TY - JOUR
T1 - An HARQ Assisted Cognitive NOMA Scheme for Secure Transmission with Imperfect SIC
AU - Xiang, Zhongwu
AU - Yang, Weiwei
AU - Pan, Gaofeng
AU - Cai, Yueming
AU - Ding, Zhiguo
AU - Zou, Yulong
N1 - Publisher Copyright:
© 1972-2012 IEEE.
PY - 2021/3
Y1 - 2021/3
N2 - This paper employs hybrid automatic repeat request (HARQ) to assist the cognitive non-orthogonal multiple access (NOMA) scheme for secure transmission in Internet of Things networks where the security-required (SR) users with high-security requirements and quality of services (QoS)-sensitive (QS) users with real-Time process requirements are paired to perform NOMA for increasing the network connectivity. In addition, the imperfect successive interference cancellation (SIC) is considered at both legitimate users and eavesdropper for providing a realistic analysis. The closed-form expressions for the connection outage probability (COP), the secrecy transmission probability (RSP), and effective secrecy throughput (EST) of the SR user are derived in the proposed lightweight but efficient randomized retransmission scheme (RRS). As benchmarks, the secrecy performances of the fixed retransmission scheme (FRS) and orthogonal multiple access (OMA) scheme are also investigated. Besides, the asymptotic secrecy analysis is given to gain a better insight into secrecy performance. The analytical results developed in the paper demonstrate that HARQ is beneficial to secrecy transmission and the RRS outperforms or equals to the FRS and OMA scheme when the transmit power and secrecy coding redundancy is sufficiently high.
AB - This paper employs hybrid automatic repeat request (HARQ) to assist the cognitive non-orthogonal multiple access (NOMA) scheme for secure transmission in Internet of Things networks where the security-required (SR) users with high-security requirements and quality of services (QoS)-sensitive (QS) users with real-Time process requirements are paired to perform NOMA for increasing the network connectivity. In addition, the imperfect successive interference cancellation (SIC) is considered at both legitimate users and eavesdropper for providing a realistic analysis. The closed-form expressions for the connection outage probability (COP), the secrecy transmission probability (RSP), and effective secrecy throughput (EST) of the SR user are derived in the proposed lightweight but efficient randomized retransmission scheme (RRS). As benchmarks, the secrecy performances of the fixed retransmission scheme (FRS) and orthogonal multiple access (OMA) scheme are also investigated. Besides, the asymptotic secrecy analysis is given to gain a better insight into secrecy performance. The analytical results developed in the paper demonstrate that HARQ is beneficial to secrecy transmission and the RRS outperforms or equals to the FRS and OMA scheme when the transmit power and secrecy coding redundancy is sufficiently high.
KW - Internet of Things
KW - hybrid automatic repeat request
KW - non-orthogonal multiple access
KW - physical layer security
UR - http://www.scopus.com/inward/record.url?scp=85099580799&partnerID=8YFLogxK
U2 - 10.1109/TCOMM.2021.3050798
DO - 10.1109/TCOMM.2021.3050798
M3 - Article
AN - SCOPUS:85099580799
SN - 1558-0857
VL - 69
SP - 1930
EP - 1946
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 3
M1 - 9319699
ER -