2020 IEEE Wireless Communications and Networking Conference (WCNC) 2020
DOI: 10.1109/wcnc45663.2020.9120802
|View full text |Cite
|
Sign up to set email alerts
|

Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective

Abstract: The amalgamation of non-orthogonal multiple access (NOMA) and physical layer security is a significant research interest for providing spectrally-efficient secure fifth-generation networks. Observing the secrecy issue among multiplexed NOMA users, which is stemmed from successive interference cancellation based decoding at receivers, we focus on safeguarding untrusted NOMA. Considering the problem of each user's privacy from each other, the appropriate secure decoding order and power allocation (PA) for users … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Note that the SIC can be performed by all users in a system because SIC on the receivers' side is actually a physical layer capability enabling the receiver to decode packets that arrive collectively. Thus, far user may also decode the information signal of near user using SIC which has been extensively studied in literature also [12], [13], [25], [26]. In this work, we consider imperfect SIC model, where decoding error may occur at both users, resulting in residual interference from the incompletely decoded user after SIC.…”
Section: B Proposed Secure Noma Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that the SIC can be performed by all users in a system because SIC on the receivers' side is actually a physical layer capability enabling the receiver to decode packets that arrive collectively. Thus, far user may also decode the information signal of near user using SIC which has been extensively studied in literature also [12], [13], [25], [26]. In this work, we consider imperfect SIC model, where decoding error may occur at both users, resulting in residual interference from the incompletely decoded user after SIC.…”
Section: B Proposed Secure Noma Protocolmentioning
confidence: 99%
“…In decoding order (2,1), the order of decoding is different only for the far user in comparison to conventional decoding order. Note that the far user can even first decode the signal of near user, and then decodes its own signal after applying SIC [25], [26]. As a result, we obtain…”
Section: Optimal Decoding Order From Secrecy Perspectivementioning
confidence: 99%