IEEE Open Journal of the Communications Society (Jan 2022)

Rate Splitting in the Presence of Untrusted Users: Outage and Secrecy Outage Performances

  • Milad Abolpour,
  • Sonia Aissa,
  • Leila Musavian,
  • Anirban Bhowal

DOI
https://doi.org/10.1109/OJCOMS.2022.3175426
Journal volume & issue
Vol. 3
pp. 921 – 935

Abstract

Read online

In this contribution, a thorough investigation of the performance of rate splitting is conducted in terms of outage and secrecy outage for the simultaneous service to a near user and far user, where the latter attempts to overhear the message of the former. The source transmits a linear combination of the users’ common stream and private streams. Once the common stream is retrieved, two decoding strategies can be adopted by each user. In the first strategy, the nodes (near or far) treat the far user’s private stream as noise to retrieve the private stream of the near user, then the far user decodes its own stream. In the second strategy, the nodes decode the far user’s private stream by treating the one of the near user as noise, then the near user retrieves its private stream while the far user decodes the stream of the near user in its attempt to overhear it. Considering the four decoding combinations, we obtain exact closed-form expressions for the outage probability, and provide tight approximations for the secrecy outage probability. Comparative results are also provided. In particular, it is shown that to achieve better outage probability, with no concern about secrecy, once the decoding of the common stream is completed, each user should first retrieve the private stream with lower target data rate by treating the other private stream as noise. To improve the secrecy outage probability, once the common stream is decoded, the near user must first decode the far user’s private stream, and the far user should first retrieve the private stream with lower target data rate.

Keywords