DOI QR코드

DOI QR Code

Power allocation-Assisted secrecy analysis for NOMA enabled cooperative network under multiple eavesdroppers

  • Nayak, V. Narasimha (Department of Electronics and Communication Engineering, National Institute of Technology Andhra Pradesh) ;
  • Gurrala, Kiran Kumar (Department of Electronics and Communication Engineering, National Institute of Technology Andhra Pradesh)
  • Received : 2020.03.09
  • Accepted : 2020.09.23
  • Published : 2021.08.01

Abstract

In this work, the secrecy of a typical wireless cooperative dual-hop non-orthogonal multiple access (NOMA)-enabled decode-and-forward (DF) relay network is investigated with the impact of collaborative and non-collaborative eavesdropping. The system model consists of a source that broadcasts the multiplexed signal to two NOMA users via a DF relay, and information security against the eavesdropper nodes is provided by a helpful jammer. The performance metric is secrecy rate and ergodic secrecy capacity is approximated analytically. In addition, a differential evolution algorithm-based power allocation scheme is proposed to find the optimal power allocation factors for relay, jammer, and NOMA users by employing different jamming schemes. Furthermore, the secrecy rate analysis is validated at the NOMA users by adopting different jamming schemes such as without jamming (WJ) or conventional relaying, jamming (J), and with control jamming (CJ). Simulation results demonstrate the superiority of CJ over the J and WJ schemes. Finally, the proposed power allocation outperforms the fixed power allocation under all conditions considered in this work.

Keywords

References

  1. L. Dai et al., Nonorthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends, IEEE Commun. Mag. 53 (2015), 74-81. https://doi.org/10.1109/MCOM.2015.7263349
  2. Z. Wei et al., A survey of downlink non-orthogonal multiple access for 5G wireless communication networks, ZTE Commun. 14 (2016), 17-26. https://doi.org/10.3969/j.issn.1009-6868.2008.01.004
  3. Z. Ding et al., On the performance of nonorthogonal multiple access in 5G systems with randomly deployed users, IEEE Signal Process. Lett. 21 (2014), 1501-1505. https://doi.org/10.1109/LSP.2014.2343971
  4. Y. Xiao et al., Forwarding strategy selection in dual-hop NOMA relaying systems, IEEE Commun. Lett. 22 (2018), 1644-1647. https://doi.org/10.1109/lcomm.2018.2803809
  5. Z. Ding, M. Peng, and H. V. Poor, Cooperative non-orthogonal multiple access in 5G systems, IEEE Commun. Lett. 19 (2015), 1462-1465. https://doi.org/10.1109/LCOMM.2015.2441064
  6. C. Zhong and Z. Zhang, Non-orthogonal multiple access with cooperative full-duplex relaying, IEEE Commun. Lett. 20 (2016), 2478-2481. https://doi.org/10.1109/LCOMM.2016.2611500
  7. Z. Ding, H. Dai, and H. V. Poor, Relay selection for cooperative NOMA, IEEE Wirel. Commun. Lett. 5 (2016), 416-419. https://doi.org/10.1109/LWC.2016.2574709
  8. L. Lai and H. El Gamal, The relay-eavesdropper channel: Cooperation for secrecy, IEEE Trans. Inf. Theory. 54 (2008), 4005-4019. https://doi.org/10.1109/TIT.2008.928272
  9. Y. Feng, et al., Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access, IEEE Trans. Inf. Forensics Security. 14 (2019), 1670-1683. https://doi.org/10.1109/tifs.2018.2883273
  10. I. Krikidis, J. Thompson, and S. Mclaughlin, Relay selection for secure cooperative networks with jamming, IEEE Trans. Wirel. Commun. 8 (2009), 5003-5011. https://doi.org/10.1109/TWC.2009.090323
  11. D. H. Ibrahim and E. S. Hassan, E1-Dolil, a new relay and jammer selection schemes for secure one-way cooperative networks, Wirel. Pers. Commun. 75 (2014), 665-685. https://doi.org/10.1007/s11277-013-1384-5
  12. L. Tang et al., Secure wireless communications via cooperative relaying and jamming, in Proc. GLOBECOM Workshops (GC Wkshps) (Houston, TX, USA), Dec. 2012, pp. 849-853.
  13. L. Sun et al., Security-aware relaying scheme for cooperative networks with untrusted relay nodes, IEEE Commun. Lett. 19 (2015), 463-466. https://doi.org/10.1109/LCOMM.2014.2385095
  14. K. K. Gurrala and S. Das, Performance study of hybrid decode-amplify-forward (HDAF) relaying scheme for physical layer security in wireless cooperative network, Int. J. Commun. Syst. 30 (2017), no. 8, e3182. https://doi.org/10.1002/dac.3182
  15. Y. Liu et al., Enhancing the physical layer security of nonorthogonal multiple access in large-scale networks, IEEE Trans. Wirel. Commun. 16 (2017), 1656-1672. https://doi.org/10.1109/TWC.2017.2650987
  16. F. Jameel et al., A comprehensive survey on cooperative relaying and jamming strategies for physical layer security, IEEE Commun. Surveys. 21 (2019), 2734-2771. https://doi.org/10.1109/COMST.2018.2865607
  17. M. K. Shukla, H. H. Nguyen, and O. J. Pandey, Secrecy performance analysis of two-way relay non-orthogonal multiple access systems, IEEE Access 8 (2020), 39502-39512. https://doi.org/10.1109/access.2020.2975924
  18. H. Lei et al., Secrecy outage analysis for cooperative NOMA systems with relay selection schemes, IEEE Trans. Commun. 67 (2018), 6282-6298. https://doi.org/10.1109/tcomm.2019.2916070
  19. J. Chen, L. Yang, and M.-S. Alouini, Physical layer security for cooperative NOMA systems, IEEE Trans. Veh. Technol. 67 (2018), 4645-4649. https://doi.org/10.1109/tvt.2017.2789223
  20. C. Yu et al., Secrecy outage performance analysis for cooperative NOMA over Nakagami-m Channel, IEEE Access 7 (2019), 79866-79876. https://doi.org/10.1109/access.2019.2923450
  21. Z. Wang and Z. Peng, Secrecy performance analysis of relay selection in cooperative NOMA systems, IEEE Access 7 (2019), 86274-86287. https://doi.org/10.1109/access.2019.2925380
  22. W. U. Khan, Maximizing physical layer security in relay-assisted multicarrier non orthogonal multiple access transmission, Internet Technol. Lett. 2 (2019), e76. https://doi.org/10.1002/itl2.76
  23. L. Lv et al., Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach, IEEE Trans. Inf. Forensics Secur. 14 (2019), 3191-3205. https://doi.org/10.1109/tifs.2019.2912337
  24. F. Zhou et al., Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT, IEEE J. Sel. Areas Commun. 36 (2018), 918-931. https://doi.org/10.1109/jsac.2018.2824622
  25. S. Leung-Yan-Cheong and M. Hellman, The gaussian wire-tap channel, IEEE Trans. Inf. Theory. 24 (1978), 451-456. https://doi.org/10.1109/TIT.1978.1055917
  26. K. K. Gurrala and S. Das, Maximized channel capacity based power allocation technique for multi relay hybrid decode-amplifyforward cooperative network, Wirel. Personal Commun. 87 (2015), 663-678. https://doi.org/10.1007/s11277-015-2622-9
  27. A. K. Qin and P. N. Suganthan, Self-adaptive differential evolution algorithm for numerical optimization, in Proc. IEEE Congr. Evolut. Comput. (Edinburgh, UK), Sept. 2005, pp. 1785-1791.