ترغب بنشر مسار تعليمي؟ اضغط هنا

Massive MIMO-NOMA Systems Secrecy in the Presence of Active Eavesdroppers

219   0   0.0 ( 0 )
 نشر من قبل Marziyeh Soltani
 تاريخ النشر 2021
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mislead the base station (BS) to rotate the transmission in their direction, and allow them to eavesdrop during the downlink data transmission phase. In this paper, we analyse this vulnerability in an improved system model and stronger adversary assumptions, and investigate how physical layer security can mitigate such attacks and ensure secure (confidential) communication. We derive the secrecy outage probability (SOP) and a lower bound on the ergodic secrecy capacity, using stochastic geometry tools when the number of antennas in the BSs tends to infinity. We adapt the result to evaluate the secrecy performance in massive orthogonal multiple access (OMA). We find that appropriate power allocation allows NOMA to outperform OMA in terms of ergodic secrecy rate and SOP.



قيم البحث

اقرأ أيضاً

In this paper, an extended large wireless network under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimat e users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effects of both fading and path loss. Under these assumptions, a power efficient cooperative scheme, named emph{stochastic virtual beamforming}, is proposed. Applying this scheme, an unbounded secure rate with any desired outage level is achieved, provided that the density of the legitimate users tends to infinity. In addition, by tending the legitimate users density to the infinity, the tolerable density of eavesdroppers will become unbounded too.
This paper considers the secrecy performance of several schemes for multi-antenna transmission to single-antenna users with full-duplex (FD) capability against randomly distributed single-antenna eavesdroppers (EDs). These schemes and related scenari os include transmit antenna selection (TAS), transmit antenna beamforming (TAB), artificial noise (AN) from the transmitter, user selection based their distances to the transmitter, and colluding and non-colluding EDs. The locations of randomly distributed EDs and users are assumed to be distributed as Poisson Point Process (PPP). We derive closed form expressions for the secrecy outage probabilities (SOP) of all these schemes and scenarios. The derived expressions are useful to reveal the impacts of various environmental parameters and users choices on the SOP, and hence useful for network design purposes. Examples of such numerical results are discussed.
We investigate the reliability and security of the ambient backscatter (AmBC) non-orthogonal multiple access (NOMA) systems, where the source aims to communication with two NOMA users in the presence of an eavesdropper. We consider a more practical c ase that nodes and backscatter device (BD) suffer from in-phase and quadrature-phase imbalance (IQI). More specifically, exact analytical expressions for the outage probability (OP) and the intercept probability (IP) are derived in closedform. Moreover, the asymptotic behaviors and corresponding diversity orders for the OP are discussed. Numerical results show that: 1) Although IQI reduces the reliability, it can enhance the security. 2) Compared with the traditional orthogonal multiple access (OMA) system, the AmBC-NOMA system can obtain better reliability when the signal-to-noise (SNR) ratio is low; 3) There are error floors for the OP because of the reflection coefficient b{eta} .
Multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) cellular network is promising for supporting massive connectivity. This paper exploits low-latency machine learning in the MIMO-NOMA uplink transmission environment, where a su bstantial amount of data must be uploaded from multiple data sources to a one-hop away edge server for machine learning. A delay-aware edge learning framework with the collaboration of data sources, the edge server, and the base station, referred to as DACEL, is proposed. Based on the delay analysis of DACEL, a NOMA channel allocation algorithm is further designed to minimize the learning delay. The simulation results show that the proposed algorithm outperforms the baseline schemes in terms of learning delay reduction.
392 - Jie Hou , Gerhard Kramer 2013
A security measure called effective security is defined that includes strong secrecy and stealth communication. Effective secrecy ensures that a message cannot be deciphered and that the presence of meaningful communication is hidden. To measure stea lth we use resolvability and relate this to binary hypothesis testing. Results are developed for wire-tap channels and broadcast channels with confidential messages.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا