Trusted Transmission: Strengthening Security in CR-Inspired RSMA Systems Amidst Untrusted Users

Hongjiang Lei, Dongjie Sang, Imran Shafique Ansari, Nasir Saeed, Gaofeng Pan, Mohamed Slim Alouini

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

This study investigates the secrecy performance of a rate-splitting multiple-access system inspired by cognitive radio principles, where the primary user takes on the role of a potential eavesdropper seeking to intercept the secondary user's message. The on-off scheme is utilized to guarantee the transmission of the primary user. We provide closed-form expressions for critical metrics, including the transmission probability of the system under consideration, the secrecy outage probability, and the reliable outage probability of the cognitive user. Monte Carlo simulation results are presented to substantiate our findings and explore the impact of system parameters, such as transmit power and the number of antennas at the base station, on system performance.

Original languageEnglish (US)
Title of host publication2024 IEEE Wireless Communications and Networking Conference, WCNC 2024 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350303582
DOIs
StatePublished - 2024
Event25th IEEE Wireless Communications and Networking Conference, WCNC 2024 - Dubai, United Arab Emirates
Duration: Apr 21 2024Apr 24 2024

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Conference

Conference25th IEEE Wireless Communications and Networking Conference, WCNC 2024
Country/TerritoryUnited Arab Emirates
CityDubai
Period04/21/2404/24/24

Keywords

  • cognitive radios
  • on-off scheme
  • Rate splitting multiple access
  • reliable outage probability
  • secrecy outage probability

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Trusted Transmission: Strengthening Security in CR-Inspired RSMA Systems Amidst Untrusted Users'. Together they form a unique fingerprint.

Cite this