Secure Opportunistic User Scheduling in RIS-Aided Networks: A Comparison with NOMA-Based Scheduling

  • Burhan Wafai
  • , Sarbani Ghose
  • , Chinmoy Kundu
  • , Ankit Dubey
  • , Mark F. Flanagan

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

In this paper, we propose an opportunistic user scheduling scheme in a multi-user reconfigurable intelligent surface (RIS) aided wireless system to improve secrecy. We derive the secrecy outage probability (SOP) and its asymptotic expression in approximate closed form. The asymptotic analysis shows that the SOP does not depend on the transmitter-to-RIS distance and saturates at a high signal-to-noise ratio to a fixed value that depends on the ratio of the path-loss of the RIS-to-destination and RIS-to-eavesdropper links and the number of users. It is shown that the asymptotic SOP decreases exponentially with the number of RIS elements. We also compare the secrecy performance of our scheme with that of a non-orthogonal multiple access (NOMA) scheduling scheme, which chooses a pair of users to schedule in each time slot. The comparison shows that the secrecy performance of the NOMA scheme is compromised and that our proposed scheduling scheme has better performance.

Original languageEnglish
Title of host publication2024 IEEE Wireless Communications and Networking Conference, WCNC 2024 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350303582
DOIs
Publication statusPublished - 2024
Externally publishedYes
Event25th IEEE Wireless Communications and Networking Conference, WCNC 2024 - Dubai, United Arab Emirates
Duration: 21 Apr 202424 Apr 2024

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Conference

Conference25th IEEE Wireless Communications and Networking Conference, WCNC 2024
Country/TerritoryUnited Arab Emirates
CityDubai
Period21/04/2424/04/24

Keywords

  • asymptotic analysis
  • Opportunistic user scheduling
  • RIS
  • secrecy outage probability

Fingerprint

Dive into the research topics of 'Secure Opportunistic User Scheduling in RIS-Aided Networks: A Comparison with NOMA-Based Scheduling'. Together they form a unique fingerprint.

Cite this