Detailed Information

Cited 2 time in webofscience Cited 2 time in scopus
Metadata Downloads

Security Improvement With QoS Provisioning Using Service Priority and Power Allocation for NOMA-IoT Networks

Authors
Khalid, WaqasYu, Heejung
Issue Date
2021
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
NOMA; Quality of service; Internet of Things; Signal to noise ratio; Security; 5G mobile communication; Throughput; Physical layer security; non-orthogonal multiple access (NOMA); IoT networks; service priority; power allocation; Rayleigh fading
Citation
IEEE ACCESS, v.9, pp.9937 - 9948
Indexed
SCIE
SCOPUS
Journal Title
IEEE ACCESS
Volume
9
Start Page
9937
End Page
9948
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/50670
DOI
10.1109/ACCESS.2021.3049258
ISSN
2169-3536
Abstract
Non-orthogonal multiple access (NOMA) has gained attention as a promising multiple access scheme for the Internet of Things (IoT). A typical setting of user ordering in NOMA networks with user priority difference allows a service priority for solely low-rate high-priority users. In contrast, the diverse quality of service (QoS) requirements and service priorities are prerequisite features of users in the IoT. In this paper, we consider a downlink transmission scenario for NOMA-IoT networks in which the base station (BS) simultaneously serves the two users with a priority difference. To tackle the requirements of the IoT, we consider two schemes: a service priority scheme for high-priority user (SP-HP), and a service priority scheme for low-priority user (SP-LP). Meanwhile, the BS adopts a power allocation strategy to realize the desirable QoS provision for high-priority user and optimize the outage experience of low-priority user in an opportunistic manner. It is novel and interesting to extend the NOMA-IoT framework for a malicious attempt of a passive eavesdropper. To investigate the efficiency and security performances of both schemes, the connection and secrecy outage probabilities of both users are characterized, and their closed-form expressions are derived over Rayleigh fading channels. An effective secrecy throughput (EST) is presented to holistically characterize the performance of the system. Numerical results validate the accuracy of the theoretical results. The results suggest that the transmit power of both users in each scheme can be optimized for the maximum EST, and a selection of an optimal scheme for the reliable and secure transmissions of both users is possible under certain channel conditions.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Electronics and Information Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE