An HARQ Assisted Cognitive NOMA Scheme for Secure Transmission with Imperfect SIC

Zhongwu Xiang, Weiwei Yang, Gaofeng Pan, Yueming Cai, Zhiguo Ding, Yulong Zou

Research output: Contribution to journalArticlepeer-review

11 Scopus citations

Abstract

This paper employs hybrid automatic repeat request (HARQ) to assist the cognitive non-orthogonal multiple access (NOMA) scheme for secure transmission in Internet of Things networks where the security-required (SR) users with high-security requirements and quality of services (QoS)-sensitive (QS) users with real-Time process requirements are paired to perform NOMA for increasing the network connectivity. In addition, the imperfect successive interference cancellation (SIC) is considered at both legitimate users and eavesdropper for providing a realistic analysis. The closed-form expressions for the connection outage probability (COP), the secrecy transmission probability (RSP), and effective secrecy throughput (EST) of the SR user are derived in the proposed lightweight but efficient randomized retransmission scheme (RRS). As benchmarks, the secrecy performances of the fixed retransmission scheme (FRS) and orthogonal multiple access (OMA) scheme are also investigated. Besides, the asymptotic secrecy analysis is given to gain a better insight into secrecy performance. The analytical results developed in the paper demonstrate that HARQ is beneficial to secrecy transmission and the RRS outperforms or equals to the FRS and OMA scheme when the transmit power and secrecy coding redundancy is sufficiently high.

Original languageBritish English
Article number9319699
Pages (from-to)1930-1946
Number of pages17
JournalIEEE Transactions on Communications
Volume69
Issue number3
DOIs
StatePublished - Mar 2021

Keywords

  • hybrid automatic repeat request
  • Internet of Things
  • non-orthogonal multiple access
  • physical layer security

Fingerprint

Dive into the research topics of 'An HARQ Assisted Cognitive NOMA Scheme for Secure Transmission with Imperfect SIC'. Together they form a unique fingerprint.

Cite this