Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay

Authors
Yu, HeejungLee, Il-Gu
Issue Date
1월-2020
Publisher
ELSEVIER
Keywords
Non-orthogonal multiple access; Artificial jamming; Untrusted relay; Physical layer security
Citation
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.102, pp.611 - 618
Indexed
SCIE
SCOPUS
Journal Title
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
Volume
102
Start Page
611
End Page
618
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/58455
DOI
10.1016/j.future.2019.09.019
ISSN
0167-739X
Abstract
Physical layer security based on non-orthogonal multiple access (NOMA) and artificial jamming (AJ) is considered in a one-way amplify-and-forward (AF) relay network with an untrusted relay. In the first phase of the two-phase operation of the untrusted AF relay network, a source node transmits the first information and AJ symbols, and the destination decodes the AJ symbol first and waits for the relayed replica of the first information symbol, which is forwarded by the untrusted relay. In the second phase, the source sends the second information symbol and the relay amplifies and forwards the received signal in the first phase with a fixed gain. In such an operation scenario, an untrusted relay tries to eavesdrop on the information signal while relaying the received signal properly. To decode the information symbol, the destination cancels out the AJ signal and then decodes the first information symbol by combining the signals received during the two phases. Finally, the second information symbol is decoded with the second-phase signal after cancelling out all the other symbols, i.e., the first information and AJ symbols. The eavesdropper and relay try to eavesdrop on the information signal with all possible orders of interference cancellation, i.e., NOMA receive processing. In this study, an ergodic secrecy rate is derived according to the operation scenario during the two phases. The behaviours of the ergodic secrecy rate with respect to power allocation to two information symbols as well as an AJ symbol are investigated. It is shown that the expected secrecy rate can be maximized by selecting the transmit power and rates for the three symbols properly. It is also demonstrated that the proposed physical layer security scheme achieves a higher secrecy rate than a secure beamformed transmission based on NOMA and artificial noise. (C) 2019 Elsevier B.V. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Electronics and Information Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE