2021 IEEE Global Communications Conference (GLOBECOM) 2021
DOI: 10.1109/globecom46510.2021.9685578
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error

Abstract: Non-orthogonal multiple access (NOMA) serves multiple users simultaneously via the same resource block by exploiting superposition coding at the transmitter and successive interference cancellation (SIC) at the receivers. Under practical considerations, perfect SIC may not be achieved. Thus, residual interference (RI) occurs inevitably due to imperfect SIC. In this work, we first propose a novel model for characterizing RI to provide a more realistic secrecy performance analysis of a downlink NOMA system under… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…However, all these aforementioned research works are confined to analyzing the performance of cooperative NOMA system under imperfect SIC assumptions but they have not considered CR-NOMA systems. In order to study the effect of SIC on real-world detectors, the authors in [31] present a new generalized residual interference (RI) approach. They used the proposed method to analyze RI at receivers in a two-user untrusted NOMA network and found the analytical and asymptotic formulations of SOP for both users.…”
Section: B Motivations and Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, all these aforementioned research works are confined to analyzing the performance of cooperative NOMA system under imperfect SIC assumptions but they have not considered CR-NOMA systems. In order to study the effect of SIC on real-world detectors, the authors in [31] present a new generalized residual interference (RI) approach. They used the proposed method to analyze RI at receivers in a two-user untrusted NOMA network and found the analytical and asymptotic formulations of SOP for both users.…”
Section: B Motivations and Contributionsmentioning
confidence: 99%
“…where χ ∈ {sc, mrc}, R p is the target rate of symbol x p , and the secrecy outages P 1 (already evaluated and solution given in (31), and now P sc 2 & P mrc 2 can be derived as follows: Case-1: SC Diversity…”
mentioning
confidence: 99%