A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case

In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel conditi...

Full description

Saved in:
Bibliographic Details
Main Authors: Alsaba, Yamen, Chee, Yen Leow, Abdul Rahim, Sharul Kamal
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2018
Subjects:
Online Access:http://eprints.utm.my/id/eprint/84554/1/YamenAlsaba2018_AZeroSumGameApproachforNonOrthogonalMultiple.pdf
http://eprints.utm.my/id/eprint/84554/
http://dx.doi.org/10.1109/ACCESS.2018.2874215
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.84554
record_format eprints
spelling my.utm.845542020-02-27T03:05:09Z http://eprints.utm.my/id/eprint/84554/ A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case Alsaba, Yamen Chee, Yen Leow Abdul Rahim, Sharul Kamal TK Electrical engineering. Electronics Nuclear engineering In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel condition (strong user) is a potential eavesdropper. The weak user data can be intercepted by the strong user since the strong user needs to decode the weak user's message for successive interference cancellation operation in NOMA. To impair strong user's eavesdropping capability, weak user's information-bearing signal is merged with an artificial signal (AS). Thus, the eavesdropping process requires extra decoding step at higher power level. The secrecy outage probability of the weak user is derived and provided in closed-form expression. The weak user faces a choice between transmitting the information-bearing signal with the total power and the deploying the AS technique, whereas the strong user can choose whether to eavesdrop the weak user's message or not. To investigate users' power-secrecy tradeoffs, their interactions are modeled as a non-cooperative zero-sum game. The existence of Nash equilibria (NEs) of the proposed game is first analyzed, and pure and mixed-strategy NE profiles are provided. In addition, numerical simulations are conducted to validate the analytical results and to prove that AS-Aided proposed scheme enhances the secrecy performance of NOMA systems while maintaining the NOMA superiority over OMA systems. Institute of Electrical and Electronics Engineers Inc. 2018 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/84554/1/YamenAlsaba2018_AZeroSumGameApproachforNonOrthogonalMultiple.pdf Alsaba, Yamen and Chee, Yen Leow and Abdul Rahim, Sharul Kamal (2018) A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case. IEEE Access, 6 (848529). pp. 58764-58773. ISSN 2169-3536 http://dx.doi.org/10.1109/ACCESS.2018.2874215 DOI:10.1109/ACCESS.2018.2874215
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Alsaba, Yamen
Chee, Yen Leow
Abdul Rahim, Sharul Kamal
A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case
description In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel condition (strong user) is a potential eavesdropper. The weak user data can be intercepted by the strong user since the strong user needs to decode the weak user's message for successive interference cancellation operation in NOMA. To impair strong user's eavesdropping capability, weak user's information-bearing signal is merged with an artificial signal (AS). Thus, the eavesdropping process requires extra decoding step at higher power level. The secrecy outage probability of the weak user is derived and provided in closed-form expression. The weak user faces a choice between transmitting the information-bearing signal with the total power and the deploying the AS technique, whereas the strong user can choose whether to eavesdrop the weak user's message or not. To investigate users' power-secrecy tradeoffs, their interactions are modeled as a non-cooperative zero-sum game. The existence of Nash equilibria (NEs) of the proposed game is first analyzed, and pure and mixed-strategy NE profiles are provided. In addition, numerical simulations are conducted to validate the analytical results and to prove that AS-Aided proposed scheme enhances the secrecy performance of NOMA systems while maintaining the NOMA superiority over OMA systems.
format Article
author Alsaba, Yamen
Chee, Yen Leow
Abdul Rahim, Sharul Kamal
author_facet Alsaba, Yamen
Chee, Yen Leow
Abdul Rahim, Sharul Kamal
author_sort Alsaba, Yamen
title A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case
title_short A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case
title_full A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case
title_fullStr A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case
title_full_unstemmed A zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case
title_sort zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2018
url http://eprints.utm.my/id/eprint/84554/1/YamenAlsaba2018_AZeroSumGameApproachforNonOrthogonalMultiple.pdf
http://eprints.utm.my/id/eprint/84554/
http://dx.doi.org/10.1109/ACCESS.2018.2874215
_version_ 1662754274117943296
score 13.160551