Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware

This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Signal, image and video processing image and video processing, 2024, Vol.18 (10), p.6559-6571
Hauptverfasser: Ukyam, Uma Maheswara Rao, Gurrala, Kiran Kumar
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6571
container_issue 10
container_start_page 6559
container_title Signal, image and video processing
container_volume 18
creator Ukyam, Uma Maheswara Rao
Gurrala, Kiran Kumar
description This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) at the transceivers, particularly when the direct links from the source node (S) to the NOMA users U r , U t are blocked. The STAR-RIS, employing the energy splitting protocol, serves two users located on opposite sides of the STAR-RIS structure, allowing simultaneous eavesdropping. The introduction of a control jammer enhances security and is assessed in various scenarios, including without jamming (WJ), with jamming (J), and control jamming (CJ), for both the transmitting user U t and the reflecting user U r . To augment security, an optimization problem is formulated with a total power constraint, optimizing power allocation at both users. This problem is iteratively addressed using the Lagrange multiplier method (LMM) and Particle Swarm Optimization-based power allocation (PSO-PA) method. Performance analysis compares the recommended PSO-PA scheme, LMM technique, and constant power allocation scheme in terms of secrecy rate under various jamming scenarios (WJ, J, and CJ). Additionally, the impact of statistical parameters like signal-to-noise ratio, number of STAR elements, and non-ideal HWDs on secrecy rate is examined using the CJ technique at both NOMA users.
doi_str_mv 10.1007/s11760-024-03335-6
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3091273451</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3091273451</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-cc60f6c9c47d6fc30630743f0ccb5efe1d559293f1181b755dafb4029d07a4223</originalsourceid><addsrcrecordid>eNp9kE9LAzEQxRdRUNQv4CngOTpJdpPdYyn-g6pg6zlks5N263ZTk5XSb-DHNrWiN-cyj-G9B_PLsgsGVwxAXUfGlAQKPKcghCioPMhOWCkFZYqxw18N4jg7j3EJaQRXpSxPss8p2oB2S4IZkJjedNvYxiQasvYbDMR0nbdmaH1P4rAzzVuMxPlArO-H4DuyNKtV288p9qbusCHT2eiFvjxMydPz44hs2oAdxkh6HDY-vKXDsCB9qmsbNB1ZmNBsTMCz7MiZLuL5zz7NXm9vZuN7Onm-exiPJtRyBQO1VoKTtrK5aqSzAqQAlQsH1tYFOmRNUVS8Eo6xktWqKBrj6hx41YAyOefiNLvc966Df__AOOil_wjp76gFVIwrkRcsufjeZYOPMaDT69CuTNhqBnoHXe-h6wRdf0PXMoXEPhSTuZ9j-Kv-J_UFjb6F0Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3091273451</pqid></control><display><type>article</type><title>Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware</title><source>SpringerLink Journals</source><creator>Ukyam, Uma Maheswara Rao ; Gurrala, Kiran Kumar</creator><creatorcontrib>Ukyam, Uma Maheswara Rao ; Gurrala, Kiran Kumar</creatorcontrib><description>This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) at the transceivers, particularly when the direct links from the source node (S) to the NOMA users U r , U t are blocked. The STAR-RIS, employing the energy splitting protocol, serves two users located on opposite sides of the STAR-RIS structure, allowing simultaneous eavesdropping. The introduction of a control jammer enhances security and is assessed in various scenarios, including without jamming (WJ), with jamming (J), and control jamming (CJ), for both the transmitting user U t and the reflecting user U r . To augment security, an optimization problem is formulated with a total power constraint, optimizing power allocation at both users. This problem is iteratively addressed using the Lagrange multiplier method (LMM) and Particle Swarm Optimization-based power allocation (PSO-PA) method. Performance analysis compares the recommended PSO-PA scheme, LMM technique, and constant power allocation scheme in terms of secrecy rate under various jamming scenarios (WJ, J, and CJ). Additionally, the impact of statistical parameters like signal-to-noise ratio, number of STAR elements, and non-ideal HWDs on secrecy rate is examined using the CJ technique at both NOMA users.</description><identifier>ISSN: 1863-1703</identifier><identifier>EISSN: 1863-1711</identifier><identifier>DOI: 10.1007/s11760-024-03335-6</identifier><language>eng</language><publisher>London: Springer London</publisher><subject>Computer Imaging ; Computer Science ; Image Processing and Computer Vision ; Jamming ; Lagrange multiplier ; Multimedia Information Systems ; Nonorthogonal multiple access ; Original Paper ; Particle swarm optimization ; Pattern Recognition and Graphics ; Reconfigurable hardware ; Reconfigurable intelligent surfaces ; Signal to noise ratio ; Signal,Image and Speech Processing ; Vision ; Wireless networks</subject><ispartof>Signal, image and video processing, 2024, Vol.18 (10), p.6559-6571</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-cc60f6c9c47d6fc30630743f0ccb5efe1d559293f1181b755dafb4029d07a4223</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11760-024-03335-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11760-024-03335-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,41469,42538,51300</link.rule.ids></links><search><creatorcontrib>Ukyam, Uma Maheswara Rao</creatorcontrib><creatorcontrib>Gurrala, Kiran Kumar</creatorcontrib><title>Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware</title><title>Signal, image and video processing</title><addtitle>SIViP</addtitle><description>This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) at the transceivers, particularly when the direct links from the source node (S) to the NOMA users U r , U t are blocked. The STAR-RIS, employing the energy splitting protocol, serves two users located on opposite sides of the STAR-RIS structure, allowing simultaneous eavesdropping. The introduction of a control jammer enhances security and is assessed in various scenarios, including without jamming (WJ), with jamming (J), and control jamming (CJ), for both the transmitting user U t and the reflecting user U r . To augment security, an optimization problem is formulated with a total power constraint, optimizing power allocation at both users. This problem is iteratively addressed using the Lagrange multiplier method (LMM) and Particle Swarm Optimization-based power allocation (PSO-PA) method. Performance analysis compares the recommended PSO-PA scheme, LMM technique, and constant power allocation scheme in terms of secrecy rate under various jamming scenarios (WJ, J, and CJ). Additionally, the impact of statistical parameters like signal-to-noise ratio, number of STAR elements, and non-ideal HWDs on secrecy rate is examined using the CJ technique at both NOMA users.</description><subject>Computer Imaging</subject><subject>Computer Science</subject><subject>Image Processing and Computer Vision</subject><subject>Jamming</subject><subject>Lagrange multiplier</subject><subject>Multimedia Information Systems</subject><subject>Nonorthogonal multiple access</subject><subject>Original Paper</subject><subject>Particle swarm optimization</subject><subject>Pattern Recognition and Graphics</subject><subject>Reconfigurable hardware</subject><subject>Reconfigurable intelligent surfaces</subject><subject>Signal to noise ratio</subject><subject>Signal,Image and Speech Processing</subject><subject>Vision</subject><subject>Wireless networks</subject><issn>1863-1703</issn><issn>1863-1711</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kE9LAzEQxRdRUNQv4CngOTpJdpPdYyn-g6pg6zlks5N263ZTk5XSb-DHNrWiN-cyj-G9B_PLsgsGVwxAXUfGlAQKPKcghCioPMhOWCkFZYqxw18N4jg7j3EJaQRXpSxPss8p2oB2S4IZkJjedNvYxiQasvYbDMR0nbdmaH1P4rAzzVuMxPlArO-H4DuyNKtV288p9qbusCHT2eiFvjxMydPz44hs2oAdxkh6HDY-vKXDsCB9qmsbNB1ZmNBsTMCz7MiZLuL5zz7NXm9vZuN7Onm-exiPJtRyBQO1VoKTtrK5aqSzAqQAlQsH1tYFOmRNUVS8Eo6xktWqKBrj6hx41YAyOefiNLvc966Df__AOOil_wjp76gFVIwrkRcsufjeZYOPMaDT69CuTNhqBnoHXe-h6wRdf0PXMoXEPhSTuZ9j-Kv-J_UFjb6F0Q</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Ukyam, Uma Maheswara Rao</creator><creator>Gurrala, Kiran Kumar</creator><general>Springer London</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>2024</creationdate><title>Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware</title><author>Ukyam, Uma Maheswara Rao ; Gurrala, Kiran Kumar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-cc60f6c9c47d6fc30630743f0ccb5efe1d559293f1181b755dafb4029d07a4223</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Imaging</topic><topic>Computer Science</topic><topic>Image Processing and Computer Vision</topic><topic>Jamming</topic><topic>Lagrange multiplier</topic><topic>Multimedia Information Systems</topic><topic>Nonorthogonal multiple access</topic><topic>Original Paper</topic><topic>Particle swarm optimization</topic><topic>Pattern Recognition and Graphics</topic><topic>Reconfigurable hardware</topic><topic>Reconfigurable intelligent surfaces</topic><topic>Signal to noise ratio</topic><topic>Signal,Image and Speech Processing</topic><topic>Vision</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ukyam, Uma Maheswara Rao</creatorcontrib><creatorcontrib>Gurrala, Kiran Kumar</creatorcontrib><collection>CrossRef</collection><jtitle>Signal, image and video processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ukyam, Uma Maheswara Rao</au><au>Gurrala, Kiran Kumar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware</atitle><jtitle>Signal, image and video processing</jtitle><stitle>SIViP</stitle><date>2024</date><risdate>2024</risdate><volume>18</volume><issue>10</issue><spage>6559</spage><epage>6571</epage><pages>6559-6571</pages><issn>1863-1703</issn><eissn>1863-1711</eissn><abstract>This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) at the transceivers, particularly when the direct links from the source node (S) to the NOMA users U r , U t are blocked. The STAR-RIS, employing the energy splitting protocol, serves two users located on opposite sides of the STAR-RIS structure, allowing simultaneous eavesdropping. The introduction of a control jammer enhances security and is assessed in various scenarios, including without jamming (WJ), with jamming (J), and control jamming (CJ), for both the transmitting user U t and the reflecting user U r . To augment security, an optimization problem is formulated with a total power constraint, optimizing power allocation at both users. This problem is iteratively addressed using the Lagrange multiplier method (LMM) and Particle Swarm Optimization-based power allocation (PSO-PA) method. Performance analysis compares the recommended PSO-PA scheme, LMM technique, and constant power allocation scheme in terms of secrecy rate under various jamming scenarios (WJ, J, and CJ). Additionally, the impact of statistical parameters like signal-to-noise ratio, number of STAR elements, and non-ideal HWDs on secrecy rate is examined using the CJ technique at both NOMA users.</abstract><cop>London</cop><pub>Springer London</pub><doi>10.1007/s11760-024-03335-6</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1863-1703
ispartof Signal, image and video processing, 2024, Vol.18 (10), p.6559-6571
issn 1863-1703
1863-1711
language eng
recordid cdi_proquest_journals_3091273451
source SpringerLink Journals
subjects Computer Imaging
Computer Science
Image Processing and Computer Vision
Jamming
Lagrange multiplier
Multimedia Information Systems
Nonorthogonal multiple access
Original Paper
Particle swarm optimization
Pattern Recognition and Graphics
Reconfigurable hardware
Reconfigurable intelligent surfaces
Signal to noise ratio
Signal,Image and Speech Processing
Vision
Wireless networks
title Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T03%3A20%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20rate%20analysis%20and%20power%20allocation%20strategies%20for%20control%20jamming-enabled%20STAR-RIS%20NOMA%20wireless%20network%20with%20non%20ideal%20hardware&rft.jtitle=Signal,%20image%20and%20video%20processing&rft.au=Ukyam,%20Uma%20Maheswara%20Rao&rft.date=2024&rft.volume=18&rft.issue=10&rft.spage=6559&rft.epage=6571&rft.pages=6559-6571&rft.issn=1863-1703&rft.eissn=1863-1711&rft_id=info:doi/10.1007/s11760-024-03335-6&rft_dat=%3Cproquest_cross%3E3091273451%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3091273451&rft_id=info:pmid/&rfr_iscdi=true