Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks

9Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of one base station, multinear user, multifar user, and one eavesdropper. To improve the secrecy performance, we propose the users selection scheme, called best-secure-near-user best-secure-far-user (BSNBSF) scheme. The BSNBSF scheme aims to select the best near-far user pair, whose data transmission is the most robust against the overhearing of an eavesdropper. In order to facilitate the performance analysis of the BSNBSF scheme in terms of secrecy outage performance, we derive the exact closed-form expression for secrecy outage probability (SOP) of the selected near user and the tight approximated closed-form expression for SOP of the selected far user, respectively. Additionally, we propose the descent-based search method to find the optimal values of the power allocation coefficients that can minimize the total secrecy outage probability (TSOP). The developed analyses are corroborated through Monte Carlo simulation. Comparisons with the random-near-user random-far-user (RNRF) scheme are performed and show that the proposed scheme significantly improves the secrecy performance.

Cite

CITATION STYLE

APA

Shim, K., & An, B. (2018). Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks. Wireless Communications and Mobile Computing, 2018. https://doi.org/10.1155/2018/2797824

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free