Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay

Full metadata record
DC Field Value Language
dc.contributor.authorYu, Heejung-
dc.contributor.authorLee, Il-Gu-
dc.date.accessioned2021-08-31T14:57:49Z-
dc.date.available2021-08-31T14:57:49Z-
dc.date.created2021-06-19-
dc.date.issued2020-01-
dc.identifier.issn0167-739X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/58455-
dc.description.abstractPhysical layer security based on non-orthogonal multiple access (NOMA) and artificial jamming (AJ) is considered in a one-way amplify-and-forward (AF) relay network with an untrusted relay. In the first phase of the two-phase operation of the untrusted AF relay network, a source node transmits the first information and AJ symbols, and the destination decodes the AJ symbol first and waits for the relayed replica of the first information symbol, which is forwarded by the untrusted relay. In the second phase, the source sends the second information symbol and the relay amplifies and forwards the received signal in the first phase with a fixed gain. In such an operation scenario, an untrusted relay tries to eavesdrop on the information signal while relaying the received signal properly. To decode the information symbol, the destination cancels out the AJ signal and then decodes the first information symbol by combining the signals received during the two phases. Finally, the second information symbol is decoded with the second-phase signal after cancelling out all the other symbols, i.e., the first information and AJ symbols. The eavesdropper and relay try to eavesdrop on the information signal with all possible orders of interference cancellation, i.e., NOMA receive processing. In this study, an ergodic secrecy rate is derived according to the operation scenario during the two phases. The behaviours of the ergodic secrecy rate with respect to power allocation to two information symbols as well as an AJ symbol are investigated. It is shown that the expected secrecy rate can be maximized by selecting the transmit power and rates for the three symbols properly. It is also demonstrated that the proposed physical layer security scheme achieves a higher secrecy rate than a secure beamformed transmission based on NOMA and artificial noise. (C) 2019 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER-
dc.subjectNONORTHOGONAL MULTIPLE-ACCESS-
dc.subjectARTIFICIAL-NOISE-
dc.subjectPOWER ALLOCATION-
dc.subjectTRANSMISSION-
dc.subjectNETWORKS-
dc.titlePhysical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay-
dc.typeArticle-
dc.contributor.affiliatedAuthorYu, Heejung-
dc.identifier.doi10.1016/j.future.2019.09.019-
dc.identifier.scopusid2-s2.0-85072231071-
dc.identifier.wosid000501936300051-
dc.identifier.bibliographicCitationFUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.102, pp.611 - 618-
dc.relation.isPartOfFUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE-
dc.citation.titleFUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE-
dc.citation.volume102-
dc.citation.startPage611-
dc.citation.endPage618-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusNONORTHOGONAL MULTIPLE-ACCESS-
dc.subject.keywordPlusARTIFICIAL-NOISE-
dc.subject.keywordPlusPOWER ALLOCATION-
dc.subject.keywordPlusTRANSMISSION-
dc.subject.keywordPlusNETWORKS-
dc.subject.keywordAuthorNon-orthogonal multiple access-
dc.subject.keywordAuthorArtificial jamming-
dc.subject.keywordAuthorUntrusted relay-
dc.subject.keywordAuthorPhysical layer security-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Electronics and Information Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE