Secrecy Outage Probability of Energy-Harvesting Cooperative NOMA Transmissions With Relay Selection

Three relay selection techniques, aiming at achieving secure non-orthogonal multiple access in cooperative energy-harvesting (EH) communications, are proposed and compared. In the cooperative relaying system, the source node communicates with multiple users through amplify-and-forward EH relays in the presence of a passive eavesdropper. The relay selection is a two-stage strategy, where the first stage aims at achieving the users’ target data rate, and the second aims at optimizing the secrecy outage probability. New explicit analytical expressions for the secrecy outage probability are derived for three operating scenarios: i) when the channel state information (CSI) of the eavesdropper is unknown, and a two-stage conventional relay selection scheme is considered, ii) when CSI of the eavesdropper is known, and a two-stage optimal relay selection scheme is used, and iii) when multiple relays participate in forwarding the signal to the end users. Monte-Carlo simulations are provided to confirm the derivations, and the effects of the main system parameters on its secrecy are investigated. In particular, it is shown that the optimal relay selection scheme outperforms the conventional and the multiple-relays schemes in terms of secrecy outage probability, and that this superiority becomes more obvious when the number of the relays increases.

[1]  Jinjin Men,et al.  Non-Orthogonal Multiple Access for Multiple-Antenna Relaying Networks , 2015, IEEE Communications Letters.

[2]  H. Vincent Poor,et al.  On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.

[3]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[4]  Khairi Ashour Hamdi,et al.  Wireless Power Transfer in Multi-Pair Two-Way AF Relaying Networks , 2016, IEEE Transactions on Communications.

[5]  H. Vincent Poor,et al.  Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.

[6]  In-Ho Lee,et al.  Capacity Analysis of Cooperative Relaying Systems Using Non-Orthogonal Multiple Access , 2015, IEEE Communications Letters.

[7]  Qi Zhang,et al.  Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.

[8]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[9]  Mohamed-Slim Alouini,et al.  Cooperative HARQ-Assisted NOMA Scheme in Large-Scale D2D Networks , 2017, IEEE Transactions on Communications.

[10]  Leila Musavian,et al.  Wireless Power Transfer in Distributed Antenna Systems , 2019, IEEE Transactions on Communications.

[11]  Ward Whitt,et al.  Numerical Inversion of Laplace Transforms of Probability Distributions , 1995, INFORMS J. Comput..

[12]  In-Ho Lee,et al.  Non-Orthogonal Multiple Access in Coordinated Direct and Relay Transmission , 2015, IEEE Communications Letters.

[13]  Pingzhi Fan,et al.  On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users , 2014, IEEE Signal Processing Letters.

[14]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[15]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[16]  Zhiguo Ding,et al.  The Impact of Power Allocation on Cooperative Non-orthogonal Multiple Access Networks With SWIPT , 2017, IEEE Transactions on Wireless Communications.

[17]  Ayfer Özgür,et al.  Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks , 2006, IEEE Transactions on Information Theory.

[18]  Nhu Tri Do,et al.  A BNBF User Selection Scheme for NOMA-Based Cooperative Relaying Systems With SWIPT , 2017, IEEE Communications Letters.

[19]  C.-C. Jay Kuo,et al.  Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems , 2013, Springer Briefs in Electrical and Computer Engineering.

[20]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[21]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[22]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[23]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[24]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[25]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.

[26]  Zhijin Qin,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[27]  Bayan S. Sharif,et al.  Wireless Information and Power Transfer in Cooperative Networks With Spatially Random Relays , 2014, IEEE Transactions on Wireless Communications.

[28]  H. Vincent Poor,et al.  A General MIMO Framework for NOMA Downlink and Uplink Transmission Based on Signal Alignment , 2015, IEEE Transactions on Wireless Communications.

[29]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[30]  A. G. Greenhill,et al.  Handbook of Mathematical Functions with Formulas, Graphs, , 1971 .

[31]  Pingzhi Fan,et al.  On the Performance of Non-orthogonal Multiple Access Systems With Partial Channel Information , 2016, IEEE Transactions on Communications.

[32]  Nikola Zlatanov,et al.  Resource Allocation in Wireless Powered Communication Networks With Non-Orthogonal Multiple Access , 2016, IEEE Wireless Communications Letters.

[33]  Jiaheng Wang,et al.  On Optimal Power Allocation for Downlink Non-Orthogonal Multiple Access Systems , 2017, IEEE Journal on Selected Areas in Communications.

[34]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[35]  Mohamed-Slim Alouini,et al.  Outage probability of diversity systems over generalized fading channels , 2000, IEEE Trans. Commun..

[36]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.