Advertisement

A Survey on Secure Beamforming in MIMO-NOMA-Based Cognitive Radio Network

  • Thulasimani LakshmananEmail author
  • Hyils Sharon Magdalene Antony
Conference paper
  • 37 Downloads

Abstract

Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) make a significant contribution to fifth-generation (5G) wireless communication systems. But securing multiple-input–multiple-output (MIMO) NOMA beamforming is yet an exclusive way. This chapter reveals the latest survey of the security of MIMO NOMA in 5G engineering, which includes securing by cascaded transmitting downlink zero-forcing-beamforming (ZFBF) technique, general power allocation scheme, applying the NOMA protocol in large-scale networks and applying new bi-directional ZFBF mechanism, cooperative NOMA in both amplify-and-forward (AF) and decode-and-forward (DF) protocols. Also an efficient majorization–minimization (MM) method-based semi-closed form secrecy rate optimization algorithm are reviewed in this chapter.

Keywords

Cognitive radio network (CRN) Non-orthogonal multiple-access (NOMA) zero-forcing-beamforming (ZFBF) AF and DF protocols Majorization-minimization (MM) method 

Abbreviations

5G

fifth generation

AF

amplify and forward

BSs

base stations

CoBF

coordinated beamforming

CRN

Cognitive radio network

CSI

channel state information

D NOMA

Dynamic non-orthogonal multiple-access

DF

decode and forward

MIMO

multiple-input–multiple-output

MISO

multiple input single output

MM CVX

majorization minimization convex optimization

MM SCF

majorization minimization semi-closed form secrecy rate optimization

MM

majorization–minimization

NOMA

non-orthogonal multiple-access

OMA

orthogonal multiple-access

PL

physical layer

PU

primary user

SIC

successive interference cancellation

SNR

signal-to-noise ratio

SOP

secrecy outage probability

SU

secondary user

ZF NOMA

zero forcing non orthogonal multiple-access

ZFBF

zero forcing beamforming

References

  1. 1.
    Islam SMR, Zeng M, Dobre OA, Kwak KS (2018) Resource allocation for downlink noma systems: key techniques and open issues. IEEE Wireless Commun 25(2):40–47CrossRefGoogle Scholar
  2. 2.
    Zeng M, Yadav A, Dobre OA, Tsiropoulos GI, Poor HV (2017) Capacity comparison between MIMO-NOMA and MIMO-OMA with multiple users in a cluster. IEEE J Sel Areas Commun 35(10):2413–2424CrossRefGoogle Scholar
  3. 3.
    Ding Z, Schober R, Poor HV (2016) A general MIMO framework for NOMA downlink and uplink transmission based on signal alignment. IEEE Trans Wireless Commun 15(6):4438–4454CrossRefGoogle Scholar
  4. 4.
    Ding Z, Adachi F, Poor HV (2016) The application of MIMO to nonorthogonal multiple access. IEEE Trans Wireless Commun 15(1):537–552CrossRefGoogle Scholar
  5. 5.
    Shin W, Vaezi M, Lee B, Love DJ, Lee J, Poor HV (2017) Coordinated beamforming for multi-cell MIMO-NOMA. IEEE Commun Lett 21(1):84–87CrossRefGoogle Scholar
  6. 6.
    Liu Y, Qin Z, Elkashlan M, Gao Y, Hanzo L (2017) Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans Wirel Commun 16(3):1656–1672CrossRefGoogle Scholar
  7. 7.
    Jiang M, Li Y, Zhang Q, Li Q, Qin J (2017) Secure beamforming in downlink MIMO nonorthogonal multiple access networks. IEEE Sig Process Lett 24(12):1852–1856CrossRefGoogle Scholar
  8. 8.
    Chen J, Yang L, Alouini MS (2018) Physical layer security for cooperative NOMA systems. IEEE Trans Veh Technol 67(5):4645–4649CrossRefGoogle Scholar
  9. 9.
    Nibedita N, Sudhan M, Hsiao-Chun W (2018) Secure beamforming for MIMO-NOMA based cognitive radio network. IEEE Commun Lett 22(8):1708–1711CrossRefGoogle Scholar
  10. 10.
    Zheng Y, Zhiguo D, Pingzhi F, Naofal AD (2016) A general power allocation scheme to guarantee quality of Service in Downlink and Uplink NOMA systems. IEEE Trans Wirel Commun 15(11):7244–7257CrossRefGoogle Scholar
  11. 11.
    Nibedita N, Sudhan M, Hsiao-Chun W (2018) Maximizing secrecy capacity of underlay MIMO-CRN through bi-directional zero-forcing beamforming. IEEE Trans Wirel Commun 17(8):5327–5337CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Thulasimani Lakshmanan
    • 1
    Email author
  • Hyils Sharon Magdalene Antony
    • 1
  1. 1.PSG College of TechnologyCoimbatoreIndia

Personalised recommendations