2020
DOI: 10.1109/tvt.2020.3022560
|View full text |Cite
|
Sign up to set email alerts
|

Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users

Abstract: Observing the significance of spectrally-efficient secure non-orthogonal multiple access (NOMA), this paper proposes a novel quality of service (QoS) aware secure NOMA protocol that maximizes secrecy fairness among untrusted users. Considering a base station (BS) and two users, a novel decoding order is designed that provides security to both users. With the objective of ensuring secrecy fairness between users, while satisfying their QoS requirements under BS transmit power budget constraint, we explore the pr… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 26 publications
(31 citation statements)
references
References 33 publications
0
31
0
Order By: Relevance
“…Besides, [11] assumes perfect SIC that cancels the interference from the decoded users entirely which is a strong assumption due to practical implementation issues [2]. Therefore, imperfect SIC model is highly realistic to explore secure NOMA which has been considered in [13] for two-user NOMA case. To this end, we focus to secure a three-user untrusted NOMA system under practical imperfect SIC based decoding at receivers, which to the best of our knowledge, has not been investigated yet in the literature.…”
Section: B Research Gap and Motivationmentioning
confidence: 99%
“…Besides, [11] assumes perfect SIC that cancels the interference from the decoded users entirely which is a strong assumption due to practical implementation issues [2]. Therefore, imperfect SIC model is highly realistic to explore secure NOMA which has been considered in [13] for two-user NOMA case. To this end, we focus to secure a three-user untrusted NOMA system under practical imperfect SIC based decoding at receivers, which to the best of our knowledge, has not been investigated yet in the literature.…”
Section: B Research Gap and Motivationmentioning
confidence: 99%
“…However, in real scenarios, perfect SIC cannot be readily satisfied due to various implementation problems such as error propagation. Therefore, imperfect SIC model where residual interference from imperfectly decoded user exists after SIC, is highly realistic to explore secure NOMA which has been considered in the extended version of this work [12].…”
Section: A System Modelmentioning
confidence: 99%
“…hand, it is difficult to achieve positive secrecy rates for a far user since an untrusted near user can easily intercept messages intended for the former due to the stronger channel gain between the BS and the near user [11]. On the other hand, an untrusted far user may access the information of a near user, which results in confidential information leakage.…”
Section: Introductionmentioning
confidence: 99%