Meiling Li, Bassant Selim, S. Muhaidat, P. Sofotasios, Paul Yoo, Jie Liang, Anhong Wang
{"title":"基于noma的安全中继系统的残余硬件损伤","authors":"Meiling Li, Bassant Selim, S. Muhaidat, P. Sofotasios, Paul Yoo, Jie Liang, Anhong Wang","doi":"10.1109/WPMC48795.2019.9096142","DOIUrl":null,"url":null,"abstract":"Non-orthogonal multiple access (NOMA) has been proposed as a promising technology that is capable of improving the spectral efficiency of fifth-generation wireless networks and beyond. However, in practical communication scenarios, transceiver architectures inevitably suffer from radio frequency (RF) front-end related impairments that cause non-negligible performance degradation. This issue can be addressed by analog and digital signal processing algorithms, but factors such as time-varying hardware characteristics and imperfect compensation schemes result to detrimental residual distortions. In the present contribution we investigate the physical layer security of NOMA-based amplify-and-forward relay systems under such realistically incurred residual hardware impairment (RHI) effects. Exact and asymptotic analytic expressions for the corresponding outage probability (OP) and intercept probability (IP) of the considered set up over multipath fading channels are derived and corroborated by respective simulation results. Based on this, it is shown that RHI affects both the legitimate users and eavesdroppers by increasing the OP and decreasing the IP. For a fixed OP, RHI generally increases the corresponding IP, thereby reducing the secure performance of the system. Further interesting insights are also provided, verifying the importance of the offered results for the effective design and deployment of secure cooperative communication systems.","PeriodicalId":298927,"journal":{"name":"2019 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Residual Hardware Impairments on Secure NOMA-Based Relay Systems\",\"authors\":\"Meiling Li, Bassant Selim, S. Muhaidat, P. Sofotasios, Paul Yoo, Jie Liang, Anhong Wang\",\"doi\":\"10.1109/WPMC48795.2019.9096142\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Non-orthogonal multiple access (NOMA) has been proposed as a promising technology that is capable of improving the spectral efficiency of fifth-generation wireless networks and beyond. However, in practical communication scenarios, transceiver architectures inevitably suffer from radio frequency (RF) front-end related impairments that cause non-negligible performance degradation. This issue can be addressed by analog and digital signal processing algorithms, but factors such as time-varying hardware characteristics and imperfect compensation schemes result to detrimental residual distortions. In the present contribution we investigate the physical layer security of NOMA-based amplify-and-forward relay systems under such realistically incurred residual hardware impairment (RHI) effects. Exact and asymptotic analytic expressions for the corresponding outage probability (OP) and intercept probability (IP) of the considered set up over multipath fading channels are derived and corroborated by respective simulation results. Based on this, it is shown that RHI affects both the legitimate users and eavesdroppers by increasing the OP and decreasing the IP. For a fixed OP, RHI generally increases the corresponding IP, thereby reducing the secure performance of the system. Further interesting insights are also provided, verifying the importance of the offered results for the effective design and deployment of secure cooperative communication systems.\",\"PeriodicalId\":298927,\"journal\":{\"name\":\"2019 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC)\",\"volume\":\"106 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WPMC48795.2019.9096142\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WPMC48795.2019.9096142","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Residual Hardware Impairments on Secure NOMA-Based Relay Systems
Non-orthogonal multiple access (NOMA) has been proposed as a promising technology that is capable of improving the spectral efficiency of fifth-generation wireless networks and beyond. However, in practical communication scenarios, transceiver architectures inevitably suffer from radio frequency (RF) front-end related impairments that cause non-negligible performance degradation. This issue can be addressed by analog and digital signal processing algorithms, but factors such as time-varying hardware characteristics and imperfect compensation schemes result to detrimental residual distortions. In the present contribution we investigate the physical layer security of NOMA-based amplify-and-forward relay systems under such realistically incurred residual hardware impairment (RHI) effects. Exact and asymptotic analytic expressions for the corresponding outage probability (OP) and intercept probability (IP) of the considered set up over multipath fading channels are derived and corroborated by respective simulation results. Based on this, it is shown that RHI affects both the legitimate users and eavesdroppers by increasing the OP and decreasing the IP. For a fixed OP, RHI generally increases the corresponding IP, thereby reducing the secure performance of the system. Further interesting insights are also provided, verifying the importance of the offered results for the effective design and deployment of secure cooperative communication systems.