2018
DOI: 10.1002/itl2.76
|View full text |Cite
|
Sign up to set email alerts
|

Maximizing physical layer security in relay‐assisted multicarrier nonorthogonal multiple access transmission

Abstract: This letter investigates the physical layer security of dual-hop nonorthogonal multiple access (NOMA) networks. We consider a multicarrier transmission scenario which consists of a single source, a relay, an eavesdropper, and multiple users. Our objective is to maximize the sum secure rate of the system with optimal power allocation over different sub-carriers at the source. Because of the rate expression and binary variable, the optimization problem is formulated as a nonconvex and mixed integer programming p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 16 publications
2
15
0
Order By: Relevance
“…Regarding the two-way information exchange processes, which are Figures 16 to 19, 1 achieves better secrecy trade-off performance than other users. This is also because of the order of user decoding process as described in (15) to (22) and (25) to (32). These observations are consistent with the derived analytical and asymptotic expressions.…”
Section: Figure 21supporting
confidence: 87%
See 1 more Smart Citation
“…Regarding the two-way information exchange processes, which are Figures 16 to 19, 1 achieves better secrecy trade-off performance than other users. This is also because of the order of user decoding process as described in (15) to (22) and (25) to (32). These observations are consistent with the derived analytical and asymptotic expressions.…”
Section: Figure 21supporting
confidence: 87%
“…However, 1 gets out of order beyond 30 dB. This is because of the order of user decoding process as described in (29), (30), (31), and (32). These observations are consistent with the derived analytical and asymptotic expressions.…”
Section: Figure 19supporting
confidence: 85%
“…Constraint in (6) ensures that CU j has access to no more than one sub-channel at one time. Constraint in (7) shows that a sub-channel can accommodates no more than U max users at one time. Constraint in (8) guarantees the minimum capacity of each user, whereC min is the threshold of minimum user capacity.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…After receiving the signals from BS, the strong user applies SIC technique to remove the signal of weak user before decoding its own signal. However, weak user can not apply SIC and receives the signal with the interference of a strong user [7].…”
Section: Introductionmentioning
confidence: 99%
“…Traditional OMA is required to use orthogonal resources to support multiple devices, while relying on the power multiplexing of NOMA IoT can serve a large number of various devices in the same time/frequency domain [8,9]. Furthermore, the physical layer security performance of NOMA systems outperforms the OMA system and improves the security rate of the system greatly [10]. In addition, to ensure the fairness among devices, different power signals are transmitted according to the channel state information (CSI) between the transmitter (TX) and receiver (RX), and the successive interference cancellation (SIC) is adopted at the RX to eliminate interdevice interference [11,12].…”
Section: Introductionmentioning
confidence: 99%