{"title":"能量清除短包传输中正交/非正交多址的保密性分析","authors":"Toi Le-Thanh , Khuong Ho-Van , Thiem Do-Dac","doi":"10.1016/j.comcom.2025.108214","DOIUrl":null,"url":null,"abstract":"<div><div>Energy scavenging (ES)-enabled short-packet transmission (SPT) aims to attain low latency, high energy efficiency, high reliability by combining radio frequency ES with SPT. However, ES-enabled SPT (ESSPT) is susceptible to malicious overhearing attributable to broadcast feature of wireless transmission. To have prompt insights into secrecy capability of nonorthogonal/orthogonal multiple access (NOMA/OMA) in ESSPT, this paper proposes an analytical framework under realistic imperfections, such as arbitrary fading severity, hardware imperfection (HWi), nonlinear ES (nlES), channel state information imperfection (CSIi), and successive interference cancellation imperfection (SICi). Monte-Carlo simulations validate the proposed framework and expose the significant degradation of the secrecy capability of NOMA/OMA in ESSPT due to these imperfections. Moreover, the secrecy capability of NOMA/OMA in ESSPT can be maximized by selecting properly the transmit power and ES duration. Remarkably, in ESSPT, average effective secrecy rate sum and average secrecy throughput sum of OMA are almost double those of NOMA, indicating a significant superiority of OMA over NOMA in terms of security.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"240 ","pages":"Article 108214"},"PeriodicalIF":4.3000,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secrecy analysis of orthogonal/nonorthogonal multiple access in energy scavenging-enabled short-packet transmission\",\"authors\":\"Toi Le-Thanh , Khuong Ho-Van , Thiem Do-Dac\",\"doi\":\"10.1016/j.comcom.2025.108214\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Energy scavenging (ES)-enabled short-packet transmission (SPT) aims to attain low latency, high energy efficiency, high reliability by combining radio frequency ES with SPT. However, ES-enabled SPT (ESSPT) is susceptible to malicious overhearing attributable to broadcast feature of wireless transmission. To have prompt insights into secrecy capability of nonorthogonal/orthogonal multiple access (NOMA/OMA) in ESSPT, this paper proposes an analytical framework under realistic imperfections, such as arbitrary fading severity, hardware imperfection (HWi), nonlinear ES (nlES), channel state information imperfection (CSIi), and successive interference cancellation imperfection (SICi). Monte-Carlo simulations validate the proposed framework and expose the significant degradation of the secrecy capability of NOMA/OMA in ESSPT due to these imperfections. Moreover, the secrecy capability of NOMA/OMA in ESSPT can be maximized by selecting properly the transmit power and ES duration. Remarkably, in ESSPT, average effective secrecy rate sum and average secrecy throughput sum of OMA are almost double those of NOMA, indicating a significant superiority of OMA over NOMA in terms of security.</div></div>\",\"PeriodicalId\":55224,\"journal\":{\"name\":\"Computer Communications\",\"volume\":\"240 \",\"pages\":\"Article 108214\"},\"PeriodicalIF\":4.3000,\"publicationDate\":\"2025-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0140366425001719\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0140366425001719","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Secrecy analysis of orthogonal/nonorthogonal multiple access in energy scavenging-enabled short-packet transmission
Energy scavenging (ES)-enabled short-packet transmission (SPT) aims to attain low latency, high energy efficiency, high reliability by combining radio frequency ES with SPT. However, ES-enabled SPT (ESSPT) is susceptible to malicious overhearing attributable to broadcast feature of wireless transmission. To have prompt insights into secrecy capability of nonorthogonal/orthogonal multiple access (NOMA/OMA) in ESSPT, this paper proposes an analytical framework under realistic imperfections, such as arbitrary fading severity, hardware imperfection (HWi), nonlinear ES (nlES), channel state information imperfection (CSIi), and successive interference cancellation imperfection (SICi). Monte-Carlo simulations validate the proposed framework and expose the significant degradation of the secrecy capability of NOMA/OMA in ESSPT due to these imperfections. Moreover, the secrecy capability of NOMA/OMA in ESSPT can be maximized by selecting properly the transmit power and ES duration. Remarkably, in ESSPT, average effective secrecy rate sum and average secrecy throughput sum of OMA are almost double those of NOMA, indicating a significant superiority of OMA over NOMA in terms of security.
期刊介绍:
Computer and Communications networks are key infrastructures of the information society with high socio-economic value as they contribute to the correct operations of many critical services (from healthcare to finance and transportation). Internet is the core of today''s computer-communication infrastructures. This has transformed the Internet, from a robust network for data transfer between computers, to a global, content-rich, communication and information system where contents are increasingly generated by the users, and distributed according to human social relations. Next-generation network technologies, architectures and protocols are therefore required to overcome the limitations of the legacy Internet and add new capabilities and services. The future Internet should be ubiquitous, secure, resilient, and closer to human communication paradigms.
Computer Communications is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and survey papers covering all aspects of future computer communication networks (on all layers, except the physical layer), with a special attention to the evolution of the Internet architecture, protocols, services, and applications.