z-logo
open-access-imgOpen Access
An Uplink Secure CB-NOMA with SIC Receiver for Wireless Applications
Author(s) -
Israa M. Al-Musawi,
Walid A. Al-Hussaibi,
Yaseen H. Tahir,
Falah H. Ali
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1773/1/012001
Subject(s) - computer science , telecommunications link , single antenna interference cancellation , bit error rate , computer network , noma , interference (communication) , demodulation , wireless , physical layer , secure communication , electronic engineering , telecommunications , engineering , encryption , channel (broadcasting)
The nonorthogonal multiple access (NOMA) techniques are considered one of the main methods to realize the goals of 5G mobile and wireless systems such as link communication reliability and high user connectivity. Yet, when the amount of simultaneously connected users increases, many concerns will arise regarding the users’ data security. Various chaotic systems in the communication field have been presented to mitigate the data security concerns offering a cost-efficient technique to provide physical layer security. This work presents an uplink secure chaos-based NOMA (SCB-NOMA) system by exploiting the power domain. For signal modulation at the transmitters’ node, chaos shift keying is used, with controlled transmit power to satisfy the receiver conditions. For multiuser detection, the receiver side employs successive interference cancellation with chaotic demodulation. The efficiency of designed SCB-NOMA is demonstrated by considering different power control factors, system scenarios, and chaotic sequence length compared with different reference systems. It is shown that the efficient selection of the power allocation parameter has a direct effect on the bit error rate (BER) performance. Meanwhile, when the amount of power difference for the successive interference cancellation process is not adequate, the chaotic codes maintain the desired data security and enable robust BER performance for connected users. Besides, the correlation between the utilized chaotic codes has more impact on BER regardless of the considered sequence length.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here