A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case

In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel conditi...

Full description

Bibliographic Details
Main Authors: Yamen Alsaba, Chee Yen Leow, Sharul Kamal Abdul Rahim
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8485291/
id doaj-84c06e2cc28d4f00ac6a076abbdee06d
record_format Article
spelling doaj-84c06e2cc28d4f00ac6a076abbdee06d2021-03-29T21:40:35ZengIEEEIEEE Access2169-35362018-01-016587645877310.1109/ACCESS.2018.28742158485291A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper CaseYamen Alsaba0https://orcid.org/0000-0001-6165-3265Chee Yen Leow1Sharul Kamal Abdul Rahim2Wireless Communication Centre, School of Electrical Engineering, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai Johor, MalaysiaWireless Communication Centre, School of Electrical Engineering, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai Johor, MalaysiaWireless Communication Centre, School of Electrical Engineering, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai Johor, MalaysiaIn this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel condition (strong user) is a potential eavesdropper. The weak user data can be intercepted by the strong user since the strong user needs to decode the weak user’s message for successive interference cancellation operation in NOMA. To impair strong user’s eavesdropping capability, weak user’s information-bearing signal is merged with an artificial signal (AS). Thus, the eavesdropping process requires extra decoding step at higher power level. The secrecy outage probability of the weak user is derived and provided in closed-form expression. The weak user faces a choice between transmitting the information-bearing signal with the total power and the deploying the AS technique, whereas the strong user can choose whether to eavesdrop the weak user’s message or not. To investigate users’ power-secrecy tradeoffs, their interactions are modeled as a non-cooperative zero-sum game. The existence of Nash equilibria (NEs) of the proposed game is first analyzed, and pure and mixed-strategy NE profiles are provided. In addition, numerical simulations are conducted to validate the analytical results and to prove that AS-Aided proposed scheme enhances the secrecy performance of NOMA systems while maintaining the NOMA superiority over OMA systems.https://ieeexplore.ieee.org/document/8485291/Game theoryNash equilibriumnon-orthogonal multiple accessphysical layer securityzero-sum game
collection DOAJ
language English
format Article
sources DOAJ
author Yamen Alsaba
Chee Yen Leow
Sharul Kamal Abdul Rahim
spellingShingle Yamen Alsaba
Chee Yen Leow
Sharul Kamal Abdul Rahim
A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case
IEEE Access
Game theory
Nash equilibrium
non-orthogonal multiple access
physical layer security
zero-sum game
author_facet Yamen Alsaba
Chee Yen Leow
Sharul Kamal Abdul Rahim
author_sort Yamen Alsaba
title A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case
title_short A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case
title_full A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case
title_fullStr A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case
title_full_unstemmed A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case
title_sort zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel condition (strong user) is a potential eavesdropper. The weak user data can be intercepted by the strong user since the strong user needs to decode the weak user’s message for successive interference cancellation operation in NOMA. To impair strong user’s eavesdropping capability, weak user’s information-bearing signal is merged with an artificial signal (AS). Thus, the eavesdropping process requires extra decoding step at higher power level. The secrecy outage probability of the weak user is derived and provided in closed-form expression. The weak user faces a choice between transmitting the information-bearing signal with the total power and the deploying the AS technique, whereas the strong user can choose whether to eavesdrop the weak user’s message or not. To investigate users’ power-secrecy tradeoffs, their interactions are modeled as a non-cooperative zero-sum game. The existence of Nash equilibria (NEs) of the proposed game is first analyzed, and pure and mixed-strategy NE profiles are provided. In addition, numerical simulations are conducted to validate the analytical results and to prove that AS-Aided proposed scheme enhances the secrecy performance of NOMA systems while maintaining the NOMA superiority over OMA systems.
topic Game theory
Nash equilibrium
non-orthogonal multiple access
physical layer security
zero-sum game
url https://ieeexplore.ieee.org/document/8485291/
work_keys_str_mv AT yamenalsaba azerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase
AT cheeyenleow azerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase
AT sharulkamalabdulrahim azerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase
AT yamenalsaba zerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase
AT cheeyenleow zerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase
AT sharulkamalabdulrahim zerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase
_version_ 1724192449016889344