Security Improvement With QoS Provisioning Using Service Priority and Power Allocation for NOMA-IoT Networks
- Authors
- Khalid, Waqas; Yu, Heejung
- Issue Date
- 2021
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- NOMA; Quality of service; Internet of Things; Signal to noise ratio; Security; 5G mobile communication; Throughput; Physical layer security; non-orthogonal multiple access (NOMA); IoT networks; service priority; power allocation; Rayleigh fading
- Citation
- IEEE ACCESS, v.9, pp.9937 - 9948
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE ACCESS
- Volume
- 9
- Start Page
- 9937
- End Page
- 9948
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/50670
- DOI
- 10.1109/ACCESS.2021.3049258
- ISSN
- 2169-3536
- Abstract
- Non-orthogonal multiple access (NOMA) has gained attention as a promising multiple access scheme for the Internet of Things (IoT). A typical setting of user ordering in NOMA networks with user priority difference allows a service priority for solely low-rate high-priority users. In contrast, the diverse quality of service (QoS) requirements and service priorities are prerequisite features of users in the IoT. In this paper, we consider a downlink transmission scenario for NOMA-IoT networks in which the base station (BS) simultaneously serves the two users with a priority difference. To tackle the requirements of the IoT, we consider two schemes: a service priority scheme for high-priority user (SP-HP), and a service priority scheme for low-priority user (SP-LP). Meanwhile, the BS adopts a power allocation strategy to realize the desirable QoS provision for high-priority user and optimize the outage experience of low-priority user in an opportunistic manner. It is novel and interesting to extend the NOMA-IoT framework for a malicious attempt of a passive eavesdropper. To investigate the efficiency and security performances of both schemes, the connection and secrecy outage probabilities of both users are characterized, and their closed-form expressions are derived over Rayleigh fading channels. An effective secrecy throughput (EST) is presented to holistically characterize the performance of the system. Numerical results validate the accuracy of the theoretical results. The results suggest that the transmit power of both users in each scheme can be optimized for the maximum EST, and a selection of an optimal scheme for the reliable and secure transmissions of both users is possible under certain channel conditions.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Graduate School > Department of Electronics and Information Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.