Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware

被引:1
作者
Ukyam, Uma Maheswara Rao [1 ]
Gurrala, Kiran Kumar [1 ]
机构
[1] NIT, Dept ECE, Tadepalligudem, Andhra Pradesh, India
关键词
STAR-RIS; NOMA; LMM; PSO-PA; HWDs; INTELLIGENT REFLECTING SURFACE; TRANSMISSION; PERFORMANCE; DESIGN; ATTACK;
D O I
10.1007/s11760-024-03335-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) at the transceivers, particularly when the direct links from the source node (S) to the NOMA users Ur,Ut\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left( U_{r},U_{t}\right) $$\end{document} are blocked. The STAR-RIS, employing the energy splitting protocol, serves two users located on opposite sides of the STAR-RIS structure, allowing simultaneous eavesdropping. The introduction of a control jammer enhances security and is assessed in various scenarios, including without jamming (WJ), with jamming (J), and control jamming (CJ), for both the transmitting user Ut\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left( U_{t}\right) $$\end{document} and the reflecting user Ur\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left( U_{r}\right) $$\end{document}. To augment security, an optimization problem is formulated with a total power constraint, optimizing power allocation at both users. This problem is iteratively addressed using the Lagrange multiplier method (LMM) and Particle Swarm Optimization-based power allocation (PSO-PA) method. Performance analysis compares the recommended PSO-PA scheme, LMM technique, and constant power allocation scheme in terms of secrecy rate under various jamming scenarios (WJ, J, and CJ). Additionally, the impact of statistical parameters like signal-to-noise ratio, number of STAR elements, and non-ideal HWDs on secrecy rate is examined using the CJ technique at both NOMA users.
引用
收藏
页码:6559 / 6571
页数:13
相关论文
共 35 条
[1]   Impact of Residual Hardware Impairment on the IoT Secrecy Performance of RIS-Assisted NOMA Networks [J].
Chen, Qin ;
Li, Meiling ;
Yang, Xiaoxia ;
Alturki, Ryan ;
Alshehri, Mohammad Dahman ;
Khan, Fazlullah .
IEEE ACCESS, 2021, 9 :42583-42592
[2]   Optimal RIS Allocations for PLS With Uncertain Jammer and Eavesdropper [J].
Chen, Siyu ;
Ji, Yancheng ;
Jiang, Yan ;
Duan, Wei ;
Choi, Jaeho ;
Zhang, Guoan ;
Ho, Pin-Han .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 69 (04) :927-936
[3]   Intelligent Reflecting Surface Aided Multi-Antenna Secure Transmission [J].
Chu, Zheng ;
Hao, Wanming ;
Xiao, Pei ;
Shi, Jia .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (01) :108-112
[4]   Active RIS-Empowered Signal Cancellation Attacks [J].
Dai, Lipeng ;
Zhang, Chongfu ;
Wang, Siyuan ;
Jia, Shilong ;
Huang, Huan ;
Qiu, Kun .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (03) :4487-4492
[5]  
Garnepudi M.D., 2023, 2023 INT C MICR OPT, P1, DOI [10.1109/ICMOCE57812.2023.10167418, DOI 10.1109/ICMOCE57812.2023.10167418]
[6]  
Gradshteyn I.S., 2007, Table of Integrals, Series, and Products
[7]   Minimized SER and QOS Based Power Allocation Strategies for Multi HDAF Relay Cooperative Network [J].
Gurrala, Kiran Kumar ;
Das, Susmita .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) :779-798
[8]   Artificial Noise Aided Secure NOMA Communications in STAR-RIS Networks [J].
Han, Yi ;
Li, Na ;
Liu, Yuanwei ;
Zhang, Tong ;
Tao, Xiaofeng .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (06) :1191-1195
[9]   Illegal Intelligent Reflecting Surface Based Active Channel Aging: When Jammer Can Attack Without Power and CSI [J].
Huang, Huan ;
Zhang, Ying ;
Zhang, Hongliang ;
Zhang, Chongfu ;
Han, Zhu .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (08) :11018-11022
[10]   On the Monotonicity of the Generalized Marcum and Nuttall Q-Functions [J].
Kapinas, Vasilios M. ;
Mihos, Sotirios K. ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (08) :3701-3710