Loading...
Search for:
secrecy-outage-probability
0.006 seconds
Secrecy performance of friendly jammer assisted cooperative NOMA systems with internal eavesdroppers
, Article 31st IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2020, 31 August 2020 through 3 September 2020 ; Volume 2020-August , 2020 ; Aissa, S ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
In non-orthogonal multiple access (NOMA) systems, serving multiple users in shared resource blocks can allow untrusted users to overhear the messages of other users. In this context, we study a network consisting of a base station (BS), a near user and a far user, where the latter attempts to overhear the message of the former. The near user is a full-duplex (FD) node that can also act as a relay. Two operating scenarios are considered: 1) friendly jammer (FJ), where the FD node broadcasts noise for degrading the channel between the BS and the far user, while receiving data from the BS; and 2) friendly jammer relay (FJR), where, in addition to degrading the channel between the BS and the far...
Physical Layer Security in Wireless Communication Networks in Presence of Intelligent Reflecting Surfaces
, M.Sc. Thesis Sharif University of Technology ; Nasiri Kenari, Masoumeh (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
Abstract
The ever-increasing demand for wireless communication has raised the need for better utilization of bandwidth and energy. Intelligent Reflecting Surface (IRS) is an emerging technology that has been proposed for the sixth generation of wireless communication. In this thesis, we study the essential role these surfaces can play in improving the physical layer security.First, we consider a relatively realistic scenario for the location of the eavesdroppers. In this scenario, we will assume that the transmitters, users, and eavesdroppers all use a single antenna configuration, and the eavesdroppers are placed randomly across the studied region. Two notable parameters in physical layer security,...
Outage performance in secure cooperative NOMA
, Article 2019 Iran Workshop on Communication and Information Theory, IWCIT 2019, 24 April 2019 through 25 April 2019 ; 2019 ; 9781728105840 (ISBN) ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
Enabling cooperation in a NOMA system is a promising approach to improve its performance. In this paper, we study the cooperation in a secure NOMA system, where the legitimate users are distributed uniformly in the network and the eavesdroppers are distributed according to a homogeneous Poisson point process. We consider a cooperative NOMA scheme (two users are paired as strong and weak users) in two phases: 1) Direct transmission phase, in which the base station broadcasts a superposition of the messages, 2) Cooperation phase, in which the strong user acts as a relay to help in forwarding the messages of the weak user. We study the secrecy outage performance in two cases: (i) security of...
Massive MIMO-NOMA systems secrecy in the presence of active eavesdroppers
, Article 30th International Conference on Computer Communications and Networks, ICCCN 2021, 19 July 2021 through 22 July 2021 ; Volume 2021-July , 2021 ; 10952055 (ISSN); 9780738113302 (ISBN) ; Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
Non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (MIMO) systems are highly efficient. Massive MIMO systems are inherently resistant to passive attackers (eavesdroppers), thanks to transmissions directed to the desired users. However, active attackers can transmit a combination of legitimate user pilot signals during the channel estimation phase. This way they can mislead the base station (BS) to rotate the transmission in their direction, and allow them to eavesdrop during the downlink data transmission phase. In this paper, we analyse this vulnerability in an improved system model and stronger adversary assumptions, and investigate how physical layer security...