relaying networks. IET Communications, 13(7), 905–917.CrossRef
50.
go back to reference Jimenez Rodriguez, L., Tran, N. H., & Le-Ngoc, T. (2014). Performance of full-duplex AF relaying in the presence of residual self-interference. IEEE Journal on Selected Areas in Communications, 32(9), 1752–1764.CrossRef Jimenez Rodriguez, L., Tran, N. H., & Le-Ngoc, T. (2014). Performance of full-duplex AF relaying in the presence of residual self-interference. IEEE Journal on Selected Areas in Communications, 32(9), 1752–1764.CrossRef
51.
go back to reference Khan, W. U., Lagunas, E., Mahmood, A., Ali, Z., Chatzinotas, S., & Ottersten, B. (2022). Integration of NOMA with reflecting intelligent surfaces: A multi-cell optimization with SIC decoding errors. [Online]. Available: arXiv:2205.03248 Khan, W. U., Lagunas, E., Mahmood, A., Ali, Z., Chatzinotas, S., & Ottersten, B. (2022). Integration of NOMA with reflecting intelligent surfaces: A multi-cell optimization with SIC decoding errors. [Online]. Available: arXiv:​2205.​03248
52.
go back to reference Khan, W. U., Lagunas, E., Ali, Z., Javed, M. A., Ahmed, M., Chatzinotas, S., Ottersten, B., & Popovski, P. (2022). Opportunities for physical layer security in UAV communication enhanced with intelligent reflective surfaces. [Online]. Available: arXiv:2203.16907 Khan, W. U., Lagunas, E., Ali, Z., Javed, M. A., Ahmed, M., Chatzinotas, S., Ottersten, B., & Popovski, P. (2022). Opportunities for physical layer security in UAV communication enhanced with intelligent reflective surfaces. [Online]. Available: arXiv:​2203.​16907
53.
go back to reference Papoulis, A., & Pillai, U. (2001). Probability, random variables and stochastic processes (4th ed., p. 11). McGraw-Hill. Papoulis, A., & Pillai, U. (2001). Probability, random variables and stochastic processes (4th ed., p. 11). McGraw-Hill.
Metadata
Title
On the leakage-rate performance of untrusted relay-aided NOMA under co-channel interference
Authors
Volkan Ozduran
Nikolaos Nomikos
Publication date
07-11-2023
Publisher
Springer US
Published in
Telecommunication Systems / Issue 1/2024
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-023-01071-9

Other articles of this Issue 1/2024

Telecommunication Systems 1/2024 Go to the issue