-
An Optimal Joint Antenna and User Selection Algorithm for QoS-based CR-NOMA
Authors:
Omer Faruk Akyol,
Fethi Okta,
Semiha Tedik Basaran
Abstract:
Both non-orthogonal multiple access (NOMA), which can serve multiple users simultaneously and on the same frequency, and cognitive radio (CR) can contribute to eliminating the spectrum scarcity problem. In this work, an uplink CR-based NOMA (CR-NOMA) system, which is equipped with multiple users and a base station with a multi-antenna, is proposed to improve spectral efficiency. By considering the…
▽ More
Both non-orthogonal multiple access (NOMA), which can serve multiple users simultaneously and on the same frequency, and cognitive radio (CR) can contribute to eliminating the spectrum scarcity problem. In this work, an uplink CR-based NOMA (CR-NOMA) system, which is equipped with multiple users and a base station with a multi-antenna, is proposed to improve spectral efficiency. By considering the users' quality of service (QoS), the system performance of successive interference cancellation (SIC) is investigated in this system. Two different antenna and secondary user selection algorithms are proposed to improve the outage performance and retard the effect of the error floor. The multi-antenna CR-NOMA with QoS-based SIC system outperforms conventional channel state information (CSI)-based SIC. In addition, it is shown that the outage performance of this system on both proposed algorithms is better than in the case of not using the algorithm. The closed-form outage probability expression of this system for the suboptimal joint antenna and user selection algorithm is derived. Furthermore, when the proposed algorithms are not used, the closed-form expression of the outage probability for this system with a single-antenna base station is derived. Extensive simulation results verify the accuracy of theoretical analyses.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
Scalable Group Secret Key Generation over Wireless Channels
Authors:
Ufuk Altun,
Semiha T. Basaran,
Gunes K. Kurt,
Enver Ozdemir
Abstract:
In this paper, we consider the problem of secret key generation for multiple parties. Multi-user networks usually require a trusted party to efficiently distribute keys to the legitimate users and this process is a weakness against eavesdroppers. With the help of the physical layer security techniques, users can securely decide on a secret key without a trusted party by exploiting the unique prope…
▽ More
In this paper, we consider the problem of secret key generation for multiple parties. Multi-user networks usually require a trusted party to efficiently distribute keys to the legitimate users and this process is a weakness against eavesdroppers. With the help of the physical layer security techniques, users can securely decide on a secret key without a trusted party by exploiting the unique properties of the channel. In this context, we develop a physical layer group key generation scheme that is also based on the ideas of the analog function computation studies. We firstly consider the key generation as a function to be computed over the wireless channel and propose two novel methods depending on the users transmission capability (i.e. half-duplex and full-duplex transmissions). Secondly, we exploit the uniqueness of the prime integers in order to enable the simultaneous transmission of the users for key generation. As a result, our approach contributes to the scalability of the existing physical layer key generation algorithms since all users transmit simultaneously rather than using pairwise communications. We prove that our half-duplex network model reduces the required number of communications for group key generation down to a linear scale. Furthermore, the full-duplex network model reduces to a constant scale.
△ Less
Submitted 28 August, 2022; v1 submitted 16 December, 2019;
originally announced December 2019.
-
Wireless Network Reliability Analysis for Arbitrary Network Topologies
Authors:
Semiha Tedik Basaran,
Gunes Karabulut Kurt,
Frank R. Kschischang
Abstract:
The outage performance of wireless networks with unstructured network topologies is investigated. The network reliability perspective of graph theory is used to obtain the network outage polynomial of generalized wireless networks by enumerating paths and cut-sets of its graph representation for both uncorrelated and correlated wireless channels. A relation is established between the max-flow min-…
▽ More
The outage performance of wireless networks with unstructured network topologies is investigated. The network reliability perspective of graph theory is used to obtain the network outage polynomial of generalized wireless networks by enumerating paths and cut-sets of its graph representation for both uncorrelated and correlated wireless channels. A relation is established between the max-flow min-cut theorem and key communication performance indicators. The diversity order is equal to the size of the minimum cut-set between source and destination, and the coding gain is the number of cut-sets with size equal to the minimum cut. An ergodic capacity analysis of networks with arbitrary topologies based on the network outage polynomial is also presented. Numerical results are used to illustrate the technical definitions and verify the derivations.
△ Less
Submitted 29 April, 2019;
originally announced April 2019.