Enhancing Average Secrecy Rates in Downlink NOMA with Dependent Channel Coefficients and Optimal Power Coefficients

Document Type : Computer and Network Security-Ghaemi


Department of Electrical Engineering Ferdowsi University of Mashhad, Mashhad, Iran.


Wireless communication systems demand efficient solutions, and non-orthogonal multiple access (NOMA) has emerged as a promising approach. The present investigation compares NOMA against orthogonal multiple access (OMA) methods, specifically focusing on TDMA. Through an analysis of the performance metrics, specific optimal power coefficients were derived, ensuring superior performance of NOMA schemes. It is important to note that these optimal power coefficients are dependent on the channel coefficients, meaning they will vary as the channel conditions of the users change. Using copula functions, we modeled the dependence between the channel coefficients and successfully obtained the dependences among the fading coefficients. Utilizing specific optimal power coefficients, calculations for the average secrecy rates of NOMA were conducted, considering the modeled dependencies. The analysis of mathematical and numerical results in this study reveals a significant performance improvement in the average secrecy rates of Downlink NOMA when considering dependent channel coefficients and optimal specific coefficients, as compared to independent NOMA.


Main Subjects

  1. Wang, Bichai, et al. "Comparison study of non-orthogonal multiple access schemes for 5G." 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. IEEE, 2015.
  2. Wu, K. Lu, C. Jiang and X. Shao, "Comprehensive Study and Comparison on 5G NOMA Schemes," in IEEE Access, vol. 6, pp. 18511-18519, 2018.
  3. Chen, Z. Ding, X. Dai and R. Zhang, "An Optimization Perspective of the Superiority of NOMA Compared to Conventional OMA," in IEEE Transactions on Signal Processing, vol. 65, no. 19, pp. 5191-5202, 1 Oct.1, 2017.
  4. Liu, G. Pan, H. Zhang and M. Song, "On the Capacity Comparison Between MIMO-NOMA and MIMO-OMA," in IEEE Access, vol. 4, pp. 2123-2129, 2016.
  5. El-Sayed, Mohamed M., Ahmed S. Ibrahim, and Mohamed M. Khairy. "Power allocation strategies for non-orthogonal multiple access." 2016 international conference on selected topics in mobile & wireless networking (MoWNeT). IEEE, 2016.
  6. U. Khan, F. Jameel, M.A. Jamshed, H. Pervaiz, S. Khan, J. Liu “Efficient power allocation for noma-enabled iot networks in 6g era” Phys. Commun., 39 (2020), p. 101043.
  7. Wu, A. Khisti, C. Xiao, G. Caire, K. -K. Wong and X. Gao, "A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead," in IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 679-695, April 2018.
  8. Zhang, H. -M. Wang, Q. Yang and Z. Ding, "Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access," in IEEE Communications Letters, vol. 20, no. 5, pp. 930-933, May 2016.
  9. Zhang, H. -M. Wang, Q. Yang and Z. Ding, "Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access," in IEEE Communications Letters, vol. 20, no. 5, pp. 930-933, May 2016.
  10. Cao et al., "Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems," in IEEE Transactions on Vehicular Technology, vol. 70, no. 2, pp. 1978-1983, Feb. 2021.
  11. Zhang, F. Jia, Z. Zhang, J. Ge and F. Gong, "Physical Layer Security Designs for 5G NOMA Systems with a Stronger Near-End Internal Eavesdropper," in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13005-13017, Nov. 2020.
  12. R. Ghadi and G. A. Hodtani, "Copula-Based Analysis of Physical Layer Security Performances Over Correlated Rayleigh Fading Channels," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 431-440, 2021.
  13. Nelson, R.B. ’An introduction to copulas’ (Springer Science & Business Media, New York, NY, 2007.
  14. Shemyakin A., Kniazev A.: ‘Introduction to Bayesian estimation and copula models of dependence’, John Wiley & Sons., 2017.
  15. M. Hamamreh, H. M. Furqan, and H. Arslan, “Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey,” IEEE Commun. Surveys Tuts., pp. 1–1, 2018.
  16. Geller, E.W. Ng, A table of integrals of the exponential integral, J. Res. Natl. Bur. Stand. 71(1969) 1-20.