Application Array Antenna To Improve Physical Layer Security In Noma Network
Corressponding author's email:
hatn@hcmute.edu.vnDOI:
https://doi.org/10.54644/jte.2024.1448Keywords:
NOMA, Array antennas, Physical layer security, Outage probability, BeamformingAbstract
In this study, we propose a NOMA communication model combined with linear array antennas for the purpose of enhancing physical layer security. We introduce a model of 4 nodes: transmitter node S, receiver node D1, receiver node D2, eavesdropping node E. In which node S is equipped with an antenna array that can perform beamforming, 2 nodes D1 and D2 are 2 nodes that receive data x1, x2 is transmitted from Node S, Node E is an eavesdropping nodev will try to receive signals from S sent to x1, x2. To evaluate the ability to improve physical layer security, the study was based on the physical layer security outage probability parameter. Through the study, it has been concluded that, if the antenna array is combined, it will improve the physical layer security problem in NOMA technology quite well, the article concludes that depending on the location of Node E, the security bile is good or bad.
Downloads: 0
References
T. N. Ha, N. V. Phuc, D. P. H. Trang, and T. T. Q. Nhu, "Enhancing physical layer security of NOMA wireless networks by array antenna," Journal of Science and Technology, ISSN: 1859‐1531, vol.19, no.11, 2021.
J. G. Andrews et al., "What Will 5G Be?," IEEE Journal on Selected Areas in Communications, vol. 32, no. 6, pp. 1065-1082, Jun. 2014. DOI: https://doi.org/10.1109/JSAC.2014.2328098
D. Wang, B. Bai, W. Zhao, and Z. Han, “A survey of optimization approaches for wireless physical layer security,” IEEE Communications Surveys Tutorials, vol. 21, no. 2, pp. 1878–1911, 2019. DOI: https://doi.org/10.1109/COMST.2018.2883144
P. K. Hota, S. Thapar, D. Mishra, R. Saini, and A. Dubey, “Ergodic performance of downlink untrusted NOMA system with imperfect SIC,” IEEE Communications Letters, vol. 26, no. 1, pp. 23–26, 2022. DOI: https://doi.org/10.1109/LCOMM.2021.3126746
X. W. Li, Z. Xie, Z. Chu, V. G. Menon, S. Mumtaz, and J. H. Zhang, “Exploiting benefits of IRS in wireless powered NOMA networks,” IEEE Transactions on Green Communications and Networking, vol. 6, no. 1, 2022 DOI: https://doi.org/10.1109/TGCN.2022.3144744
A. Akash, R. Chaurasiya, S. Rai, and A. K. Jagannatham, “Outage probability analysis for NOMA downlink and uplink communication systems with generalized fading channels,” IEEE Access, vol. 8, pp. 220461–220482, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3042993
Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, "Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks," IEEE Transactions on Wireless Communications, vol. 16, no. 3, pp. 1656-1672, 2017. DOI: https://doi.org/10.1109/TWC.2017.2650987
Z. Tang, T. Hou, Y. Liu, J. Zhang, and L. Hanzo, "Physical Layer Security of Intelligent Reflective Surface Aided NOMA Networks," IEEE Transactions on Vehicular Technology, vol. 71, no. 7, pp. 7821-7834, 2022, doi: 10.1109/TVT.2022.3168392. DOI: https://doi.org/10.1109/TVT.2022.3168392
Ayaz, Z. Sheng, I. W. H. Ho, D. Tiany, and Z. Ding, "Blockchain-enabled FD-NOMA based Vehicular Network with Physical Layer Security," in IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 2022, pp. 1-6, doi: 10.1109/VTC2022-Spring54318.2022.9860421. DOI: https://doi.org/10.1109/VTC2022-Spring54318.2022.9860421
A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in mimo wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, pp. 351–361, Jan. 2011. DOI: https://doi.org/10.1109/TSP.2010.2078810
Z. Sheng, H. D. Tuan, T. Q. Duong, and H. V. Poor, "Beamforming Optimization for Physical Layer Security in MISO Wireless Networks," IEEE Transactions on Signal Processing, vol. 66, no. 14, pp. 3710-3723, 2018. DOI: https://doi.org/10.1109/TSP.2018.2835406
J. Chen, L. Yang, and M. S. Alouini, "Physical Layer Security for Cooperative NOMA Systems," IEEE Transactions on Vehicular Technology, vol. 67, no. 5, pp. 4645-4649, 2018, doi: 10.1109/TVT.2017.2789223. DOI: https://doi.org/10.1109/TVT.2017.2789223
C. A. Balanis, Antenna theory analysis and design, third edition, Published by John Wiley & Sons, Inc, 2005.
B. C. Jung, S. W. Jeon, and S. H. Lee, “Successive Interference Cancellation With Feedback for Random Access Networks,” IEEE Communications Letters., vol. 21, no. 4, pp. 825 - 828, 2017. DOI: https://doi.org/10.1109/LCOMM.2016.2642183
N. Jaiswal, A. Pandey, S. Yadav, N. Purohit, and D. S. Gurjar, "Physical Layer Security Performance of NOMA-Aided Vehicular Communications Over Nakagami-m Time-Selective Fading Channels With Channel Estimation Errors," IEEE Open Journal of Vehicular Technology, vol. 4, pp. 72-100, 2023, doi: 10.1109/OJVT.2022.3222187. DOI: https://doi.org/10.1109/OJVT.2022.3222187
A. Hyadi, Z. Rezki, and M. Alouini, "An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty," IEEE Access, vol. 4, pp. 6121-6132, 2016. DOI: https://doi.org/10.1109/ACCESS.2016.2612585
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2024 Journal of Technical Education Science

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright © JTE.


