Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping
Author(s): Su, Binbin; Yu, Wenjuan; Liu, Hongbo; Chorti, Arsenia; Poor, H Vincent
DownloadTo refer to this page use:
http://arks.princeton.edu/ark:/88435/pr13n20d97
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Su, Binbin | - |
dc.contributor.author | Yu, Wenjuan | - |
dc.contributor.author | Liu, Hongbo | - |
dc.contributor.author | Chorti, Arsenia | - |
dc.contributor.author | Poor, H Vincent | - |
dc.date.accessioned | 2024-01-21T20:27:24Z | - |
dc.date.available | 2024-01-21T20:27:24Z | - |
dc.date.issued | 2022-02-25 | en_US |
dc.identifier.citation | Su, Binbin, Yu, Wenjuan, Liu, Hongbo, Chorti, Arsenia, Poor, H Vincent. (2022). Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping. IEEE Wireless Communications Letters, 11 (5), 878 - 882. doi:10.1109/lwc.2021.3098935 | en_US |
dc.identifier.issn | 2162-2337 | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr13n20d97 | - |
dc.description.abstract | The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers. To address this potential security and reliability flaw, by assuming all users are untrusted, this letter investigates the effective secrecy throughput (EST) for a cooperative NOMA system, where a near user serves as an amplify-and-forward relay to help forward the information of a far user. Considering the inverse power allocation and SIC decoding order, a novel jamming strategy is proposed to enhance the security performance of the far user. Gauss-Chebyshev approximations of ESTs over Nakagami-m channels are derived. Asymptotic EST expressions are proposed to provide further insights. Numerical results demonstrate that the proposed jamming strategy and the inverse power allocation and SIC decoding order are both essential for achieving positive secrecy rates for both users. | en_US |
dc.format.extent | 878 - 882 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | IEEE Wireless Communications Letters | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping | en_US |
dc.type | Journal Article | en_US |
dc.identifier.doi | doi:10.1109/lwc.2021.3098935 | - |
dc.identifier.eissn | 2162-2345 | - |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/journal-article | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
final_version.pdf | 231.55 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.