On the Secrecy Performance of Generalized User Selection for Interference-Limited Multiuser Wireless Networks

12/27/2018
by   Yazan H. Al-Badarneh, et al.
0

We investigate the secrecy performance of a multiuser diversity scheme for an interference-limited wireless network with a base-station (BS), N legitimate users and an eavesdropper, in the presence of a single dominant interferer. Assuming interference dominates noise power at the eavesdropper and at each legitimate user's receiver, the BS transmits information to the legitimate user with the k-th best (highest) signal-to-interference ratio. We derive a closed-form expression for the secrecy outage probability for an arbitrary N and an asymptotic expression for a fixed k and large N. Furthermore, we derive a closed form asymptotic expression for the ergodic secrecy capacity of the k-th best user and show that it scales like O((N)) for a fixed k and large N.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/24/2018

Physical Layer Security in the Presence of Interference

We evaluate and quantify the joint effect of fading and multiple interfe...
research
05/31/2023

Confidential Signal Cancellation Phenomenon in Interference Alignment Networks: Cause and Cure

This paper investigates physical layer security (PLS) in wireless interf...
research
10/31/2017

Breaking the Interference Barrier in Dense Wireless Networks with Interference Alignment

A fundamental problem arising in dense wireless networks is the high co-...
research
02/21/2023

Effects of Co-channel Interference on RIS Empowered Wireless Networks amid Multiple Eavesdropping Attempts

This letter is concerned with the secrecy performance of reconfigurable ...
research
01/27/2019

Secrecy Outage Analysis of Non-Orthogonal Spectrum Sharing for Heterogeneous Cellular Networks

In this paper, we investigate physical-layer security for a heterogeneou...
research
10/20/2020

User-Number Threshold-based Base Station On/Off Control for Maximizing Coverage Probability

In this study, we investigate the operation of user-number threshold-bas...
research
06/05/2023

Secrecy of Opportunistic User Scheduling in RIS-Aided Systems: A Comparison with NOMA Scheduling

In this paper, we propose an opportunistic user scheduling scheme in a m...

Please sign up or login with your details

Forgot password? Click here to reset