TY - GEN
T1 - Security performance analysis for the downlink NOMA systems with outage constraint
AU - Lei, Hongjiang
AU - Gao, Rui
AU - Park, Kihong
AU - Ansari, Imran Shafique
AU - Kim, Kyeong Jin
AU - Alouini, Mohamed Slim
N1 - KAUST Repository Item: Exported on 2020-10-01
Acknowledgements: This work was supported by the National Natural Science Foundation of China under Grant 61971080, Natural Science Foundation Project of Chongqing under Grant cstc2019jcyjmsxmX0032, and the Open Fund of the Shaanxi Key Laboratory of Information Communication Network and Security under Grant ICNS201807.
PY - 2020/7/21
Y1 - 2020/7/21
N2 - In this work, we investigate the relationship between the reliability and security of a typical two-user downlink non-orthogonal multiple access (NOMA) communication system. The level of successive interference cancellation (SIC) on NOMA user is considered. The impact of various key parameters on transmit signal-to-noise ratio (SNR) of the NOMA users with the reliability outage probability (ROP) constraint is discussed. Taking the minimum of transmit SNR for ROP into account, the secrecy outage performance of the downlink NOMA systems is studied and the analytical expressions of the secrecy outage probability of the NOMA system are derived under two cases of eavesdropping capability. Monte Carlo simulations are provided to verify the accuracy of our analysis.
AB - In this work, we investigate the relationship between the reliability and security of a typical two-user downlink non-orthogonal multiple access (NOMA) communication system. The level of successive interference cancellation (SIC) on NOMA user is considered. The impact of various key parameters on transmit signal-to-noise ratio (SNR) of the NOMA users with the reliability outage probability (ROP) constraint is discussed. Taking the minimum of transmit SNR for ROP into account, the secrecy outage performance of the downlink NOMA systems is studied and the analytical expressions of the secrecy outage probability of the NOMA system are derived under two cases of eavesdropping capability. Monte Carlo simulations are provided to verify the accuracy of our analysis.
UR - http://hdl.handle.net/10754/665202
UR - https://ieeexplore.ieee.org/document/9145372/
UR - http://www.scopus.com/inward/record.url?scp=85090291349&partnerID=8YFLogxK
U2 - 10.1109/ICCWorkshops49005.2020.9145372
DO - 10.1109/ICCWorkshops49005.2020.9145372
M3 - Conference contribution
SN - 9781728174402
BT - 2020 IEEE International Conference on Communications Workshops (ICC Workshops)
PB - IEEE
ER -