Individual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation

被引:0
|
作者
Kaiwei Jiang
Tao Jing
Zhen Li
Yan Huo
Fan Zhang
机构
[1] Beijing Jiaotong University,School of Electronics and Information Engineering
[2] Taizhou Vocational and Technical College,School of Electric and Information Engineering
来源
EURASIP Journal on Wireless Communications and Networking | / 2017卷
关键词
Multiple access wiretap channel; Successive interference cancellation; Secrecy performance; Scheduling scheme;
D O I
暂无
中图分类号
学科分类号
摘要
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding. We first evaluate individual secrecy performance under an arbitrary SIC order by deriving closed-form expressions with respect to secrecy outage probability and effective secrecy throughput (EST) as main metrics. The resulting closed-form expressions disclose a significant impact on the secrecy performance from the order of SIC decoding. Therefore, we propose three SIC decoding order scheduling schemes: (1) round-robin scheme, absolutely fair and served as a benchmark; (2) suboptimal scheme, based on each user’s main channel condition; and (3) optimal scheme, based on each user’s achievable secrecy rate. Comparison results show that the last two schemes outperform the first one with regard to both the EST and the multi-user diversity gain, whereas the performance of the suboptimal scheme is highly close to that of the optimal scheme which is usually impractical due to a requirement for the eavesdropper’s channel state information (CSI).
引用
收藏
相关论文
共 50 条
  • [1] Individual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation
    Jiang, Kaiwei
    Jing, Tao
    Li, Zhen
    Huo, Yan
    Zhang, Fan
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2017,
  • [2] ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel
    Jiang, Kaiwei
    Jing, Tao
    Zhang, Fan
    Huo, Yan
    Li, Zhen
    IEEE ACCESS, 2017, 5 : 7244 - 7253
  • [3] On the capacity of a random access channel with successive interference cancellation
    Peeters, G. T.
    Van Houdt, B.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2051 - 2056
  • [4] Tandem Spreading Multiple Access with Successive Interference Cancellation
    Wei, Zichao
    Wang, Fanggang
    Ma, Guoyu
    Ai, Bo
    Zhong, Zhangdui
    2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [5] RANDOM MULTIPLE ACCESS WITH SUCCESSIVE INTERFERENCE CANCELLATION FOR CENTRALIZED NETWORKS
    Vinel, Alexey V.
    Fedorov, Konstantin A.
    EUROCON 2009: INTERNATIONAL IEEE CONFERENCE DEVOTED TO THE 150 ANNIVERSARY OF ALEXANDER S. POPOV, VOLS 1- 4, PROCEEDINGS, 2009, : 1930 - +
  • [6] Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy
    Nafea, Mohamed
    Yener, Aylin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (08) : 5125 - 5143
  • [7] Relay Cooperation Schemes for the Multiple Access Relay Channel: Compute-and-Forward and Successive Interference Cancellation
    Sattar, Zeeshan
    Jiang, Yunxiang
    Lau, Francis C. M.
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 1070 - 1075
  • [8] Bounds on the Secrecy Capacity Region of the Degraded Multiple-Access Relay Wiretap Channel
    Dai, Bin
    Ma, Zheng
    Yu, Linman
    PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 254 - 259
  • [9] Successive Interference Cancellation for LDPC Coded Nonorthogonal Multiple Access Systems
    Yuan, Lei
    Pan, Jie
    Yang, Nan
    Ding, Zhiguo
    Yuan, Jinhong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) : 5460 - 5464
  • [10] On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information
    Sonee, Amir
    Hodtani, Ghosheh Abed
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1151 - 1166