File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Secure communications in a unified non-orthogonal multiple access framework

TitleSecure communications in a unified non-orthogonal multiple access framework
Authors
KeywordsA unified framework
non-orthogonal multiple access
physical layer security
stochastic geometry
Issue Date2020
Citation
IEEE Transactions on Wireless Communications, 2020, v. 19, n. 3, p. 2163-2178 How to Cite?
AbstractThis paper investigates the impact of physical layer secrecy on the performance of a unified non-orthogonal multiple access (NOMA) framework, where both external and internal eavesdropping scenarios are examined. The spatial locations of legitimate users (LUs) and eavesdroppers are modeled by invoking stochastic geometry. To characterize the security performance, new exact and asymptotic expressions of secrecy outage probability (SOP) are derived for both code-domain NOMA (CD-NOMA) and power-domain NOMA (PD-NOMA), in which imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC) are taken into account. For the external eavesdropping scenario, the secrecy diversity orders by a pair of LUs (the n-th user and m-th user) for CD/PD-NOMA are obtained. Analytical results make known that the diversity orders of the n-th user with ipSIC/pSIC for CD-NOMA and PD-NOMA are equal to zero/ K and zero/one, respectively. The diversity orders of the m-th user are equal to K/one for CD/PD-NOMA. For the internal eavesdropping scenario, we examine the analysis of secrecy diversity order and observe that the m-th user to wiretap the n -th user with ipSIC/pSIC for CD-NOMA and PD-NOMA provide the diversity orders of zero/ K and zero/one, respectively, which is consistent with external eavesdropping scenario. Numerical results are present to confirm the accuracy of the analytical results developed and show that: i) The secrecy outage behavior of the n-th user is superior to that of the m-th user; ii) By increasing the number of subcarriers, CD-NOMA is capable of achieving a larger secrecy diversity gain compared to PD-NOMA.
Persistent Identifierhttp://hdl.handle.net/10722/349408
ISSN
2023 Impact Factor: 8.9
2023 SCImago Journal Rankings: 5.371

 

DC FieldValueLanguage
dc.contributor.authorYue, Xinwei-
dc.contributor.authorLiu, Yuanwei-
dc.contributor.authorYao, Yuanyuan-
dc.contributor.authorLi, Xuehua-
dc.contributor.authorLiu, Rongke-
dc.contributor.authorNallanathan, Arumugam-
dc.date.accessioned2024-10-17T06:58:20Z-
dc.date.available2024-10-17T06:58:20Z-
dc.date.issued2020-
dc.identifier.citationIEEE Transactions on Wireless Communications, 2020, v. 19, n. 3, p. 2163-2178-
dc.identifier.issn1536-1276-
dc.identifier.urihttp://hdl.handle.net/10722/349408-
dc.description.abstractThis paper investigates the impact of physical layer secrecy on the performance of a unified non-orthogonal multiple access (NOMA) framework, where both external and internal eavesdropping scenarios are examined. The spatial locations of legitimate users (LUs) and eavesdroppers are modeled by invoking stochastic geometry. To characterize the security performance, new exact and asymptotic expressions of secrecy outage probability (SOP) are derived for both code-domain NOMA (CD-NOMA) and power-domain NOMA (PD-NOMA), in which imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC) are taken into account. For the external eavesdropping scenario, the secrecy diversity orders by a pair of LUs (the n-th user and m-th user) for CD/PD-NOMA are obtained. Analytical results make known that the diversity orders of the n-th user with ipSIC/pSIC for CD-NOMA and PD-NOMA are equal to zero/ K and zero/one, respectively. The diversity orders of the m-th user are equal to K/one for CD/PD-NOMA. For the internal eavesdropping scenario, we examine the analysis of secrecy diversity order and observe that the m-th user to wiretap the n -th user with ipSIC/pSIC for CD-NOMA and PD-NOMA provide the diversity orders of zero/ K and zero/one, respectively, which is consistent with external eavesdropping scenario. Numerical results are present to confirm the accuracy of the analytical results developed and show that: i) The secrecy outage behavior of the n-th user is superior to that of the m-th user; ii) By increasing the number of subcarriers, CD-NOMA is capable of achieving a larger secrecy diversity gain compared to PD-NOMA.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Wireless Communications-
dc.subjectA unified framework-
dc.subjectnon-orthogonal multiple access-
dc.subjectphysical layer security-
dc.subjectstochastic geometry-
dc.titleSecure communications in a unified non-orthogonal multiple access framework-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TWC.2019.2963181-
dc.identifier.scopuseid_2-s2.0-85081753938-
dc.identifier.volume19-
dc.identifier.issue3-
dc.identifier.spage2163-
dc.identifier.epage2178-
dc.identifier.eissn1558-2248-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats