Zhongwu Xiang, Weiwei Yang, Yueming Cai, Yunpeng Cheng, Heng Wu, M. Wang
{"title":"物联网网络中上行NOMA保密性能分析","authors":"Zhongwu Xiang, Weiwei Yang, Yueming Cai, Yunpeng Cheng, Heng Wu, M. Wang","doi":"10.1109/ICCCHINA.2018.8641217","DOIUrl":null,"url":null,"abstract":"This paper investigates physical layer security (PLS) of uplink non-orthogonal multiple access (NOMA) in Internet of Things (IoT) networks, where two devices transmit secret information to base station or access point simultaneously under the intercepting of an eavesdropper (Eve). The new closed-form expressions of joint connection outage probability (JCOP), joint secrecy outage probability (JSOP) and sum secrecy throughput (SST) are derived over Nakagami-m fading channels to indicate the impact of parameters, i.e., transmit power and codeword rates, on secrecy performance. Simulation results are obtained to verify our analysis and allow an easy design of transmit power and wiretap code rates which maximizes the SST.","PeriodicalId":170216,"journal":{"name":"2018 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Secrecy Performance Analysis of Uplink NOMA in IoT Networks\",\"authors\":\"Zhongwu Xiang, Weiwei Yang, Yueming Cai, Yunpeng Cheng, Heng Wu, M. Wang\",\"doi\":\"10.1109/ICCCHINA.2018.8641217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper investigates physical layer security (PLS) of uplink non-orthogonal multiple access (NOMA) in Internet of Things (IoT) networks, where two devices transmit secret information to base station or access point simultaneously under the intercepting of an eavesdropper (Eve). The new closed-form expressions of joint connection outage probability (JCOP), joint secrecy outage probability (JSOP) and sum secrecy throughput (SST) are derived over Nakagami-m fading channels to indicate the impact of parameters, i.e., transmit power and codeword rates, on secrecy performance. Simulation results are obtained to verify our analysis and allow an easy design of transmit power and wiretap code rates which maximizes the SST.\",\"PeriodicalId\":170216,\"journal\":{\"name\":\"2018 IEEE/CIC International Conference on Communications in China (ICCC)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE/CIC International Conference on Communications in China (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCHINA.2018.8641217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE/CIC International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCHINA.2018.8641217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secrecy Performance Analysis of Uplink NOMA in IoT Networks
This paper investigates physical layer security (PLS) of uplink non-orthogonal multiple access (NOMA) in Internet of Things (IoT) networks, where two devices transmit secret information to base station or access point simultaneously under the intercepting of an eavesdropper (Eve). The new closed-form expressions of joint connection outage probability (JCOP), joint secrecy outage probability (JSOP) and sum secrecy throughput (SST) are derived over Nakagami-m fading channels to indicate the impact of parameters, i.e., transmit power and codeword rates, on secrecy performance. Simulation results are obtained to verify our analysis and allow an easy design of transmit power and wiretap code rates which maximizes the SST.