Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware
This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) a...
Gespeichert in:
Veröffentlicht in: | Signal, image and video processing image and video processing, 2024, Vol.18 (10), p.6559-6571 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6571 |
---|---|
container_issue | 10 |
container_start_page | 6559 |
container_title | Signal, image and video processing |
container_volume | 18 |
creator | Ukyam, Uma Maheswara Rao Gurrala, Kiran Kumar |
description | This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) at the transceivers, particularly when the direct links from the source node (S) to the NOMA users
U
r
,
U
t
are blocked. The STAR-RIS, employing the energy splitting protocol, serves two users located on opposite sides of the STAR-RIS structure, allowing simultaneous eavesdropping. The introduction of a control jammer enhances security and is assessed in various scenarios, including without jamming (WJ), with jamming (J), and control jamming (CJ), for both the transmitting user
U
t
and the reflecting user
U
r
. To augment security, an optimization problem is formulated with a total power constraint, optimizing power allocation at both users. This problem is iteratively addressed using the Lagrange multiplier method (LMM) and Particle Swarm Optimization-based power allocation (PSO-PA) method. Performance analysis compares the recommended PSO-PA scheme, LMM technique, and constant power allocation scheme in terms of secrecy rate under various jamming scenarios (WJ, J, and CJ). Additionally, the impact of statistical parameters like signal-to-noise ratio, number of STAR elements, and non-ideal HWDs on secrecy rate is examined using the CJ technique at both NOMA users. |
doi_str_mv | 10.1007/s11760-024-03335-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3091273451</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3091273451</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-cc60f6c9c47d6fc30630743f0ccb5efe1d559293f1181b755dafb4029d07a4223</originalsourceid><addsrcrecordid>eNp9kE9LAzEQxRdRUNQv4CngOTpJdpPdYyn-g6pg6zlks5N263ZTk5XSb-DHNrWiN-cyj-G9B_PLsgsGVwxAXUfGlAQKPKcghCioPMhOWCkFZYqxw18N4jg7j3EJaQRXpSxPss8p2oB2S4IZkJjedNvYxiQasvYbDMR0nbdmaH1P4rAzzVuMxPlArO-H4DuyNKtV288p9qbusCHT2eiFvjxMydPz44hs2oAdxkh6HDY-vKXDsCB9qmsbNB1ZmNBsTMCz7MiZLuL5zz7NXm9vZuN7Onm-exiPJtRyBQO1VoKTtrK5aqSzAqQAlQsH1tYFOmRNUVS8Eo6xktWqKBrj6hx41YAyOefiNLvc966Df__AOOil_wjp76gFVIwrkRcsufjeZYOPMaDT69CuTNhqBnoHXe-h6wRdf0PXMoXEPhSTuZ9j-Kv-J_UFjb6F0Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3091273451</pqid></control><display><type>article</type><title>Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware</title><source>SpringerLink Journals</source><creator>Ukyam, Uma Maheswara Rao ; Gurrala, Kiran Kumar</creator><creatorcontrib>Ukyam, Uma Maheswara Rao ; Gurrala, Kiran Kumar</creatorcontrib><description>This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) at the transceivers, particularly when the direct links from the source node (S) to the NOMA users
U
r
,
U
t
are blocked. The STAR-RIS, employing the energy splitting protocol, serves two users located on opposite sides of the STAR-RIS structure, allowing simultaneous eavesdropping. The introduction of a control jammer enhances security and is assessed in various scenarios, including without jamming (WJ), with jamming (J), and control jamming (CJ), for both the transmitting user
U
t
and the reflecting user
U
r
. To augment security, an optimization problem is formulated with a total power constraint, optimizing power allocation at both users. This problem is iteratively addressed using the Lagrange multiplier method (LMM) and Particle Swarm Optimization-based power allocation (PSO-PA) method. Performance analysis compares the recommended PSO-PA scheme, LMM technique, and constant power allocation scheme in terms of secrecy rate under various jamming scenarios (WJ, J, and CJ). Additionally, the impact of statistical parameters like signal-to-noise ratio, number of STAR elements, and non-ideal HWDs on secrecy rate is examined using the CJ technique at both NOMA users.</description><identifier>ISSN: 1863-1703</identifier><identifier>EISSN: 1863-1711</identifier><identifier>DOI: 10.1007/s11760-024-03335-6</identifier><language>eng</language><publisher>London: Springer London</publisher><subject>Computer Imaging ; Computer Science ; Image Processing and Computer Vision ; Jamming ; Lagrange multiplier ; Multimedia Information Systems ; Nonorthogonal multiple access ; Original Paper ; Particle swarm optimization ; Pattern Recognition and Graphics ; Reconfigurable hardware ; Reconfigurable intelligent surfaces ; Signal to noise ratio ; Signal,Image and Speech Processing ; Vision ; Wireless networks</subject><ispartof>Signal, image and video processing, 2024, Vol.18 (10), p.6559-6571</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-cc60f6c9c47d6fc30630743f0ccb5efe1d559293f1181b755dafb4029d07a4223</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11760-024-03335-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11760-024-03335-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,41469,42538,51300</link.rule.ids></links><search><creatorcontrib>Ukyam, Uma Maheswara Rao</creatorcontrib><creatorcontrib>Gurrala, Kiran Kumar</creatorcontrib><title>Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware</title><title>Signal, image and video processing</title><addtitle>SIViP</addtitle><description>This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) at the transceivers, particularly when the direct links from the source node (S) to the NOMA users
U
r
,
U
t
are blocked. The STAR-RIS, employing the energy splitting protocol, serves two users located on opposite sides of the STAR-RIS structure, allowing simultaneous eavesdropping. The introduction of a control jammer enhances security and is assessed in various scenarios, including without jamming (WJ), with jamming (J), and control jamming (CJ), for both the transmitting user
U
t
and the reflecting user
U
r
. To augment security, an optimization problem is formulated with a total power constraint, optimizing power allocation at both users. This problem is iteratively addressed using the Lagrange multiplier method (LMM) and Particle Swarm Optimization-based power allocation (PSO-PA) method. Performance analysis compares the recommended PSO-PA scheme, LMM technique, and constant power allocation scheme in terms of secrecy rate under various jamming scenarios (WJ, J, and CJ). Additionally, the impact of statistical parameters like signal-to-noise ratio, number of STAR elements, and non-ideal HWDs on secrecy rate is examined using the CJ technique at both NOMA users.</description><subject>Computer Imaging</subject><subject>Computer Science</subject><subject>Image Processing and Computer Vision</subject><subject>Jamming</subject><subject>Lagrange multiplier</subject><subject>Multimedia Information Systems</subject><subject>Nonorthogonal multiple access</subject><subject>Original Paper</subject><subject>Particle swarm optimization</subject><subject>Pattern Recognition and Graphics</subject><subject>Reconfigurable hardware</subject><subject>Reconfigurable intelligent surfaces</subject><subject>Signal to noise ratio</subject><subject>Signal,Image and Speech Processing</subject><subject>Vision</subject><subject>Wireless networks</subject><issn>1863-1703</issn><issn>1863-1711</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kE9LAzEQxRdRUNQv4CngOTpJdpPdYyn-g6pg6zlks5N263ZTk5XSb-DHNrWiN-cyj-G9B_PLsgsGVwxAXUfGlAQKPKcghCioPMhOWCkFZYqxw18N4jg7j3EJaQRXpSxPss8p2oB2S4IZkJjedNvYxiQasvYbDMR0nbdmaH1P4rAzzVuMxPlArO-H4DuyNKtV288p9qbusCHT2eiFvjxMydPz44hs2oAdxkh6HDY-vKXDsCB9qmsbNB1ZmNBsTMCz7MiZLuL5zz7NXm9vZuN7Onm-exiPJtRyBQO1VoKTtrK5aqSzAqQAlQsH1tYFOmRNUVS8Eo6xktWqKBrj6hx41YAyOefiNLvc966Df__AOOil_wjp76gFVIwrkRcsufjeZYOPMaDT69CuTNhqBnoHXe-h6wRdf0PXMoXEPhSTuZ9j-Kv-J_UFjb6F0Q</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Ukyam, Uma Maheswara Rao</creator><creator>Gurrala, Kiran Kumar</creator><general>Springer London</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>2024</creationdate><title>Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware</title><author>Ukyam, Uma Maheswara Rao ; Gurrala, Kiran Kumar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-cc60f6c9c47d6fc30630743f0ccb5efe1d559293f1181b755dafb4029d07a4223</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Imaging</topic><topic>Computer Science</topic><topic>Image Processing and Computer Vision</topic><topic>Jamming</topic><topic>Lagrange multiplier</topic><topic>Multimedia Information Systems</topic><topic>Nonorthogonal multiple access</topic><topic>Original Paper</topic><topic>Particle swarm optimization</topic><topic>Pattern Recognition and Graphics</topic><topic>Reconfigurable hardware</topic><topic>Reconfigurable intelligent surfaces</topic><topic>Signal to noise ratio</topic><topic>Signal,Image and Speech Processing</topic><topic>Vision</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ukyam, Uma Maheswara Rao</creatorcontrib><creatorcontrib>Gurrala, Kiran Kumar</creatorcontrib><collection>CrossRef</collection><jtitle>Signal, image and video processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ukyam, Uma Maheswara Rao</au><au>Gurrala, Kiran Kumar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware</atitle><jtitle>Signal, image and video processing</jtitle><stitle>SIViP</stitle><date>2024</date><risdate>2024</risdate><volume>18</volume><issue>10</issue><spage>6559</spage><epage>6571</epage><pages>6559-6571</pages><issn>1863-1703</issn><eissn>1863-1711</eissn><abstract>This study explores the secrecy rate of a new system model comprising a control jamming-enabled simultaneous transmission and reflection reconfigurable intelligent surfaces (STAR-RIS) in a non-orthogonal multiple access (NOMA) downlink network. The study considers non-ideal hardware defects (HWDs) at the transceivers, particularly when the direct links from the source node (S) to the NOMA users
U
r
,
U
t
are blocked. The STAR-RIS, employing the energy splitting protocol, serves two users located on opposite sides of the STAR-RIS structure, allowing simultaneous eavesdropping. The introduction of a control jammer enhances security and is assessed in various scenarios, including without jamming (WJ), with jamming (J), and control jamming (CJ), for both the transmitting user
U
t
and the reflecting user
U
r
. To augment security, an optimization problem is formulated with a total power constraint, optimizing power allocation at both users. This problem is iteratively addressed using the Lagrange multiplier method (LMM) and Particle Swarm Optimization-based power allocation (PSO-PA) method. Performance analysis compares the recommended PSO-PA scheme, LMM technique, and constant power allocation scheme in terms of secrecy rate under various jamming scenarios (WJ, J, and CJ). Additionally, the impact of statistical parameters like signal-to-noise ratio, number of STAR elements, and non-ideal HWDs on secrecy rate is examined using the CJ technique at both NOMA users.</abstract><cop>London</cop><pub>Springer London</pub><doi>10.1007/s11760-024-03335-6</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1863-1703 |
ispartof | Signal, image and video processing, 2024, Vol.18 (10), p.6559-6571 |
issn | 1863-1703 1863-1711 |
language | eng |
recordid | cdi_proquest_journals_3091273451 |
source | SpringerLink Journals |
subjects | Computer Imaging Computer Science Image Processing and Computer Vision Jamming Lagrange multiplier Multimedia Information Systems Nonorthogonal multiple access Original Paper Particle swarm optimization Pattern Recognition and Graphics Reconfigurable hardware Reconfigurable intelligent surfaces Signal to noise ratio Signal,Image and Speech Processing Vision Wireless networks |
title | Secrecy rate analysis and power allocation strategies for control jamming-enabled STAR-RIS NOMA wireless network with non ideal hardware |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T03%3A20%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20rate%20analysis%20and%20power%20allocation%20strategies%20for%20control%20jamming-enabled%20STAR-RIS%20NOMA%20wireless%20network%20with%20non%20ideal%20hardware&rft.jtitle=Signal,%20image%20and%20video%20processing&rft.au=Ukyam,%20Uma%20Maheswara%20Rao&rft.date=2024&rft.volume=18&rft.issue=10&rft.spage=6559&rft.epage=6571&rft.pages=6559-6571&rft.issn=1863-1703&rft.eissn=1863-1711&rft_id=info:doi/10.1007/s11760-024-03335-6&rft_dat=%3Cproquest_cross%3E3091273451%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3091273451&rft_id=info:pmid/&rfr_iscdi=true |