scholarly journals Meta Distribution and Secrecy of Partial Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

Author(s):  
konpal Ali ◽  
Arafat Al-Dweik

<div>This work studies the meta distribution in a partial-NOMA network to obtain fine-grained information about the network performance. As the meta distribution is approximated using the beta distribution via moment matching of the first two moments, reduced integral expressions are derived for the first two moments of the meta distribution. Accurate approximate moments are also proposed to further simplify the calculation. Security is an issue in partial-NOMA because the strong user may decode the weak user’s message in the process of decoding its own message using flexible successive interference cancellation (FSIC). Therefore, a measure of secrecy is defined in this context and the secrecy probability is derived for the case of: 1) a malicious strong user that prioritizes eavesdropping, 2) an innocent strong user that decodes the weak user’s message only when it is required to do so. The obtained results highlight the superiority of partial-NOMA over traditional NOMA in terms of secrecy. They also show that receive filtering and FSIC have a significant positive impact on the secrecy of partial- OMA. Furthermore, partial-NOMA with a small overlap of the resource-block can secure the network from the additional deterioration a malicious eavesdropper may cause.</div>

2021 ◽  
Author(s):  
konpal Ali ◽  
Arafat Al-Dweik

<div>This work studies the meta distribution in a partial-NOMA network to obtain fine-grained information about the network performance. As the meta distribution is approximated using the beta distribution via moment matching of the first two moments, reduced integral expressions are derived for the first two moments of the meta distribution. Accurate approximate moments are also proposed to further simplify the calculation. Security is an issue in partial-NOMA because the strong user may decode the weak user’s message in the process of decoding its own message using flexible successive interference cancellation (FSIC). Therefore, a measure of secrecy is defined in this context and the secrecy probability is derived for the case of: 1) a malicious strong user that prioritizes eavesdropping, 2) an innocent strong user that decodes the weak user’s message only when it is required to do so. The obtained results highlight the superiority of partial-NOMA over traditional NOMA in terms of secrecy. They also show that receive filtering and FSIC have a significant positive impact on the secrecy of partial- OMA. Furthermore, partial-NOMA with a small overlap of the resource-block can secure the network from the additional deterioration a malicious eavesdropper may cause.</div>


Electronics ◽  
2019 ◽  
Vol 8 (11) ◽  
pp. 1355 ◽  
Author(s):  
Asim Anwar ◽  
Boon-Chong Seet ◽  
Muhammad Amish Hasan ◽  
Xue Jun Li

The fifth generation (5G) wireless systems are anticipated to meet unprecedented capacity and latency requirements. In order to resolve these challenges in 5G, non-orthogonal multiple access (NOMA) is considered as a promising technique due to its ability to enhance spectrum efficiency and user access. As opposed to conventional orthogonal multiple access (OMA) which relies on orthogonal resource sharing, NOMA has a potential of supporting a higher number of users by multiplexing different users in the same resource in a non-orthogonal manner. With advanced receiver techniques, such as successive interference cancellation (SIC), the intra-user interference can be minimized at the NOMA receiver. To date, there are comprehensive surveys on NOMA, which describe the integration of NOMA with different communication technologies and discuss different NOMA classifications. However, the existing literature is scarce in reviewing state-of-the-art applications of NOMA from the perspective of its application to cellular networks (CNs), device-to-device (D2D) communications, and wireless sensor networks (WSNs). Therefore, the purpose of this survey is to fill this gap in knowledge. Specifically, NOMA with its underlying concepts are elaborated in detail. In addition, detailed system model of different NOMA-based wireless networks is presented. Furthermore, irrespective of the underlying spatial topology of the considered NOMA-based wireless network, general analytical expressions are presented to characterize the network performance. Finally, some challenges related to NOMA design are highlighted and potential research directions are pointed out to address these issues.


2021 ◽  
Vol 11 (5) ◽  
pp. 2203
Author(s):  
Duckdong Hwang ◽  
Janghoon Yang ◽  
Sung Sik Nam ◽  
Hyoung-Kyu Song

We investigate the beamforming for the multi antenna cooperative non-orthogonal multiple access (NOMA) system, where an access point (AP) delivers messages for multiple user terminals (UT) with successive interference cancellation (SIC) reception method. Some UTs with multiple antennas cooperate with the AP transmission to improve the diversity and the average power performance. We formally present two optimal beamforming schemes at the AP and at the cooperative UTs. One scheme has no power limitation for the cooperative UTs, while the other one does have such limitation. We guarantee that the rank one beamformer is sufficient to achieve the optimal points so that the proposed schemes have rank one semi-definite programming (SDP) structure. Simulation results show the performance gain of the multi-antenna cooperative NOMA schemes in the sense of diversity and the average power.


Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 116
Author(s):  
Wissal Ben Ameur ◽  
Philippe Mary ◽  
Jean-François Hélard ◽  
Marion Dumay ◽  
Jean Schwoerer

Non-orthogonal multiple access schemes with grant free access have been recently highlighted as a prominent solution to meet the stringent requirements of massive machine-type communications (mMTCs). In particular, the multi-user shared access (MUSA) scheme has shown great potential to grant free access to the available resources. For the sake of simplicity, MUSA is generally conducted with the successive interference cancellation (SIC) receiver, which offers a low decoding complexity. However, this family of receivers requires sufficiently diversified received user powers in order to ensure the best performance and avoid the error propagation phenomenon. The power allocation has been considered as a complicated issue especially for a decentralized decision with a minimum signaling overhead. In this paper, we propose a novel algorithm for an autonomous power decision with a minimal overhead based on a tight approximation of the bit error probability (BEP) while considering the error propagation phenomenon. We investigate the efficiency of multi-armed bandit (MAB) approaches for this problem in two different reward scenarios: (i) in Scenario 1, each user reward only informs about whether its own packet was successfully transmitted or not; (ii) in Scenario 2, each user reward may carry information about the other interfering user packets. The performances of the proposed algorithm and the MAB techniques are compared in terms of the successful transmission rate. The simulation results prove that the MAB algorithms show a better performance in the second scenario compared to the first one. However, in both scenarios, the proposed algorithm outperforms the MAB techniques with a lower complexity at user equipment.


2020 ◽  
Vol 13 (1) ◽  
pp. 1-30
Author(s):  
Ahson Azmat

AbstractLeading accounts of tort law split cleanly into two seams. Some trace its foundations to a deontic form of morality; others to an instrumental, policy-oriented system of efficient loss allocation. An increasingly prominent alternative to both seams, Civil Recourse Theory (CRT) resists this binary by arguing that tort comprises a basic legal category, and that its directives constitute reasons for action with robust normative force. Using the familiar question whether tort’s directives are guidance rules or liability rules as a lens, or prism, this essay shows how considerations of practical reasoning undermine one of CRT’s core commitments. If tort directives exert robust normative force, we must account for its grounds—for where it comes from, and why it obtains. CRT tries to do so by co-opting H.L.A. Hart’s notion of the internal point of view, but this leveraging strategy cannot succeed: while the internal point of view sees legal directives as guides to action, tort law merely demands conformity. To be guided by a directive is to comply with it, not conform to it, so tort’s structure blocks the shortcut to normativity CRT attempts to navigate. Given the fine-grained distinctions the theory makes, and with the connection between its claims and tort’s requirements thus severed, CRT faces a dilemma: it’s either unresponsive to tort’s normative grounds, or it’s inattentive to tort’s extensional structure.


2021 ◽  
Author(s):  
Navideh Ghafouri Jeshvaghani ◽  
Naser Movahhedinia ◽  
Mohammad Reza Khayyambashi

Abstract Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for resource allocation improvement in the 5th generation of cellular networks. Compared to orthogonal multiple access techniques (OMA), NOMA offers extra benefits, including greater spectrum efficiency which is provided through multiplexing users in the transmission power domain while using the same spectrum resources non-orthogonally. Even though NOMA uses Successive Interference Cancellation (SIC) to repeal the interference among users, user grouping has shown to have a substantial impact on its performance. This prformance improvement can appear in different parameters such as system capacity, rate, or the power consumption. In this paper, we propose a novel user grouping scheme for sum-rate maximization which increases the sum-rate up to 25 percent in comparison with two authenticated recent works. In addition to being matrix-based and having a polynomial time complexity, the proposed method is also able to cope with users experiencing different channel gains and powers in different sub-bands.


Sign in / Sign up

Export Citation Format

Share Document