Secrecy Rate Maximization in Relay-Assisted NOMA with Imperfect SIC

被引:2
作者
Amin, Insha [1 ]
Mishra, Deepak [2 ]
Saini, Ravikant [1 ]
Aissa, Sonia [3 ]
机构
[1] Indian Inst Technol Jammu, Dept Elect Engn, Jammu, Jammu & Kashmir, India
[2] UNSW, Sch Elect Engn & Telecommun, Sydney, NSW, Australia
[3] Inst Natl Rech Sci INRS, Montreal, PQ, Canada
来源
2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC | 2023年
关键词
NONORTHOGONAL MULTIPLE-ACCESS;
D O I
10.1109/WCNC55385.2023.10119096
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Non-orthogonal multiple access (NOMA) has emerged as an enabling solution for 5th generation and beyond networks, but the often-neglected issues due to successive interference cancellation (SIC) based decoding might seriously hamper its performance. In this paper, we study a downlink NOMA system with cooperative half-duplex relaying with imperfect SIC, where the base station is communicating with two untrusted users with the aid of a trusted decode-and-forward relay while also considering the availability of direct links from the source. An optimization problem is formulated for maximizing the secrecy rate of the near user while fulfilling the quality-of-service requirements of the far user. The optimal power allocation solution is derived while considering the impact of SIC error. The simulation results illustrate the exactness of the theoretical analysis alongside insightful discussions to investigate the impact of imperfect SIC.
引用
收藏
页数:6
相关论文
共 16 条
[1]  
Abolpour M., 2020, UEEE INT SYM PERS IN, P1, DOI DOI 10.1109/pimrc48278.2020.9217169
[2]   QoS-Aware Secrecy Rate Maximization in Untrusted NOMA With Trusted Relay [J].
Amin, Insha ;
Mishra, Deepak ;
Saini, Ravikant ;
Aissa, Sonia .
IEEE COMMUNICATIONS LETTERS, 2022, 26 (01) :31-34
[3]  
Bazaraa Mokhtar S, 2013, Nonlinear Programming: Theory and Algorithms
[4]   Physical Layer Security for Cooperative NOMA Systems [J].
Chen, Jianchao ;
Yang, Liang ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) :4645-4649
[5]   On the Design of Massive Non-Orthogonal Multiple Access With Imperfect Successive Interference Cancellation [J].
Chen, Xiaoming ;
Jia, Rundong ;
Ng, Derrick Wing Kwan .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (03) :2539-2551
[6]  
Dai LL, 2015, IEEE COMMUN MAG, V53, P74, DOI 10.1109/MCOM.2015.7263349
[7]   Cooperative Non-Orthogonal Multiple Access in 5G Systems [J].
Ding, Zhiguo ;
Peng, Mugen ;
Poor, H. Vincent .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (08) :1462-1465
[8]  
ElHalawany BM, 2018, IEEE GLOB COMM CONF
[9]  
ElHalawany BM, 2018, IEEE GLOB COMM CONF
[10]   Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey [J].
Hamamreh, Jehad M. ;
Furqan, Haji M. ;
Arslan, Huseyin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1773-1828