2020
DOI: 10.1109/access.2020.2966822
|View full text |Cite
|
Sign up to set email alerts
|

Jamming-Aided Secrecy Performance in Secure Uplink NOMA System

Abstract: A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work. We first characterize secrecy performance in terms of positive secrecy rate probability, secrecy outage probability (SOP) and effective secrecy throughput (EST), and derive the closed-expressions of individual secrecy performance. The analytical results not only show an improvement on secrecy performance with the aid of cooperative jamming, but also c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 38 publications
0
6
0
Order By: Relevance
“…6) Jamming-Aided-NOMA [311]- [312] In [311], authors studied the cooperative jamming in the UL NOMA system in the presence of one eavesdropper to improve the security of the system. The performance of the system was analyzed in terms of secrecy rate probability, secrecy outage probability, and effective secrecy throughput.…”
Section: Y Physical Layer Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…6) Jamming-Aided-NOMA [311]- [312] In [311], authors studied the cooperative jamming in the UL NOMA system in the presence of one eavesdropper to improve the security of the system. The performance of the system was analyzed in terms of secrecy rate probability, secrecy outage probability, and effective secrecy throughput.…”
Section: Y Physical Layer Securitymentioning
confidence: 99%
“…The performance of the system was analyzed in terms of secrecy rate probability, secrecy outage probability, and effective secrecy throughput. In contrast to [311], the authors in [312] studied the friendly EH jammer aided uplink NOMA transmission and proposed the random EH jammer selection (REJS), maximal EH jammer selection (MEJS), and optimal EH jammer selection (OEJS) schemes to enhance the PLS of the NOMA system. Based on the proposed transmission schemes, the performance of the schemes was analyzed in terms of connection outage probability (COP), secrecy outage probability (SOP), and effective secrecy throughput (EST) to examine the reliability and security of the system.…”
Section: Y Physical Layer Securitymentioning
confidence: 99%
“…Remark 3: Similarly, since the same parameters lead to the enhancement of SOP, this section presents the expressions of SPSC performance which relate to the similar system parameters reported for SOP metric. For example, we examine the main factors affecting the SPSC performance in (36) which are φ, φ E and the related channel gains, and hence secure performance metrics depend mainly on these parameters. As a result, by controlling these values, an improvement in the SOP and SPSC indicators can be achieved.…”
Section: Spsc Analysis a Spsc Of D1mentioning
confidence: 99%
“…Additionally, to secure the confidential information against eavesdropping and to enhance the secrecy performance further, cooperative jamming technique has been employed for NOMA system. 28 Later, an extension of Jiang et al 28 the secrecy analysis of cooperative NOMA system, is also studied with the aid of cooperative jammer, where power allocation problem is also analyzed. 29,30 From the aforementioned studies, to the best of author's knowledge, it is noticed that the secrecy analysis of cooperative NOMA network with jamming schemes is not deliberated.…”
Section: Introductionmentioning
confidence: 99%
“…The secrecy performance of NOMA and cooperative NOMA network without jamming (WJ) is investigated in Chen et al and Zaghdoud et al 26,27 which further motivated us to examine the secrecy analysis of cooperative NOMA network under different jamming conditions. Additionally, to secure the confidential information against eavesdropping and to enhance the secrecy performance further, cooperative jamming technique has been employed for NOMA system 28 . Later, an extension of Jiang et al 28 the secrecy analysis of cooperative NOMA system, is also studied with the aid of cooperative jammer, where power allocation problem is also analyzed 29,30 .…”
Section: Introductionmentioning
confidence: 99%