On Secure Downlink NOMA Systems With Outage Constraint

Hongjiang Lei,Rui Gao,Ki-Hong Park,Imran Shafique Ansari,Kyeong Jin Kim,Mohamed-Slim Alouini
DOI: https://doi.org/10.1109/tcomm.2020.3021139
IF: 6.166
2020-12-01
IEEE Transactions on Communications
Abstract:In this work, we investigate the relationship between the reliability and security of a typical two-user downlink non-orthogonal multiple access (NOMA) communication system. The level of successive interference cancellation on NOMA user is considered. Firstly, the impact of various key parameters on transmit signal-to-noise ratio (SNR) of the NOMA users with the reliability outage probability (ROP) constraint is discussed. Taking the minimum of transmit SNR for ROP into account, the secrecy outage performance of the downlink NOMA systems is studied and the analytical expressions of the secrecy outage probability of the NOMA system are derived under two cases of eavesdropping capability. Furthermore, the sum effective secrecy throughput of the NOMA system under two scenarios with considering ROP constraint is derived. Monte Carlo simulations are provided to verify the accuracy of our analysis.
telecommunications,engineering, electrical & electronic
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to analyze the security performance of the system while satisfying the reliability outage probability (ROP) constraint in non - orthogonal multiple access (NOMA) systems. Specifically, the security outage probability (SOP) and the effective secrecy throughput (EST) of a two - user downlink NOMA system are studied under two different eavesdropper decoding ability scenarios. In addition, the paper also explores the influence of different parameters on the transmission signal - to - noise ratio (SNR) and considers the influence of imperfect successive interference cancellation (ipSIC) on the system performance. ### Main contributions: 1. **Analysis of security performance under reliability constraints**: - Considering the reliability outage probability (ROP) constraint and imperfect successive interference cancellation (ipSIC), the influence of different parameters on the minimum transmission SNR is analyzed. - Analytic expressions for the exact security outage probability (SOP), the asymptotic SOP, and the total effective secrecy throughput (sEST) are derived in two eavesdropper decoding ability scenarios. - The relationship between ROP and security performance (SOP and sEST) is comprehensively discussed. 2. **Extension of the definition of effective secrecy throughput (EST)**: - Compared with the EST defined in previous literature, this paper extends it to NOMA systems, especially in scenarios with different eavesdropper decoding abilities. - The EST defined as the product of the target security rate, the complementary ROP, and the complementary interception probability (IP) is studied, and closed - form expressions in two scenarios are derived. 3. **More realistic setting of ipSIC level**: - Not only the SOP of the strong (near) user is analyzed, but also the SOP and sEST are analyzed considering the ROP constraint and ipSIC simultaneously. - The set ipSIC level is more in line with the situation in practical applications. 4. **In - depth study of the influence of ROP on security performance**: - The influence of different parameters on the minimum transmission SNR of the NOMA system is analyzed, and the relationship between ROP and security performance is explored. - This research provides a more comprehensive analysis compared with previous literature. 5. **Discussion on the relationship between security and reliability**: - Compared with the methods of quantifying security and reliability in other studies, this paper explores the relationship between security performance (SOP, sEST) and reliability in NOMA systems. - Technically, it is more challenging to derive the closed - form expression of the SOP of the NOMA system, especially when considering ipSIC, ROP constraints, and related secrecy capacities. ### Conclusion: Through the above analysis, the paper not only provides a new perspective on the security and reliability of NOMA systems but also provides theoretical basis and technical support for future research. In particular, by considering the imperfect successive interference cancellation (ipSIC) and the reliability outage probability (ROP) constraint in practical applications, the paper provides an important reference for designing more secure and reliable NOMA systems.