{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:44:02Z","timestamp":1751388242695,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:00:00Z","timestamp":1656979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:00:00Z","timestamp":1656979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61771257","61901232"],"award-info":[{"award-number":["61771257","61901232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61801246"],"award-info":[{"award-number":["61801246"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Jiangsu Higher Education Institutions","award":["19KJB510010"],"award-info":[{"award-number":["19KJB510010"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay\u2013antenna selection  to enhance physical-layer security  of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency  chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining  or  SC to process the received signals. Under the condition that the channel state information  of the eavesdropping channel is available or unavailable, two effective relay\u2013antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay\u2013antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access  scheme obviously.<\/jats:p>","DOI":"10.1186\/s13634-022-00889-w","type":"journal-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T11:09:08Z","timestamp":1657019348000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On secrecy outage probability for downlink NOMA systems with relay\u2013antenna selection"],"prefix":"10.1186","volume":"2022","author":[{"given":"Shu","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9532-7721","authenticated-orcid":false,"given":"Chen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mujun","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Wenfeng","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"889_CR1","first-page":"836","volume":"2","author":"CD Alwis","year":"2021","unstructured":"C.D. Alwis, A. Kalla, Q.-V. Pham et al., Survey on 6G Frontiers: trends, applications, requirements, technologies and future research. IEEE Open J. Veh. Technol. 2, 836\u2013886 (2021)","journal-title":"IEEE Open J. Veh. Technol."},{"issue":"5","key":"889_CR2","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MWC.001.1900516","volume":"27","author":"G Gui","year":"2020","unstructured":"G. Gui, M. Liu, F. Tang et al., 6G: opening new horizons for integration of comfort, security, and intelligence. IEEE Wirel. Commun. 27(5), 126\u2013132 (2020)","journal-title":"IEEE Wirel. Commun."},{"issue":"4","key":"889_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MVT.2020.3018436","volume":"15","author":"C-X Wang","year":"2020","unstructured":"C.-X. Wang, J. Huang, H. Wang et al., 6G Wireless channel measurements and models: trends and challenges. IEEE Trans. Veh. Technol. 15(4), 22\u201332 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"889_CR4","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/JSAC.2017.2725519","volume":"35","author":"Z Ding","year":"2017","unstructured":"Z. Ding, X. Lei, G.K. Karagiannidis et al., A survey on non-orthogonal multiple access for 5G networks: research challenges and future trends. IEEE J. Sel. Areas Commun. 35(10), 2181\u20132195 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"12","key":"889_CR5","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/JPROC.2017.2768666","volume":"105","author":"Y Liu","year":"2017","unstructured":"Y. Liu, Z. Qin, M. Elkashlan et al., Nonorthogonal multiple access for 5G and beyond. Proc. IEEE 105(12), 2347\u20132381 (2017)","journal-title":"Proc. IEEE"},{"key":"889_CR6","doi-asserted-by":"crossref","unstructured":"Z. Zhang, H. Sun, R. Q, Hu, et al., Downlink and uplink non-orthogonal multiple access in a dense wireless network. IEEE J. Sel. Areas Commun. 35(12), 2771-2784(2017)","DOI":"10.1109\/JSAC.2017.2724646"},{"issue":"5","key":"889_CR7","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1109\/LCOMM.2018.2812786","volume":"22","author":"H Wang","year":"2018","unstructured":"H. Wang, R. Zhang, R. Song et al., A novel power minimization precoding scheme for MIMO-NOMA uplink systems. IEEE Commun. Lett. 22(5), 1106\u20131109 (2018)","journal-title":"IEEE Commun. Lett."},{"issue":"12","key":"889_CR8","doi-asserted-by":"publisher","first-page":"4440","DOI":"10.1109\/TCOMM.2014.2370056","volume":"62","author":"M Wildemeersch","year":"2014","unstructured":"M. Wildemeersch, T. Quek, M. Kountouris et al., Successive interference cancellation in heterogeneous networks. IEEE Trans. Commun. 62(12), 4440\u20134453 (2014)","journal-title":"IEEE Trans. Commun."},{"issue":"8","key":"889_CR9","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1109\/LCOMM.2015.2441064","volume":"19","author":"Z Ding","year":"2015","unstructured":"Z. Ding, M. Peng, H.V. Poor et al., Cooperative non-orthogonal multiple access in 5G Systems. IEEE Commun. Lett. 19(8), 1462\u20131465 (2015)","journal-title":"IEEE Commun. Lett."},{"issue":"4","key":"889_CR10","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/LWC.2016.2574709","volume":"5","author":"Z Ding","year":"2016","unstructured":"Z. Ding, H. Dai, H.V. Poor et al., Relay selection for cooperative NOMA. IEEE Commun. Lett. 5(4), 416\u2013419 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"12","key":"889_CR11","doi-asserted-by":"publisher","first-page":"11606","DOI":"10.1109\/TVT.2018.2872828","volume":"67","author":"Z Yu","year":"2018","unstructured":"Z. Yu, C. Zhai, J. Liu et al., Cooperative relaying based non-orthogonal multiple access (NOMA) with relay selection. IEEE Trans. Veh. Technol. 67(12), 11606\u201311618 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"889_CR12","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TCOMM.2017.2749400","volume":"66","author":"X Yue","year":"2018","unstructured":"X. Yue, Y. Liu, S. Kang et al., Exploiting full\/half-duplex user relaying in NOMA systems. IEEE Trans. Commun. 66(2), 560\u2013575 (2018)","journal-title":"IEEE Trans. Commun."},{"issue":"11","key":"889_CR13","doi-asserted-by":"publisher","first-page":"10114","DOI":"10.1109\/TVT.2017.2752264","volume":"66","author":"Z Yang","year":"2017","unstructured":"Z. Yang, Z. Ding, Y. Wu et al., Novel relay selection strategies for cooperative NOMA. IEEE Trans. Veh. Technol. 66(11), 10114\u201310123 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"889_CR14","doi-asserted-by":"publisher","first-page":"3158","DOI":"10.1109\/TVT.2017.2777540","volume":"67","author":"Y Yu","year":"2018","unstructured":"Y. Yu, H. Chen, Y. Li et al., Antenna selection for MIMO nonorthogonal multiple access systems. IEEE Trans. Veh. Technol. 67(4), 3158\u20133171 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"889_CR15","first-page":"6486","volume":"19","author":"L Lv","year":"2020","unstructured":"L. Lv, Q. Ye, Z. Ding et al., Multi-antenna two-way relay based cooperative NOMA. IEEE Trans. Commun. 19(10), 6486\u20136503 (2020)","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"889_CR16","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2015.2481797","volume":"11","author":"M Zhang","year":"2016","unstructured":"M. Zhang, Y. Liu, Energy harvesting for physical layer security in OFDMA networks. IEEE Trans. Inf. Forensics Secur. 11(1), 154\u2013162 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"889_CR17","doi-asserted-by":"publisher","first-page":"3856","DOI":"10.1109\/TWC.2016.2530068","volume":"15","author":"L Fan","year":"2016","unstructured":"L. Fan, N. Yang, T.Q. Duong et al., Exploiting direct links for physical layer in multiuser multirelay networks. IEEE Wirel. Commun. 15(6), 3856\u20133867 (2016)","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"889_CR18","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2883273","volume":"14","author":"Y Feng","year":"2019","unstructured":"Y. Feng, S. Yan, C. Liu et al., Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access. IEEE Trans. Inf. Forensics Secur. 14(6), 1670\u20131683 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"889_CR19","doi-asserted-by":"publisher","first-page":"6282","DOI":"10.1109\/TCOMM.2019.2916070","volume":"67","author":"H Lei","year":"2019","unstructured":"H. Lei, Z. Yang, K.H. Park et al., Secrecy outage analysis for cooperative NOMA system with relay selection schemes. IEEE Trans. Commun. 67(9), 6282\u20136298 (2019)","journal-title":"IEEE Trans. Commun."},{"key":"889_CR20","doi-asserted-by":"publisher","first-page":"86274","DOI":"10.1109\/ACCESS.2019.2925380","volume":"7","author":"Z Wang","year":"2019","unstructured":"Z. Wang, Z. Peng, Secrecy performance analysis of relay selection in cooperative NOMA systems. IEEE Access. 7, 86274\u201386287 (2019)","journal-title":"IEEE Access."},{"issue":"3","key":"889_CR21","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MWC.2015.7143332","volume":"22","author":"G Wang","year":"2015","unstructured":"G. Wang, Q. Liu, R. He et al., Acquisition of channel state information in heterogeneous cloud radio access networks: challenges and research directions. IEEE Wirel. Commun. Lett. 22(3), 100\u2013107 (2015)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"889_CR22","doi-asserted-by":"crossref","unstructured":"K. Jiang, T. Jing, Y. Huo, et al., Sic-based secrecy performance in uplink NOMA multi-eavesdropper wiretap channels. IEEE Access. 6,19664-19680(2018)","DOI":"10.1109\/ACCESS.2018.2823003"},{"key":"889_CR23","unstructured":"F. B. Hildebrand, Introduction to Numerical Analysis(Dover Press, New York, 1987, 2th edn.)"},{"issue":"4","key":"889_CR24","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/LWC.2019.2907852","volume":"8","author":"L Lv","year":"2019","unstructured":"L. Lv, Z. Ding, J. Chen et al., Design of secure NOMA against full-duplex proactive eavesdropping. IEEE Commun. Lett. 8(4), 1090\u20131094 (2019)","journal-title":"IEEE Commun. Lett."},{"issue":"10","key":"889_CR25","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","volume":"31","author":"Y Zou","year":"2013","unstructured":"Y. Zou, X. Wang, W. Shen, Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 31(10), 2099\u20132111 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"889_CR26","doi-asserted-by":"publisher","first-page":"17450","DOI":"10.1109\/ACCESS.2017.2737330","volume":"5","author":"H Lei","year":"2017","unstructured":"H. Lei, J. Zhang, K.-H. Park et al., On secure NOMA systems with transmit antenna selection schemes. IEEE Access. 5, 17450\u201317464 (2017)","journal-title":"IEEE Access."},{"issue":"8","key":"889_CR27","doi-asserted-by":"publisher","first-page":"6981","DOI":"10.1109\/TVT.2018.2824310","volume":"67","author":"J Chen","year":"2018","unstructured":"J. Chen, L. Yang, M.-S. Alouini, Physical layer security for cooperative NOMA systems. IEEE Trans. Veh. Technol. 67(8), 6981\u20136990 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"889_CR28","doi-asserted-by":"publisher","first-page":"2097","DOI":"10.1109\/ACCESS.2017.2781717","volume":"6","author":"X Wang","year":"2017","unstructured":"X. Wang, W. Feng, Y. Chen et al., Energy-efficiency maximization for secure multiuser MIMO SWIPT systems with CSI uncertainty. IEEE Access 6, 2097\u20132109 (2017)","journal-title":"IEEE Access"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-022-00889-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13634-022-00889-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-022-00889-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T11:13:12Z","timestamp":1657019592000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13634-022-00889-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,5]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["889"],"URL":"https:\/\/doi.org\/10.1186\/s13634-022-00889-w","relation":{},"ISSN":["1687-6180"],"issn-type":[{"type":"electronic","value":"1687-6180"}],"subject":[],"published":{"date-parts":[[2022,7,5]]},"assertion":[{"value":"10 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"57"}}