Secure NOMA Based Cooperative Networks with Rate-Splitting Source and Full-Duplex Relay

In this paper, we develop a non-orthogonal multiple access (NOMA)-based cooperative network against multiple eavesdroppers, in which the source delivers confidential information using rate-splitting approach to the destination under the help/protection of the full-duplex relay. Specifically, by splitting the symbol into two sub-symbols at the source, the channel gain differences created by the relay can be exploited between two sub-symbols to use spectral resource more efficiently with NOMA proposal. On the other hand, by enabling the full-duplex technique in the first phase, the relay not only forwards the confidential information to the destination but also keeps radiating artificial noises to confuse multiple potential eavesdroppers. Different decoding schemes based on the successive interference cancellation (SIC) are proposed for the destination, relay, and eavesdroppers. Closed-form expressions of the ergodic secrecy rates are derived, which perfectly match the computer simulation results for our proposed network.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Zhiguo Ding,et al.  Nonorthogonal Multiple Access for 5G , 2018, 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management.

[3]  Stuart Rosen,et al.  Signals and Systems for Speech and Hearing: Second Edition , 2010 .

[4]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[5]  Zhiguo Ding,et al.  Design of Cooperative Non-Orthogonal Multicast Cognitive Multiple Access for 5G Systems: User Scheduling and Performance Analysis , 2017, IEEE Transactions on Communications.

[6]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[7]  Fumiyuki Adachi,et al.  The Application of MIMO to Non-Orthogonal Multiple Access , 2015, IEEE Transactions on Wireless Communications.

[8]  H. Vincent Poor,et al.  On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.

[9]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[10]  Qi Zhang,et al.  Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.

[11]  Yue Gao,et al.  Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[12]  In-Ho Lee,et al.  Capacity Analysis of Cooperative Relaying Systems Using Non-Orthogonal Multiple Access , 2015, IEEE Communications Letters.

[13]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[14]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.

[15]  H. Vincent Poor,et al.  Cooperative Non-orthogonal Multiple Access With Simultaneous Wireless Information and Power Transfer , 2015, IEEE Journal on Selected Areas in Communications.

[16]  Bruno Clerckx,et al.  Rate splitting for MIMO wireless networks: a promising PHY-layer strategy for LTE evolution , 2016, IEEE Communications Magazine.

[17]  H. Vincent Poor,et al.  Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.

[18]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[19]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.