Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

## Impact of jamming signal on system performance in downlink of IoT network relying on nonorthogonal multiple access

• Author(s):
• DOI:

$16.00 (plus tax if applicable) ##### Buy Knowledge Pack 10 chapters for$120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:

Intelligent Wireless Communications — Recommend this title to your library

## Thank you

This chapter analyzed a downlink NOMA network with impacts from jamming signal. With regard to impairment of SIC, that is, imperfect SIC and perfect SIC were used in the receiver to provide a comparative study. To examine system per-formance, the outage probability was considered in this chapter under various para-meters. Specially, we derived the closed-form expressions for the outage probability. In order to evaluate other metrics, the throughput of the system is studied and system performance remains stable at high SNRs. These results can be achieved and verified by the simulation results and they were also further evaluated under varying the number of jamming sources. In future work, more users and more pairs of the group need to be investigated to implement such scenarios in real IoT systems.

Chapter Contents:

• 7.1 Introduction
• 7.2 Consideration on IoT system under the impact of a jamming signal
• 7.3 Outage probability and throughput analysis
• 7.3.1 The outage probability of the D1
• 7.3.2 The outage probability of the second user D2
• 7.3.3 Throughput performance
• 7.4 Numerical results
• 7.5 Conclusion
• References

Preview this chapter:

Impact of jamming signal on system performance in downlink of IoT network relying on nonorthogonal multiple access, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte094e/PBTE094E_ch7-1.gif /docserver/preview/fulltext/books/te/pbte094e/PBTE094E_ch7-2.gif

### Related content

content/books/10.1049/pbte094e_ch7
pub_keyword,iet_inspecKeyword,pub_concept
6
6
This is a required field