A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case
In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel conditi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2018
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/84554/1/YamenAlsaba2018_AZeroSumGameApproachforNonOrthogonalMultiple.pdf http://eprints.utm.my/id/eprint/84554/ http://dx.doi.org/10.1109/ACCESS.2018.2874215 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
id |
my.utm.84554 |
---|---|
record_format |
eprints |
spelling |
my.utm.845542020-02-27T03:05:09Z http://eprints.utm.my/id/eprint/84554/ A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case Alsaba, Yamen Chee, Yen Leow Abdul Rahim, Sharul Kamal TK Electrical engineering. Electronics Nuclear engineering In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel condition (strong user) is a potential eavesdropper. The weak user data can be intercepted by the strong user since the strong user needs to decode the weak user's message for successive interference cancellation operation in NOMA. To impair strong user's eavesdropping capability, weak user's information-bearing signal is merged with an artificial signal (AS). Thus, the eavesdropping process requires extra decoding step at higher power level. The secrecy outage probability of the weak user is derived and provided in closed-form expression. The weak user faces a choice between transmitting the information-bearing signal with the total power and the deploying the AS technique, whereas the strong user can choose whether to eavesdrop the weak user's message or not. To investigate users' power-secrecy tradeoffs, their interactions are modeled as a non-cooperative zero-sum game. The existence of Nash equilibria (NEs) of the proposed game is first analyzed, and pure and mixed-strategy NE profiles are provided. In addition, numerical simulations are conducted to validate the analytical results and to prove that AS-Aided proposed scheme enhances the secrecy performance of NOMA systems while maintaining the NOMA superiority over OMA systems. Institute of Electrical and Electronics Engineers Inc. 2018 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/84554/1/YamenAlsaba2018_AZeroSumGameApproachforNonOrthogonalMultiple.pdf Alsaba, Yamen and Chee, Yen Leow and Abdul Rahim, Sharul Kamal (2018) A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case. IEEE Access, 6 (848529). pp. 58764-58773. ISSN 2169-3536 http://dx.doi.org/10.1109/ACCESS.2018.2874215 DOI:10.1109/ACCESS.2018.2874215 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering. Electronics Nuclear engineering Alsaba, Yamen Chee, Yen Leow Abdul Rahim, Sharul Kamal A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case |
description |
In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel condition (strong user) is a potential eavesdropper. The weak user data can be intercepted by the strong user since the strong user needs to decode the weak user's message for successive interference cancellation operation in NOMA. To impair strong user's eavesdropping capability, weak user's information-bearing signal is merged with an artificial signal (AS). Thus, the eavesdropping process requires extra decoding step at higher power level. The secrecy outage probability of the weak user is derived and provided in closed-form expression. The weak user faces a choice between transmitting the information-bearing signal with the total power and the deploying the AS technique, whereas the strong user can choose whether to eavesdrop the weak user's message or not. To investigate users' power-secrecy tradeoffs, their interactions are modeled as a non-cooperative zero-sum game. The existence of Nash equilibria (NEs) of the proposed game is first analyzed, and pure and mixed-strategy NE profiles are provided. In addition, numerical simulations are conducted to validate the analytical results and to prove that AS-Aided proposed scheme enhances the secrecy performance of NOMA systems while maintaining the NOMA superiority over OMA systems. |
format |
Article |
author |
Alsaba, Yamen Chee, Yen Leow Abdul Rahim, Sharul Kamal |
author_facet |
Alsaba, Yamen Chee, Yen Leow Abdul Rahim, Sharul Kamal |
author_sort |
Alsaba, Yamen |
title |
A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case |
title_short |
A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case |
title_full |
A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case |
title_fullStr |
A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case |
title_full_unstemmed |
A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case |
title_sort |
zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
publishDate |
2018 |
url |
http://eprints.utm.my/id/eprint/84554/1/YamenAlsaba2018_AZeroSumGameApproachforNonOrthogonalMultiple.pdf http://eprints.utm.my/id/eprint/84554/ http://dx.doi.org/10.1109/ACCESS.2018.2874215 |
_version_ |
1662754274117943296 |