Milad, Abolpour and Aissa, sonia and Musavian, Leila and Anirban, Bhopal (2022) Rate Splitting in the Presence of Untrusted Users: Outage and Secrecy Outage Performances. IEEE Open Journal of the Communications Society, 3. pp. 921-935. DOI https://doi.org/10.1109/OJCOMS.2022.3175426
Milad, Abolpour and Aissa, sonia and Musavian, Leila and Anirban, Bhopal (2022) Rate Splitting in the Presence of Untrusted Users: Outage and Secrecy Outage Performances. IEEE Open Journal of the Communications Society, 3. pp. 921-935. DOI https://doi.org/10.1109/OJCOMS.2022.3175426
Milad, Abolpour and Aissa, sonia and Musavian, Leila and Anirban, Bhopal (2022) Rate Splitting in the Presence of Untrusted Users: Outage and Secrecy Outage Performances. IEEE Open Journal of the Communications Society, 3. pp. 921-935. DOI https://doi.org/10.1109/OJCOMS.2022.3175426
Abstract
In this contribution, a thorough investigation of the performance of rate splitting is conducted in terms of outage and secrecy outage for the simultaneous service to a near user and far user, where the latter attempts to overhear the message of the former. The source transmits a linear combination of the users’ common stream and private streams. Once the common stream is retrieved, two decoding strategies can be adopted by each user. In the first strategy, the nodes (near or far) treat the far user’s private stream as noise to retrieve the private stream of the near user, then the far user decodes its own stream. In the second strategy, the nodes decode the far user’s private stream by treating the one of the near user as noise, then the near user retrieves its private stream while the far user decodes the stream of the near user in its attempt to overhear it. Considering the four decoding combinations, we obtain exact closed-form expressions for the outage probability, and provide tight approximations for the secrecy outage probability. Comparative results are also provided. In particular, it is shown that to achieve better outage probability, with no concern about secrecy, once the decoding of the common stream is completed, each user should first retrieve the private stream with lower target data rate by treating the other private stream as noise. To improve the secrecy outage probability, once the common stream is decoded, the near user must first decode the far user’s private stream, and the far user should first retrieve the private stream with lower target data rate.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Rate splitting, physical-layer security, outage probability, secrecy outage probability |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 20 Jun 2022 19:56 |
Last Modified: | 30 Oct 2024 21:11 |
URI: | http://repository.essex.ac.uk/id/eprint/32836 |
Available files
Filename: Rate_Splitting_in_the_Presence_of_Untrusted_Users_Outage_and_Secrecy_Outage_Performances.pdf
Licence: Creative Commons: Attribution 3.0