A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case
In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel conditi...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8485291/ |
id |
doaj-84c06e2cc28d4f00ac6a076abbdee06d |
---|---|
record_format |
Article |
spelling |
doaj-84c06e2cc28d4f00ac6a076abbdee06d2021-03-29T21:40:35ZengIEEEIEEE Access2169-35362018-01-016587645877310.1109/ACCESS.2018.28742158485291A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper CaseYamen Alsaba0https://orcid.org/0000-0001-6165-3265Chee Yen Leow1Sharul Kamal Abdul Rahim2Wireless Communication Centre, School of Electrical Engineering, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai Johor, MalaysiaWireless Communication Centre, School of Electrical Engineering, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai Johor, MalaysiaWireless Communication Centre, School of Electrical Engineering, Faculty of Engineering, Universiti Teknologi Malaysia, Skudai Johor, MalaysiaIn this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel condition (strong user) is a potential eavesdropper. The weak user data can be intercepted by the strong user since the strong user needs to decode the weak user’s message for successive interference cancellation operation in NOMA. To impair strong user’s eavesdropping capability, weak user’s information-bearing signal is merged with an artificial signal (AS). Thus, the eavesdropping process requires extra decoding step at higher power level. The secrecy outage probability of the weak user is derived and provided in closed-form expression. The weak user faces a choice between transmitting the information-bearing signal with the total power and the deploying the AS technique, whereas the strong user can choose whether to eavesdrop the weak user’s message or not. To investigate users’ power-secrecy tradeoffs, their interactions are modeled as a non-cooperative zero-sum game. The existence of Nash equilibria (NEs) of the proposed game is first analyzed, and pure and mixed-strategy NE profiles are provided. In addition, numerical simulations are conducted to validate the analytical results and to prove that AS-Aided proposed scheme enhances the secrecy performance of NOMA systems while maintaining the NOMA superiority over OMA systems.https://ieeexplore.ieee.org/document/8485291/Game theoryNash equilibriumnon-orthogonal multiple accessphysical layer securityzero-sum game |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yamen Alsaba Chee Yen Leow Sharul Kamal Abdul Rahim |
spellingShingle |
Yamen Alsaba Chee Yen Leow Sharul Kamal Abdul Rahim A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case IEEE Access Game theory Nash equilibrium non-orthogonal multiple access physical layer security zero-sum game |
author_facet |
Yamen Alsaba Chee Yen Leow Sharul Kamal Abdul Rahim |
author_sort |
Yamen Alsaba |
title |
A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case |
title_short |
A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case |
title_full |
A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case |
title_fullStr |
A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case |
title_full_unstemmed |
A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case |
title_sort |
zero-sum game approach for non-orthogonal multiple access systems: legitimate eavesdropper case |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
In this paper, secure communication in non-orthogonal multiple access (NOMA) downlink system is considered wherein two NOMA users with channel gain difference are paired in each transmission slot. The user with poor channel condition (weak user) is entrusted, while the user with good channel condition (strong user) is a potential eavesdropper. The weak user data can be intercepted by the strong user since the strong user needs to decode the weak user’s message for successive interference cancellation operation in NOMA. To impair strong user’s eavesdropping capability, weak user’s information-bearing signal is merged with an artificial signal (AS). Thus, the eavesdropping process requires extra decoding step at higher power level. The secrecy outage probability of the weak user is derived and provided in closed-form expression. The weak user faces a choice between transmitting the information-bearing signal with the total power and the deploying the AS technique, whereas the strong user can choose whether to eavesdrop the weak user’s message or not. To investigate users’ power-secrecy tradeoffs, their interactions are modeled as a non-cooperative zero-sum game. The existence of Nash equilibria (NEs) of the proposed game is first analyzed, and pure and mixed-strategy NE profiles are provided. In addition, numerical simulations are conducted to validate the analytical results and to prove that AS-Aided proposed scheme enhances the secrecy performance of NOMA systems while maintaining the NOMA superiority over OMA systems. |
topic |
Game theory Nash equilibrium non-orthogonal multiple access physical layer security zero-sum game |
url |
https://ieeexplore.ieee.org/document/8485291/ |
work_keys_str_mv |
AT yamenalsaba azerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase AT cheeyenleow azerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase AT sharulkamalabdulrahim azerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase AT yamenalsaba zerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase AT cheeyenleow zerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase AT sharulkamalabdulrahim zerosumgameapproachfornonorthogonalmultipleaccesssystemslegitimateeavesdroppercase |
_version_ |
1724192449016889344 |