Outage probability (OP) and potential throughput (PT) of multihop full-duplex (FD) nonorthogonal multiple access (NOMA) systems are addressed in the present paper. More precisely, two metrics are derived in the closed-form expressions under the impact of both imperfect successive interference cancellation (SIC) and imperfect self-interference cancellation. Moreover, to model short transmission distance from the transmit and receive antennae at relays, the near-field path-loss is taken into consideration.
View Article and Find Full Text PDFIn this paper, we consider a two-user downlink full-duplex (FD) non-orthogonal multiple access (NOMA) relay system where the FD relay uses an energy harvesting (EH) technique to assist the communication between the base station and far user over flat, independent and non-identically Rayleigh fading channels. Importantly, since the relay operates in FD mode, we take into account the effect of the interference caused by relay on the near user. Considering this EH-FD-NOMA relay system, we derive the exact mathematical expressions of the outage probabilities and ergodic capacities of near and far users.
View Article and Find Full Text PDFIn this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper.
View Article and Find Full Text PDFIn this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data.
View Article and Find Full Text PDFIn this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data.
View Article and Find Full Text PDFTo solve the problem of energy constraints and spectrum scarcity for cognitive radio wireless sensor networks (CR-WSNs), an underlay decode-and-forward relaying scheme is considered, where the energy constrained secondary source and relay nodes are capable of harvesting energy from a multi-antenna power beacon (PB) and using that harvested energy to forward the source information to the destination. Based on the time switching receiver architecture, three relaying protocols, namely, hybrid partial relay selection (H-PRS), conventional opportunistic relay selection (C-ORS), and best opportunistic relay selection (B-ORS) protocols are considered to enhance the end-to-end performance under the joint impact of maximal interference constraint and transceiver hardware impairments. For performance evaluation and comparison, we derive the exact and asymptotic closed-form expressions of outage probability (OP) and throughput (TP) to provide significant insights into the impact of our proposed protocols on the system performance over Rayleigh fading channel.
View Article and Find Full Text PDF