http://10.10.120.238:8080/xmlui/handle/123456789/173
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hota P.K. | en_US |
dc.contributor.author | Mishra D. | en_US |
dc.contributor.author | Saini R. | en_US |
dc.contributor.author | Dubey A. | en_US |
dc.date.accessioned | 2023-11-30T08:12:22Z | - |
dc.date.available | 2023-11-30T08:12:22Z | - |
dc.date.issued | 2022 | - |
dc.identifier.isbn | 978-1665494557 | - |
dc.identifier.other | EID(2-s2.0-85135990924) | - |
dc.identifier.uri | https://dx.doi.org/10.1109/SPAWC51304.2022.9833936 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/173 | - |
dc.description.abstract | Designing a secure non-orthogonal multiple access (NOMA) system has recently sparked a lot of interest among researchers due to its competency over bandwidth utilization. This paper addresses the critical security issue that arises from the adoption of successive interference cancellation based decoding approach in a two-user untrusted NOMA scenario. With the objective of maximizing secrecy fairness between users, a joint optimization problem of power allocation and decoding order is investigated to maximize the minimum ergodic secrecy rate between users. The optimized solutions are obtained by proposing a low computational complexity iterative method. In addition, closed-form optimal solutions based on a tight approximation are presented. Finally, numerical simulations validate the key nontrivial analytical claims and demonstrate that substantial performance gain is achieved over existing benchmark schemes. © 2022 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC | en_US |
dc.subject | Decoding order | en_US |
dc.subject | ergodic secrecy rate | en_US |
dc.subject | physical layer security | en_US |
dc.subject | power allocation | en_US |
dc.subject | untrusted NOMA | en_US |
dc.title | Secure NOMA for Maximizing Ergodic Secrecy Fairness in the Presence of Untrusted Users | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Conference Paper |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.