CUD Digital repository

Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios

Show simple item record

dc.contributor.author Zaghdoud, Nesrine
dc.contributor.author Mnaouer, Adel Ben
dc.contributor.author Alouane, Wided Hadj
dc.contributor.author Boujemaa, Hatem
dc.contributor.author Touati, Farid
dc.date.accessioned 2020-10-01T14:54:48Z
dc.date.available 2020-10-01T14:54:48Z
dc.date.copyright © 2020
dc.date.issued 2020-06
dc.identifier.citation Zaghdoud, N., Mnaouer, A. B., Alouane, W. H., Boujemaa, H., & Touati, F. (2020, June). Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios. In 2020 International Wireless Communications and Mobile Computing (IWCMC) (pp. 1726-1732). IEEE. https://doi.org/10.1109/IWCMC48107.2020.9148104 en_US
dc.identifier.isbn 978-172813129-0
dc.identifier.uri https://doi.org/10.1109/IWCMC48107.2020.9148104
dc.identifier.uri http://hdl.handle.net/20.500.12519/249
dc.description This conference paper is not available at CUD collection. The version of scholarly record of this conference paper is published in 2020 International Wireless Communications and Mobile Computing (IWCMC) (2020), available online at: https://doi.org/10.1109/IWCMC48107.2020.9148104 en_US
dc.description.abstract Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOMA) users have the capability of decoding the other paired users sharing the same resource bloc. As a result, NOMA technique is not only exposed to external eavesdropping, but also to internal eavesdropping which raises security risks regarding NOMA users' privacy. Therefore, this research aims to analyse a Multi-antenna cooperative NOMA system where both Decode and Forward (DF) and Amplify and Forward (AF) strategies are studied. In this context, we investigate the secrecy performance of our system with both internal and external eavesdropping scenarios. Closed-form expressions of the secrecy outage probability (SOP) and the strictly positive secrecy capacity (SPSC) metrics are derived. Numerical results are given to illustrate the validity of the obtained theoretical results. © 2020 IEEE. en_US
dc.language.iso en en_US
dc.publisher Institute of Electrical and Electronics Engineers Inc. en_US
dc.relation Authors Affiliations : Zaghdoud, N., Faculty of Engineering, Applied Science and Technology, Canadian University, Dubai, United Arab Emirates; Mnaouer, A.B., Faculty of Engineering, Applied Science and Technology, Canadian University, Dubai, United Arab Emirates; Alouane, W.H., University of Carthage, Supcom, LR11TIC01 Cosim Research Lab, Ariana, 2083, Tunisia; Boujemaa, H., Faculty of Engineering, Applied Science and Technology, Canadian University, Dubai, United Arab Emirates; Touati, F., Qatar University, Department of Electrical Engineering, Doha, Qatar
dc.relation.ispartofseries 2020 International Wireless Communications and Mobile Computing, IWCMC 2020;
dc.relation.uri https://www.ieee.org/publications/rights/rights-policies.html
dc.rights Permission to reuse abstract has been secured from Institute of Electrical and Electronics Engineers Inc.
dc.subject Amplify and Forward en_US
dc.subject Cooperative NOMA en_US
dc.subject Decode and Forward en_US
dc.subject external eavesdropping en_US
dc.subject internal eavesdropping en_US
dc.subject Multi-antenna en_US
dc.subject secrecy outage probability en_US
dc.subject strictly positive secrecy capacity en_US
dc.subject Antennas en_US
dc.subject Decoding en_US
dc.subject Mobile computing en_US
dc.subject Multiple access interference en_US
dc.subject Closed-form expression en_US
dc.subject Multiple access en_US
dc.subject Numerical results en_US
dc.subject Performance analysis en_US
dc.subject Secrecy outage probabilities en_US
dc.subject Successive interference cancellation(SIC) en_US
dc.subject Security systems en_US
dc.title Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios en_US
dc.type Conference Paper en_US
dc.rights.holder Copyright : © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search


Browse

My Account

Statistics