Visible to the public Biblio

Filters: Keyword is Non-Orthogonal Multiple Access (NOMA)  [Clear All Filters]
2023-04-28
Nguyen, Tu-Trinh Thi, Nguyen, Xuan-Xinh, Kha, Ha Hoang.  2022.  Secrecy Outage Performance Analysis for IRS-Aided Cognitive Radio NOMA Networks. 2022 IEEE Ninth International Conference on Communications and Electronics (ICCE). :149–154.
This paper investigates the physical layer security of a cognitive radio (CR) non-orthogonal multiple-access (NOMA) network supported by an intelligent reflecting surface (IRS). In a CR network, a secondary base station (BS) serves a couple of users, i.e., near and far users, via NOMA transmission under eavesdropping from a malicious attacker. It is assumed that the direct transmission link from the BS and far user is absent due to obstacles. Thus, an IRS is utilized to support far user communication, however, the communication links between the IRS and near/primary users are neglected because of heavy attenuation. The exact secrecy outage probability (SOP) for the near user and approximate SOP for the far user are then derived in closed-form by using the Gauss-Chebyshev approach. The accuracy of the derived analytical SOP is then verified through Monte Carlo simulations. The simulation results also provide useful insights on the impacts of the number of IRS reflecting elements and limited interference temperature on the system SOP.
2023-01-05
Garcia, Carla E., Camana, Mario R., Koo, Insoo.  2022.  DNN aided PSO based-scheme for a Secure Energy Efficiency Maximization in a cooperative NOMA system with a non-linear EH. 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN). :155–160.
Physical layer security is an emerging security area to tackle wireless security communications issues and complement conventional encryption-based techniques. Thus, we propose a novel scheme based on swarm intelligence optimization technique and a deep neural network (DNN) for maximizing the secrecy energy efficiency (SEE) in a cooperative relaying underlay cognitive radio- and non-orthogonal multiple access (NOMA) system with a non-linear energy harvesting user which is exposed to multiple eavesdroppers. Satisfactorily, simulation results show that the proposed particle swarm optimization (PSO)-DNN framework achieves close performance to that of the optimal solutions, with a meaningful reduction in computation complexity.
2022-12-01
Jacob, Liya Mary, Sreelakshmi, P, Deepthi, P.P.  2021.  Physical Layer Security in Power Domain NOMA through Key Extraction. 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). :1–7.
Non-orthogonal multiple access (NOMA) is emerging as a popular radio access technique to serve multiple users under the same resource block to improve spectral efficiency in 5G and 6G communication. But the resource sharing in NOMA causes concerns on data security. Since power domain NOMA exploits the difference in channel properties for bandwidth-efficient communication, it is feasible to ensure data confidentiality in NOMA communication through physical layer security techniques. In this work, we propose to ensure resistance against internal eavesdropping in NOMA communication through a secret key derived from channel randomness. A unique secret key is derived from the channel of each NOMA user; which is used to randomize the data of the respective user before superposition coding (SC) to prevent internal eavesdropping. The simulation results show that the proposed system provides very good security against internal eavesdropping in NOMA.
2021-05-18
Yesilkaya, Anil, Cogalan, Tezcan, Erkucuk, Serhat, Sadi, Yalcin, Panayirci, Erdal, Haas, Harald, Poor, H. Vincent.  2020.  Physical-Layer Security in Visible Light Communications. 2020 2nd 6G Wireless Summit (6G SUMMIT). :1–5.
Optical wireless communications (OWC) and its potential to solve physical layer security (PLS) issues are becoming important research areas in 6G communications systems. In this paper, an overview of PLS in visible light communications (VLC), is presented. Then, two new PLS techniques based on generalized space shift keying (GSSK) modulation with spatial constellation design (SCD) and non-orthogonal multiple access (NOMA) cooperative relaying are introduced. In the first technique, the PLS of the system is enhanced by the appropriate selection of a precoding matrix for randomly activated light emitting diodes (LEDs). With the aid of a legitimate user's (Bob's) channel state information (CSI) at the transmitter (CSIT), the bit error ratio (BER) of Bob is minimized while the BER performance of the potential eavesdroppers (Eves) is significantly degraded. In the second technique, superposition coding with uniform signaling is used at the transmitter and relays. The design of secure beamforming vectors at the relay nodes along with NOMA techniques is used to enhance PLS in a VLC system. Insights gained from the improved security levels of the proposed techniques are used to discuss how PLS can be further improved in future generation communication systems by using VLC.
2020-12-14
Goudos, S. K., Diamantoulakis, P. D., Boursianis, A. D., Papanikolaou, V. K., Karagiannidis, G. K..  2020.  Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks. 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST). :1–4.
In this paper, we address the problem of joint user association and power allocation for non-orthogonal multiple access (NOMA) networks with multiple base stations (BSs). A user grouping procedure into orthogonal clusters, as well as an allocation of different physical resource blocks (PRBs) is considered. The problem of interest is mathematically described using the maximization of the weighted sum rate. We apply two different swarm intelligence algorithms, namely, the recently introduced Grey Wolf Optimizer (GWO), and the popular Particle Swarm Optimization (PSO), in order to solve this problem. Numerical results demonstrate that the above-described problem can be satisfactorily addressed by both algorithms.