Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Heejung | - |
dc.contributor.author | Lee, Il-Gu | - |
dc.date.accessioned | 2021-08-31T14:57:49Z | - |
dc.date.available | 2021-08-31T14:57:49Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2020-01 | - |
dc.identifier.issn | 0167-739X | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/58455 | - |
dc.description.abstract | Physical layer security based on non-orthogonal multiple access (NOMA) and artificial jamming (AJ) is considered in a one-way amplify-and-forward (AF) relay network with an untrusted relay. In the first phase of the two-phase operation of the untrusted AF relay network, a source node transmits the first information and AJ symbols, and the destination decodes the AJ symbol first and waits for the relayed replica of the first information symbol, which is forwarded by the untrusted relay. In the second phase, the source sends the second information symbol and the relay amplifies and forwards the received signal in the first phase with a fixed gain. In such an operation scenario, an untrusted relay tries to eavesdrop on the information signal while relaying the received signal properly. To decode the information symbol, the destination cancels out the AJ signal and then decodes the first information symbol by combining the signals received during the two phases. Finally, the second information symbol is decoded with the second-phase signal after cancelling out all the other symbols, i.e., the first information and AJ symbols. The eavesdropper and relay try to eavesdrop on the information signal with all possible orders of interference cancellation, i.e., NOMA receive processing. In this study, an ergodic secrecy rate is derived according to the operation scenario during the two phases. The behaviours of the ergodic secrecy rate with respect to power allocation to two information symbols as well as an AJ symbol are investigated. It is shown that the expected secrecy rate can be maximized by selecting the transmit power and rates for the three symbols properly. It is also demonstrated that the proposed physical layer security scheme achieves a higher secrecy rate than a secure beamformed transmission based on NOMA and artificial noise. (C) 2019 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.subject | NONORTHOGONAL MULTIPLE-ACCESS | - |
dc.subject | ARTIFICIAL-NOISE | - |
dc.subject | POWER ALLOCATION | - |
dc.subject | TRANSMISSION | - |
dc.subject | NETWORKS | - |
dc.title | Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Yu, Heejung | - |
dc.identifier.doi | 10.1016/j.future.2019.09.019 | - |
dc.identifier.scopusid | 2-s2.0-85072231071 | - |
dc.identifier.wosid | 000501936300051 | - |
dc.identifier.bibliographicCitation | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.102, pp.611 - 618 | - |
dc.relation.isPartOf | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | - |
dc.citation.title | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | - |
dc.citation.volume | 102 | - |
dc.citation.startPage | 611 | - |
dc.citation.endPage | 618 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | NONORTHOGONAL MULTIPLE-ACCESS | - |
dc.subject.keywordPlus | ARTIFICIAL-NOISE | - |
dc.subject.keywordPlus | POWER ALLOCATION | - |
dc.subject.keywordPlus | TRANSMISSION | - |
dc.subject.keywordPlus | NETWORKS | - |
dc.subject.keywordAuthor | Non-orthogonal multiple access | - |
dc.subject.keywordAuthor | Artificial jamming | - |
dc.subject.keywordAuthor | Untrusted relay | - |
dc.subject.keywordAuthor | Physical layer security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.