Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios
dc.contributor.author | Zaghdoud, Nesrine | |
dc.contributor.author | Mnaouer, Adel Ben | |
dc.contributor.author | Alouane, Wided Hadj | |
dc.contributor.author | Boujemaa, Hatem | |
dc.contributor.author | Touati, Farid | |
dc.date.accessioned | 2020-10-01T14:54:48Z | |
dc.date.available | 2020-10-01T14:54:48Z | |
dc.date.copyright | © 2020 | |
dc.date.issued | 2020-06 | |
dc.description | This conference paper is not available at CUD collection. The version of scholarly record of this conference paper is published in 2020 International Wireless Communications and Mobile Computing (IWCMC) (2020), available online at: https://doi.org/10.1109/IWCMC48107.2020.9148104 | en_US |
dc.description.abstract | Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOMA) users have the capability of decoding the other paired users sharing the same resource bloc. As a result, NOMA technique is not only exposed to external eavesdropping, but also to internal eavesdropping which raises security risks regarding NOMA users' privacy. Therefore, this research aims to analyse a Multi-antenna cooperative NOMA system where both Decode and Forward (DF) and Amplify and Forward (AF) strategies are studied. In this context, we investigate the secrecy performance of our system with both internal and external eavesdropping scenarios. Closed-form expressions of the secrecy outage probability (SOP) and the strictly positive secrecy capacity (SPSC) metrics are derived. Numerical results are given to illustrate the validity of the obtained theoretical results. © 2020 IEEE. | en_US |
dc.identifier.citation | Zaghdoud, N., Mnaouer, A. B., Alouane, W. H., Boujemaa, H., & Touati, F. (2020, June). Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios. In 2020 International Wireless Communications and Mobile Computing (IWCMC) (pp. 1726-1732). IEEE. https://doi.org/10.1109/IWCMC48107.2020.9148104 | en_US |
dc.identifier.isbn | 978-172813129-0 | |
dc.identifier.uri | https://doi.org/10.1109/IWCMC48107.2020.9148104 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12519/249 | |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation | Authors Affiliations : Zaghdoud, N., Faculty of Engineering, Applied Science and Technology, Canadian University, Dubai, United Arab Emirates; Mnaouer, A.B., Faculty of Engineering, Applied Science and Technology, Canadian University, Dubai, United Arab Emirates; Alouane, W.H., University of Carthage, Supcom, LR11TIC01 Cosim Research Lab, Ariana, 2083, Tunisia; Boujemaa, H., Faculty of Engineering, Applied Science and Technology, Canadian University, Dubai, United Arab Emirates; Touati, F., Qatar University, Department of Electrical Engineering, Doha, Qatar | |
dc.relation.ispartofseries | 2020 International Wireless Communications and Mobile Computing, IWCMC 2020; | |
dc.relation.uri | https://www.ieee.org/publications/rights/rights-policies.html | |
dc.rights | Permission to reuse abstract has been secured from Institute of Electrical and Electronics Engineers Inc. | |
dc.rights.holder | Copyright : © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
dc.subject | Amplify and Forward | en_US |
dc.subject | Cooperative NOMA | en_US |
dc.subject | Decode and Forward | en_US |
dc.subject | external eavesdropping | en_US |
dc.subject | internal eavesdropping | en_US |
dc.subject | Multi-antenna | en_US |
dc.subject | secrecy outage probability | en_US |
dc.subject | strictly positive secrecy capacity | en_US |
dc.subject | Antennas | en_US |
dc.subject | Decoding | en_US |
dc.subject | Mobile computing | en_US |
dc.subject | Multiple access interference | en_US |
dc.subject | Closed-form expression | en_US |
dc.subject | Multiple access | en_US |
dc.subject | Numerical results | en_US |
dc.subject | Performance analysis | en_US |
dc.subject | Secrecy outage probabilities | en_US |
dc.subject | Successive interference cancellation(SIC) | en_US |
dc.subject | Security systems | en_US |
dc.title | Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios | en_US |
dc.type | Conference Paper | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Access Instruction 249.pdf
- Size:
- 56.56 KB
- Format:
- Adobe Portable Document Format
- Description: