Securing NOMA Networks by Exploiting Intelligent Reflecting Surface

نویسندگان

چکیده

This paper investigates the security enhancement of an intelligent reflecting surface (IRS) assisted non-orthogonal multiple access (NOMA) network, where a base station (BS) serves users securely with assistance distributed IRSs. Considering that eavesdropper’s instantaneous channel state information (CSI) is challenging to acquire in practice, we utilize secrecy outage probability (SOP) as metric. A problem maximizing minimum rate among users, by jointly optimizing transmit beamforming at BS and phase shifts IRSs, formulated. For special case single-antenna BS, derive closed-form SOP expressions propose novel ring-penalty based successive convex approximation (SCA) algorithm design power jointly. general multi-antenna case, develop Bernstein-type inequality alternating optimization (AO) solve problem. Numerical results demonstrate advantages proposed algorithms over baseline schemes. The also show that: 1) maximum achieved when IRSs share elements equally; 2) IRS deployment does not always outperform centralized deployment, due tradeoff between number equipped each IRS.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of cooperative SWIPT System: Intelligent Reflecting Surface versus Decode-and-Forward

In this paper, we explore the impacts of utilizing intelligent reflecting surfaces (IRS) in a power-splitting based simultaneous wireless information and power transfer (PS-SWIPT) system and compare its performance with the traditional decode and forward relaying system. To analyze a more practical system, it is also assumed that the receiving nodes are subject to decoding cost, and they are on...

متن کامل

Securing Atm Networks Securing Atm Networks

This is an interim report on the investigations into securing Asynchronous Transfer Mode (ATM) networks. We look at the challenge in providing such a secure ATM network and identify the important issues in achieving such goal. In this paper, we discuss the issues and problems involved and outline some techniques to solving these problems. The network environment is rst examined and we also cons...

متن کامل

Securing On-Body IoT Devices By Exploiting Creeping Wave Propagation

On-body devices are an intrinsic part of the Internet-of-Things (IoT) vision to provide human-centric services. These on-body IoT devices are largely embedded devices that lack a sophisticated user interface to facilitate traditional PreShared Key based security protocols. Motivated by this realworld security vulnerability, this paper proposes SecureTag, a system designed to add defense in dept...

متن کامل

Exploiting Multiple Access in Clustered Millimeter Wave Networks: NOMA or OMA?

In this paper, we introduce a clustered millimeter wave network with non-orthogonal multiple access (NOMA), where the base station (BS) is located at the center of each cluster and all users follow a Poisson Cluster Process. To provide a realistic directional beamforming, an actual antenna pattern is deployed at all BSs. We provide a nearest-random scheme, in which near user is the closest node...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Communications

سال: 2022

ISSN: ['1558-0857', '0090-6778']

DOI: https://doi.org/10.1109/tcomm.2021.3126636