The Library
Effects of residual hardware impairments on secure NOMA-based cooperative systems
Tools
Li, Meiling, Selim, Bassant, Muhaidat, Sami, Sofotasios, Paschalis C., Dianati, Mehrdad, Yoo, Paul D., Liang, Jie and Wang, Anhong (2020) Effects of residual hardware impairments on secure NOMA-based cooperative systems. IEEE Access, 8 . pp. 2524-2536. doi:10.1109/ACCESS.2019.2951940 ISSN 2169-3536.
|
PDF
WRAP-Effects-residual-hardware-impairments-secure-NOMA-cooperative-Dianati-2019.pdf - Unspecified Version - Requires a PDF viewer. Download (1055Kb) | Preview |
Official URL: http://dx.doi.org/10.1109/ACCESS.2019.2951940
Abstract
Non-orthogonal multiple access (NOMA) has been proposed as a promising technology that is capable of improving the spectral efficiency of fifth-generation wireless networks and beyond. However, in practical communication scenarios, transceiver architectures inevitably suffer from radio frequency (RF) front-end related impairments that cause non-negligible performance degradation. This issue can be addressed by analog and digital signal processing algorithms, however, inevitable aspects of this approach such as time-varying hardware characteristics and imperfect compensation schemes result to detrimental residual distortions. In the present contribution we investigate the physical layer security of NOMA-based amplify-and-forward relay systems under such realistically incurred residual hardware impairment (RHI) effects. Exact and asymptotic analytic expressions for the corresponding outage probability (OP) and intercept probability (IP) of the considered setup over multipath fading channels are derived and corroborated by respective simulation results. Based on this, it is shown that RHI affects both the legitimate users and eavesdroppers by increasing the OP and decreasing the IP. For a fixed OP, RHI generally increases the corresponding IP, thereby reducing the secure performance of the system. Further interesting insights are provided, verifying the importance of the offered results for the effective design and deployment of secure cooperative communication systems.
Item Type: | Journal Article | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering | ||||||||||||||||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||||||||||||||||||||||
Library of Congress Subject Headings (LCSH): | Wireless communication systems, Signal detection , Multiple access protocols (Computer network protocols) | ||||||||||||||||||||||||
Journal or Publication Title: | IEEE Access | ||||||||||||||||||||||||
Publisher: | IEEE | ||||||||||||||||||||||||
ISSN: | 2169-3536 | ||||||||||||||||||||||||
Official Date: | January 2020 | ||||||||||||||||||||||||
Dates: |
|
||||||||||||||||||||||||
Volume: | 8 | ||||||||||||||||||||||||
Page Range: | pp. 2524-2536 | ||||||||||||||||||||||||
DOI: | 10.1109/ACCESS.2019.2951940 | ||||||||||||||||||||||||
Status: | Peer Reviewed | ||||||||||||||||||||||||
Publication Status: | Published | ||||||||||||||||||||||||
Access rights to Published version: | Open Access (Creative Commons) | ||||||||||||||||||||||||
RIOXX Funder/Project Grant: |
|
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |