On Secure NOMA-based Terrestrial and Aerial IoT Systems

Hongjiang Lei, Chen Zhu, Kihong Park, Weijia Lei, Imran Shafique Ansari, Theodoros A. Tsiftsis

Research output: Contribution to journalArticlepeer-review

1 Scopus citations


In this paper, we study the secure communication performance of non-orthogonal multiple access (NOMA) communication systems with aerial eavesdroppers. Firstly, the ground-to-ground NOMA communications systems are considered wherein the near user is uniformly distributed in an inner disc and the far user is uniformly distributed in an outer ring within cell coverage of a base station at the center. A single eavesdropper is uniformly distributed outside the protected zone or multiple eavesdroppers are randomly dispersed and modeled as a three-dimensional (3D) homogeneous Poisson point process. Subsequently, the secrecy performance of the ground-to-air NOMA communications systems are investigated wherein the near user is uniformly distributed in an internal 3D spherical cap and the far user is uniformly distributed in an external 3D spherical cap. To enhance secrecy performance, a protected zone is introduced around the ground base station. Novel exact expressions for the secrecy outage probability (SOP) for both scenarios are derived. Finally, Monte Carlo simulation results are presented to validate the correctness of the derived analytical expressions and demonstrate the effects of system parameters on SOP of the considered system.
Original languageEnglish (US)
JournalIEEE Internet of Things Journal
StatePublished - 2021

Bibliographical note

KAUST Repository Item: Exported on 2021-08-31
Acknowledgements: This work was supported by the National Natural Science Foundation of China under Grant 61971080, Natural Science Foundation Project of Chongqing under Grant cstc2019jcyj-msxmX0032, and the Open Fund of the Shaanxi Key Laboratory of Information Communication Network and Security under Grant ICNS201807.


Dive into the research topics of 'On Secure NOMA-based Terrestrial and Aerial IoT Systems'. Together they form a unique fingerprint.

Cite this