Skip to main content
Erschienen in: Telecommunication Systems 1/2024

06.11.2023

Power allocation for enhancing the physical layer secrecy performance of artificial noise-aided full-duplex cooperative NOMA system

verfasst von: T. Nimi, A. V. Babu

Erschienen in: Telecommunication Systems | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper investigates the physical layer security (PLS) performance of full-duplex cooperative non-orthogonal multiple access (FD-CNOMA) network in the presence of an external passive eavesdropper. Firstly, we derive approximate analytical expressions for the secrecy outage probabilities (SOPs) of the downlink users and the system SOP (SSOP) of a single-cell FD-CNOMA network, considering the presence/absence of direct link from the base station (BS) to the far user, under imperfect successive interference cancellation conditions. We consider both perfect channel state information and imperfect CSI conditions. To enhance the PLS performance, we propose an artificial noise (AN)-aided framework and derive approximate analytical expressions for the SOPs of the downlink users and the SSOP of the AN-aided FD-CNOMA network. The asymptotic SOP and SSOP expressions are also derived, which are used to determine the secrecy diversity orders. The proposed AN-aided framework significantly reduces the SOPs of the users and the SSOP of the network compared to that without AN. To further enhance the PLS performance, we use the Polak-Ribiere conjugate gradient method to determine the optimal power allocation coefficient (OPAC) for the users at the BS that minimizes the SSOP of the AN-aided FD-CNOMA network. The proposed OPAC significantly reduces the SOPs of the users and the SSOP, compared to random selection/equal setting of the PACs. Finally, we extend the performance evaluations to a multi-cell scenario and demonstrate that the PLS performance of the FD-CNOMA network significantly deteriorates in the presence of co-channel interference.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
The evaluation is extended for a multi-cell scenario in Sect. 4 of this paper.
 
2
Even though the BS can serve several downlink NOMA users, it leads to highly complex SIC procedure at the receivers. Hence, a two user scenario is considered in this paper.
 
3
Here the SOP evaluation is carried out considering two users per cluster. Evaluation for a multi-user scenario will be considered as a future extension.
 
Literatur
4.
11.
26.
Zurück zum Zitat Jameel, F., Khan, W.U., Chang, Z., Ristaniemi, T., & Liu, J. (2019). Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1–6). IEEE. https://doi.org/10.1109/ICCW.2019.8756894 Jameel, F., Khan, W.U., Chang, Z., Ristaniemi, T., & Liu, J. (2019). Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1–6). IEEE. https://​doi.​org/​10.​1109/​ICCW.​2019.​8756894
32.
Zurück zum Zitat Zaghdoud, N., Mnaouer, A., Boujemaa, H., & Touati, F. (2020). Secrecy performance analysis of cooperative NOMA system with multiple DF relays. In 2020 international wireless communications and mobile computing (pp. 2160–2163.) Zaghdoud, N., Mnaouer, A., Boujemaa, H., & Touati, F. (2020). Secrecy performance analysis of cooperative NOMA system with multiple DF relays. In 2020 international wireless communications and mobile computing (pp. 2160–2163.)
48.
Zurück zum Zitat Zaghdoud, N., Mnaouer, A.B., Alouane, W.H., Boujemaa, H., & Touati, F. (2020). Secure performance analysis for full-duplex cooperative NOMA system in the presence of multiple eavesdroppers. In 2020 international wireless communications and mobile computing (IWCMC) (pp. 1719–1725). https://doi.org/10.1109/IWCMC48107.2020.9148456 Zaghdoud, N., Mnaouer, A.B., Alouane, W.H., Boujemaa, H., & Touati, F. (2020). Secure performance analysis for full-duplex cooperative NOMA system in the presence of multiple eavesdroppers. In 2020 international wireless communications and mobile computing (IWCMC) (pp. 1719–1725). https://​doi.​org/​10.​1109/​IWCMC48107.​2020.​9148456
49.
Zurück zum Zitat Liu, C., Zhang, L., Xiao, M., Chen, Z., & Li, S. (2018). Secrecy performance analysis in downlink NOMA systems with cooperative full-duplex relaying. In 2018 IEEE international conference on communications workshops (ICC workshops) (pp. 1–6). IEEE. https://doi.org/10.1109/ICCW.2018.8403764 Liu, C., Zhang, L., Xiao, M., Chen, Z., & Li, S. (2018). Secrecy performance analysis in downlink NOMA systems with cooperative full-duplex relaying. In 2018 IEEE international conference on communications workshops (ICC workshops) (pp. 1–6). IEEE. https://​doi.​org/​10.​1109/​ICCW.​2018.​8403764
54.
Zurück zum Zitat Bertsekas, D. P. (2014). Constrained optimization and Lagrange multiplier methods. Academic Press. Bertsekas, D. P. (2014). Constrained optimization and Lagrange multiplier methods. Academic Press.
57.
Zurück zum Zitat Goldsmith, A. (2005). Wireless communications. Cambridge University Press.CrossRef Goldsmith, A. (2005). Wireless communications. Cambridge University Press.CrossRef
58.
Zurück zum Zitat Sesia, S., Toufik, I., & Baker, M. (2011). LTE-the UMTS long term evolution: From theory to practice. Wiley.CrossRef Sesia, S., Toufik, I., & Baker, M. (2011). LTE-the UMTS long term evolution: From theory to practice. Wiley.CrossRef
59.
Zurück zum Zitat Gradshteyn, I. S., & Ryzhik, I. M. (2014). Table of integrals, series, and products. Academic Press. Gradshteyn, I. S., & Ryzhik, I. M. (2014). Table of integrals, series, and products. Academic Press.
60.
Zurück zum Zitat Abramowitz, M., & Stegun, I. A. (1948). Handbook of mathematical functions with formulas, graphs, and mathematical tables (p. 55). US Government Printing Office. Abramowitz, M., & Stegun, I. A. (1948). Handbook of mathematical functions with formulas, graphs, and mathematical tables (p. 55). US Government Printing Office.
Metadaten
Titel
Power allocation for enhancing the physical layer secrecy performance of artificial noise-aided full-duplex cooperative NOMA system
verfasst von
T. Nimi
A. V. Babu
Publikationsdatum
06.11.2023
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 1/2024
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-023-01067-5

Weitere Artikel der Ausgabe 1/2024

Telecommunication Systems 1/2024 Zur Ausgabe

Neuer Inhalt