University of Oulu

K. Yadav, P. K. Upadhyay, J. Lehtomäki and J. M. Moualeu, "Physical Layer Security of Overlay Cognitive NOMA Systems with Control-Jamming," 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall), London, United Kingdom, 2022, pp. 1-7, doi: 10.1109/VTC2022-Fall57202.2022.10012829

Physical layer security of overlay cognitive NOMA systems with control-jamming

Saved in:
Author: Yadav, Kajal1; Upadhyay, Prabhat K.1,2; Lehtomäki, Janne2;
Organizations: 1Department of Electrical Engineering, Indian Institute of Technology Indore, Indore 453552, Madhya Pradesh, India
2Centre for Wireless Communications (CWC), University of Oulu, 90014 Oulu, Finland
3School of Electrical and Information Engineering, University of the Witwatersrand, Johannesburg, 2000, South Africa
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 0.4 MB)
Persistent link: http://urn.fi/urn:nbn:fi-fe2023021427122
Language: English
Published: Institute of Electrical and Electronics Engineers, 2022
Publish Date: 2023-02-14
Description:

Abstract

In this paper, we investigate the physical layer security (PLS) of an overlay cognitive non-orthogonal multiple access (NOMA) system with control-jamming (CJ) under Nakagami-m fading. Herein, a cooperative decode-and-forward (DF) relaying technique is adopted at the secondary transmitter, while a maximal ratio combining (MRC) scheme is employed at the primary destination in order to improve the secrecy performance of the underlying system. Under this setup, we derive analytical expressions for the secrecy outage probability (SOP) and the strictly positive secrecy capacity (SPSC). Moreover, we obtain simple and explicit expressions of the SOP in the high signal-to-noise ratio (SNR) region to get useful insights on the system design for both the cases of without and with jamming. Finally, Monte Carlo simulations are provided to: (i) demonstrate the effectiveness and superiority of the proposed system with jamming over its non-jamming counterpart in terms of security; (ii) verify the accuracy of the proposed analytical framework.

see all

Series: IEEE Vehicular Technology Conference
ISSN: 1550-2252
ISSN-E: 2577-2465
ISSN-L: 1550-2252
ISBN: 978-1-6654-5468-1
ISBN Print: 978-1-6654-5469-8
Pages: 1 - 7
DOI: 10.1109/vtc2022-fall57202.2022.10012829
OADOI: https://oadoi.org/10.1109/vtc2022-fall57202.2022.10012829
Host publication: 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)
Conference: IEEE Vehicular Technology Conference
Type of Publication: A4 Article in conference proceedings
Field of Science: 213 Electronic, automation and communications engineering, electronics
Subjects:
Funding: This research work is carried out under the Nokia Foundation Visiting Professor Grant and Visvesvaraya PhD Scheme of Ministry of Electronics & Information Technology (MeitY), Government of India, being implemented by Digital India Corporation (formerly Media Lab Asia). The work of J. Lehtomäki is supported in part by the Academy of Finland 6Genesis Flagship under Grant 318927. The work of J. M. Moualeu is supported in part by the South Africa’s National Research Foundation (NRF) under Grant No. 116018.
Academy of Finland Grant Number: 318927
Detailed Information: 318927 (Academy of Finland Funding decision)
Copyright information: © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.