Loading...

Secure Transmission in Cooperative Non-Orthogonal Multiple Access (NOMA) Systems

Abolpour, Milad | 2019

893 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 52234 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza; Mirmohseni, Mahtab
  7. Abstract:
  8. Nowadays, number of the users in wireless networks are increasing due to the high speed data transmission. Increasing number of the users increases the required bandwidth and power resource. Using non-orthogonal multiple access (NOMA) is a promising approach to decrease the significant bandwidth and also the required power of the network. NOMA systems decrease the latency of the users and also improve the spectral efficiency by serving multiple users. As signals are transmitting in wireless networks, the internal and also external eavesdroppers have access to the message of the legitimate users in the networks. Therefore, some sort of secrecy of the messages of the users must be provided. Using physical layer capabilities is a promising way to maintain the secrecy of the users. In some scenarios, weak users act as the internal eavesdroppers and try to overhear the messages of the strong users. In this thesis, we investigate the secrecy of the NOMA systems in presence of the internal and external eavesdroppers. According to the high flexibilities of NOMA systems, using D2D transmission of 5G networks in order to enable the cooperation improves the performance of the systems.But using cooperation provides more opportunity to the eavesdroppers to overhear the messages of the users. In this thesis, we investigate the secrecy performance of cooperative NOMA systems in existence of external eavesdroppers and try to improve the secrecy of the messages of the users by adopting some approaches such as using friendly jammer relays
  9. Keywords:
  10. Secure Transaction Protocol ; Non-Orthogonal Multiple Access ; Friendly Jammer ; Internal Eavesdropper ; External Wiretapper ; Physical Layer Security ; Fifth Generation of Mobile Networks

 Digital Object List

 Bookmark

...see more