Hyppää sisältöön
    • Suomeksi
    • In English
Trepo
  • Suomeksi
  • In English
  • Kirjaudu
Näytä viite 
  •   Etusivu
  • Trepo
  • TUNICRIS-julkaisut
  • Näytä viite
  •   Etusivu
  • Trepo
  • TUNICRIS-julkaisut
  • Näytä viite
JavaScript is disabled for your browser. Some features of this site may not work without it.

Residual Hardware Impairments on Secure NOMA-Based Relay Systems

Li, Meiling; Selim, Bassant; Muhaidat, Sami; Sofotasios, Paschalis C.; Yoo, Paul D.; Liang, Jie; Wang, Anhong (2019-11)

 
Avaa tiedosto
Residual_Hardware_Impairments_on_Secure_2019.pdf (161.6Kt)
Lataukset: 



Li, Meiling
Selim, Bassant
Muhaidat, Sami
Sofotasios, Paschalis C.
Yoo, Paul D.
Liang, Jie
Wang, Anhong
11 / 2019

This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
doi:10.1109/WPMC48795.2019.9096142
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:tuni-202012028406

Kuvaus

Peer reviewed
Tiivistelmä
<p>Non-orthogonal multiple access (NOMA) has been proposed as a promising technology that is capable of improving the spectral efficiency of fifth-generation wireless networks and beyond. However, in practical communication scenarios, transceiver architectures inevitably suffer from radio frequency (RF) front-end related impairments that cause non-negligible performance degradation. This issue can be addressed by analog and digital signal processing algorithms, but factors such as time-varying hardware characteristics and imperfect compensation schemes result to detrimental residual distortions. In the present contribution we investigate the physical layer security of NOMA-based amplify-and-forward relay systems under such realistically incurred residual hardware impairment (RHI) effects. Exact and asymptotic analytic expressions for the corresponding outage probability (OP) and intercept probability (IP) of the considered set up over multipath fading channels are derived and corroborated by respective simulation results. Based on this, it is shown that RHI affects both the legitimate users and eavesdroppers by increasing the OP and decreasing the IP. For a fixed OP, RHI generally increases the corresponding IP, thereby reducing the secure performance of the system. Further interesting insights are also provided, verifying the importance of the offered results for the effective design and deployment of secure cooperative communication systems.</p>
Kokoelmat
  • TUNICRIS-julkaisut [20127]
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste
 

 

Selaa kokoelmaa

TekijätNimekkeetTiedekunta (2019 -)Tiedekunta (- 2018)Tutkinto-ohjelmat ja opintosuunnatAvainsanatJulkaisuajatKokoelmat

Omat tiedot

Kirjaudu sisäänRekisteröidy
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste