Security Enhancement and QoS Provisioning for NOMA-Based Cooperative D2D Networks

The characteristic of heterogeneous power utilization in device-to-device (D2D) enabled cellular networks provides a natural fit for the adoption of non-orthogonal multiple access (NOMA). It contributes to a novel D2D framework, NOMA based cooperative D2D communications, with which the heterogeneous interference among different types of nodes can be tackled well. In the framework, a D2D transmitter not only acts as a relay of a pair of cellular transceiver but also transmits its own information to the paired receiver occupying the spectrum of cellular networks with NOMA technique. Apparently, this setup makes the reliability and security of the networks more challenging, in the presence of eavesdropper. To tackle this issue, a collaborative protocol with joint power optimization is built up. Specifically, to prevent information leakage, full-duplex (FD) cellular receiver injects the artificial noise (AN) signals to deteriorate the eavesdropper’s channel while performing beamforming to suppress AN in the legitimate users’ directions. Meanwhile, D2D transmitter brings desirable QoS provisions for the networks by power scheduling. The joint power optimization problem is formulated by maximizing the secrecy sum rate (SSR) of the overall system, subject to the quality of service (QoS) requirements of cellular and D2D receivers. Due to the non-convexity of the problem, a double-layer optimization method is proposed and then two optimal power allocation ratios are generated. Furthermore, connection outage probability (COP) and secrecy outage probability of the system (SOPS) are respectively characterized and their closed-form expressions are derived. Finally, numerical results are employed to validate the accuracy of theoretical results and the superiority of the proposed protocol in terms of joint security enhancement and QoS provisioning.

[1]  Byungtae Jang,et al.  Resource Allocation for NOMA-Based D2D Systems Coexisting With Cellular Networks , 2018, IEEE Access.

[2]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[3]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[4]  Kwok Hung Li,et al.  Physical Layer Security in Heterogeneous Networks With Pilot Attack: A Stochastic Geometry Approach , 2018, IEEE Transactions on Communications.

[5]  Qiang Li,et al.  Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.

[6]  Yue Chen,et al.  Joint Subchannel and Power Allocation for NOMA Enhanced D2D Communications , 2017, IEEE Transactions on Communications.

[7]  Slimane Ben Slimane,et al.  Cooperative device-to-device communications in the downlink of cellular networks , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[8]  Cheng-Xiang Wang,et al.  Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.

[9]  Yue Chen,et al.  Spectral and Energy Efficiency of Uplink D2D Underlaid Massive MIMO Cellular Networks , 2017, IEEE Transactions on Communications.

[10]  Peng Liu,et al.  Power Allocation for Full-Duplex Relaying-Based D2D Communication Underlaying Cellular Networks , 2015, IEEE Transactions on Vehicular Technology.

[11]  Zhu Han,et al.  Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach , 2016, IEEE Transactions on Communications.

[12]  Yan Zhang,et al.  Secure Transmission for Heterogeneous Cellular Networks With Wireless Information and Power Transfer , 2018, IEEE Systems Journal.

[13]  Ming Xiao,et al.  A Survey of Advanced Techniques for Spectrum Sharing in 5G Networks , 2017, IEEE Wireless Communications.

[14]  Bin Li,et al.  Opportunistic access control for enhancing security in D2D-enabled cellular networks , 2017, Science China Information Sciences.

[15]  Jing Zhang,et al.  Tradeoff Between Delay and Physical Layer Security in Wireless Networks , 2018, IEEE Journal on Selected Areas in Communications.

[16]  Mustapha Benjillali,et al.  Cooperative NOMA-based D2D communications: A survey in the 5G/IoT context , 2018, 2018 19th IEEE Mediterranean Electrotechnical Conference (MELECON).

[17]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[18]  Chee Yen Leow,et al.  Null-Steering Beamforming for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System , 2019, IEEE Access.

[19]  Kang G. Shin,et al.  Transmit Power Control for D2D-Underlaid Cellular Networks Based on Statistical Features , 2017, IEEE Transactions on Vehicular Technology.

[20]  Kwok Hung Li,et al.  Enhanced Physical Layer Security in D2D Spectrum Sharing Networks , 2017, IEEE Wireless Communications Letters.

[21]  Shidong Zhou,et al.  Spectrum and Energy-Efficient Beamspace MIMO-NOMA for Millimeter-Wave Communications Using Lens Antenna Array , 2017, IEEE Journal on Selected Areas in Communications.

[22]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[23]  Mohamed Ibnkahla,et al.  Multiband Spectrum Sensing and Resource Allocation for IoT in Cognitive 5G Networks , 2018, IEEE Internet of Things Journal.

[24]  Zhiguo Ding,et al.  Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.

[25]  Li Wang,et al.  Cooperative Jamming-Aided Secrecy Enhancement in P2P Communications With Social Interaction Constraints , 2017, IEEE Transactions on Vehicular Technology.

[26]  Lajos Hanzo,et al.  Performance Analysis of NOMA-SM in Vehicle-to-Vehicle Massive MIMO Channels , 2017, IEEE Journal on Selected Areas in Communications.

[27]  Ranjan K. Mallik,et al.  Physical Layer Security of a Multiantenna-Based CR Network With Single and Multiple Primary Users , 2017, IEEE Transactions on Vehicular Technology.

[28]  Mohamed-Slim Alouini,et al.  Cooperative HARQ-Assisted NOMA Scheme in Large-Scale D2D Networks , 2017, IEEE Transactions on Communications.

[29]  Ali Ghrayeb,et al.  A NOMA Scheme Exploiting Partial Similarity Among Users Bit Sequences , 2018, IEEE Transactions on Communications.

[30]  Jing Yang,et al.  Artificial noise-assisted physical layer security in D2D-enabled cellular networks , 2017, EURASIP J. Wirel. Commun. Netw..

[31]  Keyvan Zarifi,et al.  Collaborative Null-Steering Beamforming for Uniformly Distributed Wireless Sensor Networks , 2010, IEEE Transactions on Signal Processing.

[32]  Li Jiang,et al.  Secure beamforming design for SWIPT in cooperative D2D communications , 2017, China Communications.

[33]  Rose Qingyang Hu,et al.  Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks , 2019, IEEE Transactions on Communications.

[34]  Chenxi Liu,et al.  Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access , 2019, IEEE Transactions on Information Forensics and Security.

[35]  Kwok Hung Li,et al.  Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks , 2017, IEEE Transactions on Information Forensics and Security.

[36]  Jiaheng Wang,et al.  Resource Management for Device-to-Device Communication: A Physical Layer Security Perspective , 2018, IEEE Journal on Selected Areas in Communications.

[37]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.