Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error

08/17/2023
by   Sapna Thapar, et al.
0

Non-orthogonal multiple access (NOMA) serves multiple users simultaneously via the same resource block by exploiting superposition coding at the transmitter and successive interference cancellation (SIC) at the receivers. Under practical considerations, perfect SIC may not be achieved. Thus, residual interference (RI) occurs inevitably due to imperfect SIC. In this work, we first propose a novel model for characterizing RI to provide a more realistic secrecy performance analysis of a downlink NOMA system under imperfect SIC at receivers. In the presence of untrusted users, NOMA has an inherent security flaw. Therefore, for this untrusted users' scenario, we derive new analytical expressions of secrecy outage probability (SOP) for each user in a two-user untrusted NOMA system by using the proposed RI model. To further shed light on the obtained results and obtain a deeper understanding, a high signal-to-noise ratio approximation of the SOPs is also obtained. Lastly, numerical investigations are provided to validate the accuracy of the desired analytical results and present valuable insights into the impact of various system parameters on the secrecy rate performance of the secure NOMA communication system.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/17/2023

Secrecy Outage Probability Analysis for Downlink NOMA with Imperfect SIC at Untrusted Users

Non-orthogonal multiple access (NOMA) has come to the fore as a spectral...
research
04/02/2019

Secure Communications in a Unified Non-Orthogonal Multiple Access Framework

This paper investigates the impact of physical layer secrecy on the perf...
research
01/24/2018

Outage Performance of A Unified Non-Orthogonal Multiple Access Framework

In this paper, a unified framework of non-orthogonal multiple access (NO...
research
08/17/2020

Securing OFDM-Based NOMA SWIPT Systems

In this paper, we present a physical-layer security scheme that exploits...
research
08/17/2023

Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization

Non-orthogonal multiple access (NOMA) has come to the fore as a spectral...
research
06/05/2023

Secrecy of Opportunistic User Scheduling in RIS-Aided Systems: A Comparison with NOMA Scheduling

In this paper, we propose an opportunistic user scheduling scheme in a m...
research
08/13/2020

Hardware Impaired Ambient Backscatter NOMA Systems: Reliability and Security

Non-orthogonal multiple access (NOMA) and ambient backscatter communicat...

Please sign up or login with your details

Forgot password? Click here to reset