M. Abolpour, S. Aïssa, L. Musavian and A. Bhowal, "Rate Splitting in the Presence of Untrusted Users: Outage and Secrecy Outage Performances," in IEEE Open Journal of the Communications Society, vol. 3, pp. 921-935, 2022, doi: 10.1109/OJCOMS.2022.3175426
Rate splitting in the presence of untrusted users : outage and secrecy outage performances
|Author:||Abolpour, Milad1,2; Aïssa, Sonia1; Musavian, Leila3;|
1Energy, Materials and Telecommunications Center, Institut National de la Recherche Scientifique (INRS), Montreal, QC H5A 1K6, Canada
2Centre for Wireless Communications, University of Oulu, 90570 Oulu, Finland
3School of Computer Science and Electronic Engineering, University of Essex, Colchester, CO4 3SQ, U.K.
|Online Access:||PDF Full Text (PDF, 1.2 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe2022071451690
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2022-07-14
In this contribution, a thorough investigation of the performance of rate splitting is conducted in terms of outage and secrecy outage for the simultaneous service to a near user and far user, where the latter attempts to overhear the message of the former. The source transmits a linear combination of the users’ common stream and private streams. Once the common stream is retrieved, two decoding strategies can be adopted by each user. In the first strategy, the nodes (near or far) treat the far user’s private stream as noise to retrieve the private stream of the near user, then the far user decodes its own stream. In the second strategy, the nodes decode the far user’s private stream by treating the one of the near user as noise, then the near user retrieves its private stream while the far user decodes the stream of the near user in its attempt to overhear it. Considering the four decoding combinations, we obtain exact closed-form expressions for the outage probability, and provide tight approximations for the secrecy outage probability. Comparative results are also provided. In particular, it is shown that to achieve better outage probability, with no concern about secrecy, once the decoding of the common stream is completed, each user should first retrieve the private stream with lower target data rate by treating the other private stream as noise. To improve the secrecy outage probability, once the common stream is decoded, the near user must first decode the far user’s private stream, and the far user should first retrieve the private stream with lower target data rate.
IEEE open journal of the Communications Society
|Pages:||921 - 935|
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
This work was supported in part by the Discovery Grant from the Natural Sciences and Engineering Research Council of Canada (NSERC) and in part by the European Union Horizon 2020 RISE-2018 Scheme (H2020-MSCA-RISE-2018) under the Marie Sklodowska-Curie under Grant 823903 (RECENT).
© The Author(s) 2022. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0.