File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TWC.2019.2963181
- Scopus: eid_2-s2.0-85081753938
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Secure communications in a unified non-orthogonal multiple access framework
Title | Secure communications in a unified non-orthogonal multiple access framework |
---|---|
Authors | |
Keywords | A unified framework non-orthogonal multiple access physical layer security stochastic geometry |
Issue Date | 2020 |
Citation | IEEE Transactions on Wireless Communications, 2020, v. 19, n. 3, p. 2163-2178 How to Cite? |
Abstract | This paper investigates the impact of physical layer secrecy on the performance of a unified non-orthogonal multiple access (NOMA) framework, where both external and internal eavesdropping scenarios are examined. The spatial locations of legitimate users (LUs) and eavesdroppers are modeled by invoking stochastic geometry. To characterize the security performance, new exact and asymptotic expressions of secrecy outage probability (SOP) are derived for both code-domain NOMA (CD-NOMA) and power-domain NOMA (PD-NOMA), in which imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC) are taken into account. For the external eavesdropping scenario, the secrecy diversity orders by a pair of LUs (the n-th user and m-th user) for CD/PD-NOMA are obtained. Analytical results make known that the diversity orders of the n-th user with ipSIC/pSIC for CD-NOMA and PD-NOMA are equal to zero/ K and zero/one, respectively. The diversity orders of the m-th user are equal to K/one for CD/PD-NOMA. For the internal eavesdropping scenario, we examine the analysis of secrecy diversity order and observe that the m-th user to wiretap the n -th user with ipSIC/pSIC for CD-NOMA and PD-NOMA provide the diversity orders of zero/ K and zero/one, respectively, which is consistent with external eavesdropping scenario. Numerical results are present to confirm the accuracy of the analytical results developed and show that: i) The secrecy outage behavior of the n-th user is superior to that of the m-th user; ii) By increasing the number of subcarriers, CD-NOMA is capable of achieving a larger secrecy diversity gain compared to PD-NOMA. |
Persistent Identifier | http://hdl.handle.net/10722/349408 |
ISSN | 2023 Impact Factor: 8.9 2023 SCImago Journal Rankings: 5.371 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yue, Xinwei | - |
dc.contributor.author | Liu, Yuanwei | - |
dc.contributor.author | Yao, Yuanyuan | - |
dc.contributor.author | Li, Xuehua | - |
dc.contributor.author | Liu, Rongke | - |
dc.contributor.author | Nallanathan, Arumugam | - |
dc.date.accessioned | 2024-10-17T06:58:20Z | - |
dc.date.available | 2024-10-17T06:58:20Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | IEEE Transactions on Wireless Communications, 2020, v. 19, n. 3, p. 2163-2178 | - |
dc.identifier.issn | 1536-1276 | - |
dc.identifier.uri | http://hdl.handle.net/10722/349408 | - |
dc.description.abstract | This paper investigates the impact of physical layer secrecy on the performance of a unified non-orthogonal multiple access (NOMA) framework, where both external and internal eavesdropping scenarios are examined. The spatial locations of legitimate users (LUs) and eavesdroppers are modeled by invoking stochastic geometry. To characterize the security performance, new exact and asymptotic expressions of secrecy outage probability (SOP) are derived for both code-domain NOMA (CD-NOMA) and power-domain NOMA (PD-NOMA), in which imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC) are taken into account. For the external eavesdropping scenario, the secrecy diversity orders by a pair of LUs (the n-th user and m-th user) for CD/PD-NOMA are obtained. Analytical results make known that the diversity orders of the n-th user with ipSIC/pSIC for CD-NOMA and PD-NOMA are equal to zero/ K and zero/one, respectively. The diversity orders of the m-th user are equal to K/one for CD/PD-NOMA. For the internal eavesdropping scenario, we examine the analysis of secrecy diversity order and observe that the m-th user to wiretap the n -th user with ipSIC/pSIC for CD-NOMA and PD-NOMA provide the diversity orders of zero/ K and zero/one, respectively, which is consistent with external eavesdropping scenario. Numerical results are present to confirm the accuracy of the analytical results developed and show that: i) The secrecy outage behavior of the n-th user is superior to that of the m-th user; ii) By increasing the number of subcarriers, CD-NOMA is capable of achieving a larger secrecy diversity gain compared to PD-NOMA. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Wireless Communications | - |
dc.subject | A unified framework | - |
dc.subject | non-orthogonal multiple access | - |
dc.subject | physical layer security | - |
dc.subject | stochastic geometry | - |
dc.title | Secure communications in a unified non-orthogonal multiple access framework | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TWC.2019.2963181 | - |
dc.identifier.scopus | eid_2-s2.0-85081753938 | - |
dc.identifier.volume | 19 | - |
dc.identifier.issue | 3 | - |
dc.identifier.spage | 2163 | - |
dc.identifier.epage | 2178 | - |
dc.identifier.eissn | 1558-2248 | - |