Physical Layer Security for Keyhole-based NOMA Downlink Systems with a Multi-antenna Eavesdropper Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.26636/jtit.2025.3.2116
This paper investigates the physical layer security of downlink nonorthogonal multiple access (NOMA) systems operating over a degenerate keyhole channel in the presence of a multi-antenna eavesdropper. We propose a joint antenna selection framework with transmit antenna selection at the source and receive antenna selection at both legitimate users and eavesdroppers, thus striving to reduce hardware complexity while maximizing secrecy performance. In this framework, the efficacy of confidentiality is assessed for a specific user allocation methodology by deriving the closed-form approximate expression of secrecy outage probability (SOP). Extensive Monte Carlo simulations validate analytical results and reveal that increasing the number of antennas at the source and legitimate users dramatically lowers SOP, whereas a more capable eavesdropper raises the risk of secrecy. Our findings demonstrate that strategic antenna deployment and non-orthogonal access can effectively safeguard communications even through severely scattering environments.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.26636/jtit.2025.3.2116
- OA Status
- diamond
- References
- 17
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4413063777
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4413063777Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.26636/jtit.2025.3.2116Digital Object Identifier
- Title
-
Physical Layer Security for Keyhole-based NOMA Downlink Systems with a Multi-antenna EavesdropperWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-07-18Full publication date if available
- Authors
-
Sang Quang Nguyen, Chi‐Bao LeList of authors in order
- Landing page
-
https://doi.org/10.26636/jtit.2025.3.2116Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.26636/jtit.2025.3.2116Direct OA link when available
- Concepts
-
Computer science, Secrecy, Noma, Telecommunications link, Physical layer, Antenna (radio), Computer network, Eavesdropping, Computer security, Telecommunications, WirelessTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
17Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4413063777 |
|---|---|
| doi | https://doi.org/10.26636/jtit.2025.3.2116 |
| ids.doi | https://doi.org/10.26636/jtit.2025.3.2116 |
| ids.openalex | https://openalex.org/W4413063777 |
| fwci | 0.0 |
| type | article |
| title | Physical Layer Security for Keyhole-based NOMA Downlink Systems with a Multi-antenna Eavesdropper |
| biblio.issue | 3 |
| biblio.volume | 101 |
| biblio.last_page | 22 |
| biblio.first_page | 16 |
| topics[0].id | https://openalex.org/T11458 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2208 |
| topics[0].subfield.display_name | Electrical and Electronic Engineering |
| topics[0].display_name | Advanced Wireless Communication Technologies |
| topics[1].id | https://openalex.org/T10964 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9991999864578247 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Wireless Communication Security Techniques |
| topics[2].id | https://openalex.org/T10148 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9794999957084656 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2208 |
| topics[2].subfield.display_name | Electrical and Electronic Engineering |
| topics[2].display_name | Advanced MIMO Systems Optimization |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7495359778404236 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C2776452267 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6532837152481079 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1503443 |
| concepts[1].display_name | Secrecy |
| concepts[2].id | https://openalex.org/C2775918612 |
| concepts[2].level | 3 |
| concepts[2].score | 0.6513370871543884 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q994794 |
| concepts[2].display_name | Noma |
| concepts[3].id | https://openalex.org/C138660444 |
| concepts[3].level | 2 |
| concepts[3].score | 0.611504077911377 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q5607897 |
| concepts[3].display_name | Telecommunications link |
| concepts[4].id | https://openalex.org/C19247436 |
| concepts[4].level | 3 |
| concepts[4].score | 0.6113996505737305 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q192727 |
| concepts[4].display_name | Physical layer |
| concepts[5].id | https://openalex.org/C21822782 |
| concepts[5].level | 2 |
| concepts[5].score | 0.6021860837936401 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q131214 |
| concepts[5].display_name | Antenna (radio) |
| concepts[6].id | https://openalex.org/C31258907 |
| concepts[6].level | 1 |
| concepts[6].score | 0.5786332488059998 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[6].display_name | Computer network |
| concepts[7].id | https://openalex.org/C2776788033 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4170173704624176 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q320769 |
| concepts[7].display_name | Eavesdropping |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.32610583305358887 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C76155785 |
| concepts[9].level | 1 |
| concepts[9].score | 0.28377091884613037 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[9].display_name | Telecommunications |
| concepts[10].id | https://openalex.org/C555944384 |
| concepts[10].level | 2 |
| concepts[10].score | 0.21793004870414734 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[10].display_name | Wireless |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7495359778404236 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/secrecy |
| keywords[1].score | 0.6532837152481079 |
| keywords[1].display_name | Secrecy |
| keywords[2].id | https://openalex.org/keywords/noma |
| keywords[2].score | 0.6513370871543884 |
| keywords[2].display_name | Noma |
| keywords[3].id | https://openalex.org/keywords/telecommunications-link |
| keywords[3].score | 0.611504077911377 |
| keywords[3].display_name | Telecommunications link |
| keywords[4].id | https://openalex.org/keywords/physical-layer |
| keywords[4].score | 0.6113996505737305 |
| keywords[4].display_name | Physical layer |
| keywords[5].id | https://openalex.org/keywords/antenna |
| keywords[5].score | 0.6021860837936401 |
| keywords[5].display_name | Antenna (radio) |
| keywords[6].id | https://openalex.org/keywords/computer-network |
| keywords[6].score | 0.5786332488059998 |
| keywords[6].display_name | Computer network |
| keywords[7].id | https://openalex.org/keywords/eavesdropping |
| keywords[7].score | 0.4170173704624176 |
| keywords[7].display_name | Eavesdropping |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.32610583305358887 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/telecommunications |
| keywords[9].score | 0.28377091884613037 |
| keywords[9].display_name | Telecommunications |
| keywords[10].id | https://openalex.org/keywords/wireless |
| keywords[10].score | 0.21793004870414734 |
| keywords[10].display_name | Wireless |
| language | en |
| locations[0].id | doi:10.26636/jtit.2025.3.2116 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2764512266 |
| locations[0].source.issn | 1509-4553, 1899-8852 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1509-4553 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Journal of Telecommunications and Information Technology |
| locations[0].source.host_organization | https://openalex.org/P4310317402 |
| locations[0].source.host_organization_name | National Institute of Telecommunications |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310317402 |
| locations[0].source.host_organization_lineage_names | National Institute of Telecommunications |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Journal of Telecommunications and Information Technology |
| locations[0].landing_page_url | https://doi.org/10.26636/jtit.2025.3.2116 |
| locations[1].id | pmh:oai:doaj.org/article:d479c55500ab410986dd95e36f95870d |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Journal of Telecommunications and Information Technology, Vol 101, Iss 3 (2025) |
| locations[1].landing_page_url | https://doaj.org/article/d479c55500ab410986dd95e36f95870d |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5032941002 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1798-2296 |
| authorships[0].author.display_name | Sang Quang Nguyen |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Sang-Quang Nguyen |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5043402758 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3175-5698 |
| authorships[1].author.display_name | Chi‐Bao Le |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Chi-Bao Le |
| authorships[1].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.26636/jtit.2025.3.2116 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Physical Layer Security for Keyhole-based NOMA Downlink Systems with a Multi-antenna Eavesdropper |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11458 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2208 |
| primary_topic.subfield.display_name | Electrical and Electronic Engineering |
| primary_topic.display_name | Advanced Wireless Communication Technologies |
| related_works | https://openalex.org/W3165611029, https://openalex.org/W2370038111, https://openalex.org/W2795815818, https://openalex.org/W2950413682, https://openalex.org/W2765236478, https://openalex.org/W3026705917, https://openalex.org/W2516026999, https://openalex.org/W2155410265, https://openalex.org/W2769689807, https://openalex.org/W3121990887 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.26636/jtit.2025.3.2116 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2764512266 |
| best_oa_location.source.issn | 1509-4553, 1899-8852 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1509-4553 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Journal of Telecommunications and Information Technology |
| best_oa_location.source.host_organization | https://openalex.org/P4310317402 |
| best_oa_location.source.host_organization_name | National Institute of Telecommunications |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310317402 |
| best_oa_location.source.host_organization_lineage_names | National Institute of Telecommunications |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Journal of Telecommunications and Information Technology |
| best_oa_location.landing_page_url | https://doi.org/10.26636/jtit.2025.3.2116 |
| primary_location.id | doi:10.26636/jtit.2025.3.2116 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2764512266 |
| primary_location.source.issn | 1509-4553, 1899-8852 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1509-4553 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Journal of Telecommunications and Information Technology |
| primary_location.source.host_organization | https://openalex.org/P4310317402 |
| primary_location.source.host_organization_name | National Institute of Telecommunications |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310317402 |
| primary_location.source.host_organization_lineage_names | National Institute of Telecommunications |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Journal of Telecommunications and Information Technology |
| primary_location.landing_page_url | https://doi.org/10.26636/jtit.2025.3.2116 |
| publication_date | 2025-07-18 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2051990156, https://openalex.org/W4320504090, https://openalex.org/W2155053896, https://openalex.org/W2030661905, https://openalex.org/W2148089951, https://openalex.org/W2104568605, https://openalex.org/W2199164178, https://openalex.org/W4321609174, https://openalex.org/W2041203084, https://openalex.org/W4226513732, https://openalex.org/W4385871816, https://openalex.org/W3208023766, https://openalex.org/W4387757625, https://openalex.org/W4205438146, https://openalex.org/W2782779428, https://openalex.org/W3022803879, https://openalex.org/W3126789634 |
| referenced_works_count | 17 |
| abstract_inverted_index.a | 16, 24, 29, 71, 112 |
| abstract_inverted_index.In | 61 |
| abstract_inverted_index.We | 27 |
| abstract_inverted_index.at | 38, 45, 102 |
| abstract_inverted_index.by | 76 |
| abstract_inverted_index.in | 20 |
| abstract_inverted_index.is | 68 |
| abstract_inverted_index.of | 7, 23, 66, 82, 100, 119 |
| abstract_inverted_index.to | 53 |
| abstract_inverted_index.Our | 121 |
| abstract_inverted_index.and | 41, 49, 94, 105, 128 |
| abstract_inverted_index.can | 131 |
| abstract_inverted_index.for | 70 |
| abstract_inverted_index.the | 3, 21, 39, 64, 78, 98, 103, 117 |
| abstract_inverted_index.SOP, | 110 |
| abstract_inverted_index.This | 0 |
| abstract_inverted_index.both | 46 |
| abstract_inverted_index.even | 135 |
| abstract_inverted_index.more | 113 |
| abstract_inverted_index.over | 15 |
| abstract_inverted_index.risk | 118 |
| abstract_inverted_index.that | 96, 124 |
| abstract_inverted_index.this | 62 |
| abstract_inverted_index.thus | 51 |
| abstract_inverted_index.user | 73 |
| abstract_inverted_index.with | 34 |
| abstract_inverted_index.Carlo | 89 |
| abstract_inverted_index.Monte | 88 |
| abstract_inverted_index.joint | 30 |
| abstract_inverted_index.layer | 5 |
| abstract_inverted_index.paper | 1 |
| abstract_inverted_index.users | 48, 107 |
| abstract_inverted_index.while | 57 |
| abstract_inverted_index.(NOMA) | 12 |
| abstract_inverted_index.(SOP). | 86 |
| abstract_inverted_index.access | 11, 130 |
| abstract_inverted_index.lowers | 109 |
| abstract_inverted_index.number | 99 |
| abstract_inverted_index.outage | 84 |
| abstract_inverted_index.raises | 116 |
| abstract_inverted_index.reduce | 54 |
| abstract_inverted_index.reveal | 95 |
| abstract_inverted_index.source | 40, 104 |
| abstract_inverted_index.antenna | 31, 36, 43, 126 |
| abstract_inverted_index.capable | 114 |
| abstract_inverted_index.channel | 19 |
| abstract_inverted_index.keyhole | 18 |
| abstract_inverted_index.propose | 28 |
| abstract_inverted_index.receive | 42 |
| abstract_inverted_index.results | 93 |
| abstract_inverted_index.secrecy | 59, 83 |
| abstract_inverted_index.systems | 13 |
| abstract_inverted_index.through | 136 |
| abstract_inverted_index.whereas | 111 |
| abstract_inverted_index.antennas | 101 |
| abstract_inverted_index.assessed | 69 |
| abstract_inverted_index.deriving | 77 |
| abstract_inverted_index.downlink | 8 |
| abstract_inverted_index.efficacy | 65 |
| abstract_inverted_index.findings | 122 |
| abstract_inverted_index.hardware | 55 |
| abstract_inverted_index.multiple | 10 |
| abstract_inverted_index.physical | 4 |
| abstract_inverted_index.presence | 22 |
| abstract_inverted_index.secrecy. | 120 |
| abstract_inverted_index.security | 6 |
| abstract_inverted_index.severely | 137 |
| abstract_inverted_index.specific | 72 |
| abstract_inverted_index.striving | 52 |
| abstract_inverted_index.transmit | 35 |
| abstract_inverted_index.validate | 91 |
| abstract_inverted_index.Extensive | 87 |
| abstract_inverted_index.framework | 33 |
| abstract_inverted_index.operating | 14 |
| abstract_inverted_index.safeguard | 133 |
| abstract_inverted_index.selection | 32, 37, 44 |
| abstract_inverted_index.strategic | 125 |
| abstract_inverted_index.allocation | 74 |
| abstract_inverted_index.analytical | 92 |
| abstract_inverted_index.complexity | 56 |
| abstract_inverted_index.degenerate | 17 |
| abstract_inverted_index.deployment | 127 |
| abstract_inverted_index.expression | 81 |
| abstract_inverted_index.framework, | 63 |
| abstract_inverted_index.increasing | 97 |
| abstract_inverted_index.legitimate | 47, 106 |
| abstract_inverted_index.maximizing | 58 |
| abstract_inverted_index.scattering | 138 |
| abstract_inverted_index.approximate | 80 |
| abstract_inverted_index.closed-form | 79 |
| abstract_inverted_index.demonstrate | 123 |
| abstract_inverted_index.effectively | 132 |
| abstract_inverted_index.methodology | 75 |
| abstract_inverted_index.probability | 85 |
| abstract_inverted_index.simulations | 90 |
| abstract_inverted_index.dramatically | 108 |
| abstract_inverted_index.eavesdropper | 115 |
| abstract_inverted_index.investigates | 2 |
| abstract_inverted_index.performance. | 60 |
| abstract_inverted_index.eavesdropper. | 26 |
| abstract_inverted_index.environments. | 139 |
| abstract_inverted_index.multi-antenna | 25 |
| abstract_inverted_index.nonorthogonal | 9 |
| abstract_inverted_index.communications | 134 |
| abstract_inverted_index.eavesdroppers, | 50 |
| abstract_inverted_index.non-orthogonal | 129 |
| abstract_inverted_index.confidentiality | 67 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.44999998807907104 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.35756212 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |