Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access

In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encoded packets to a destination that employs selection combining (SC) or maximal ratio combing (MRC) to enhance reliability of the decoding. The transmission is terminated when the destination has a required number of the encoded packets to reconstruct the original data of the source. Similarly, the eavesdropper also has the ability to recover the source data if it can intercept a sufficient number of the encoded packets. To reduce the number of time slots used, the source can employ non-orthogonal multiple access (NOMA) to send two encoded packets to the destination at each time slot. For performance analysis, exact formulas of average number of time slots (TS) and intercept probability (IP) over Rayleigh fading channel are derived and then verified by Monte-Carlo simulations. The results presented that the protocol using NOMA not only reduces TS but also obtains lower IP at medium and high transmit signal-to-noise ratios (SNRs), as compared with the corresponding protocol without using NOMA.

[1]  Ioannis Chatzigeorgiou,et al.  Rethinking the Intercept Probability of Random Linear Network Coding , 2015, IEEE Communications Letters.

[2]  Shuai Chang,et al.  Energy Harvesting for Physical Layer Security in Cooperative Networks Based on Compressed Sensing , 2017, Entropy.

[3]  Yueming Cai,et al.  Secrecy Outage Analysis of Buffer-Aided Cooperative MIMO Relaying Systems , 2018, IEEE Transactions on Vehicular Technology.

[4]  Trung Q. Duong,et al.  Secure Energy Harvesting Relay Networks With Unreliable Backhaul Connections , 2018, IEEE Access.

[5]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[6]  Houbing Song,et al.  Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes , 2018, Wirel. Commun. Mob. Comput..

[7]  Yan Wang,et al.  Improving the Security and Spectrum Efficiency in Overlay Cognitive Full-Duplex Wireless Networks , 2019, IEEE Access.

[8]  Junqing Zhang,et al.  Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview , 2017, Entropy.

[9]  Honglin Zhao,et al.  Relay Selection for Improved Security in Cognitive Relay Networks With Jamming , 2017, IEEE Wireless Communications Letters.

[10]  Rose Qingyang Hu,et al.  Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks , 2019, IEEE Transactions on Communications.

[11]  Zhigang Cao,et al.  A Rateless Coding Based Multi-Relay Cooperative Transmission Scheme for Cognitive Radio Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[12]  Andreas F. Molisch,et al.  Performance of Fountain Codes in Collaborative Relay Networks , 2007, IEEE Transactions on Wireless Communications.

[13]  Gaofeng Pan,et al.  Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.

[14]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[15]  Qingqing Wu,et al.  Wireless Powered Cooperative Jamming for Secure OFDM System , 2017, IEEE Transactions on Vehicular Technology.

[16]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[17]  Shankar Prakriya,et al.  Secrecy Outage Performance of a Cooperative Cognitive Relay Network , 2017, IEEE Communications Letters.

[18]  Chen Sun,et al.  Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities , 2019, Entropy.

[19]  Yueming Cai,et al.  Analysis and Optimization of Wireless-Powered Cooperative Jamming for Sensor Network Over Nakagami- $m$ Fading Channels , 2019, IEEE Communications Letters.

[20]  Tran Trung Duy,et al.  Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming , 2019, EAI Endorsed Trans. Ind. Networks Intell. Syst..

[21]  Zhenling Wang,et al.  Secrecy Performance Analysis of Relay Selection in Cooperative NOMA Systems , 2019, IEEE Access.

[22]  Ioannis Chatzigeorgiou,et al.  Opportunistic Relaying and Random Linear Network Coding for Secure and Reliable Communication , 2018, IEEE Transactions on Wireless Communications.

[23]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[24]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[25]  Chau Yuen,et al.  Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.

[26]  Hak-Lim Ko,et al.  Secrecy Outage Performance Analysis for Cooperative NOMA Over Nakagami- $m$ Channel , 2019, IEEE Access.

[27]  Jinlong Wang,et al.  Secrecy Performance of Wireless Powered Communication Networks With Multiple Eavesdroppers and Outdated CSI , 2018, IEEE Access.

[28]  Fuhui Zhou,et al.  Performance Analysis of AF Relaying With Selection Combining in Nakagami-$m$ Fading , 2019, IEEE Systems Journal.

[29]  Miroslav Voznák,et al.  Secrecy Performance of Underlay Cooperative Cognitive Network Using Non-Orthogonal Multiple Access with Opportunistic Relay Selection , 2019, Symmetry.

[30]  Kai-Kit Wong,et al.  Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback , 2015, IEEE Transactions on Information Forensics and Security.

[31]  Mohamed-Slim Alouini,et al.  Secrecy Outage of Max–Min TAS Scheme in MIMO-NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[32]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[33]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[34]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[35]  Ke Liu,et al.  Secure Communication for Two-Way Relay Networks with Imperfect CSI , 2017, Entropy.

[36]  Yueming Cai,et al.  Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.

[37]  S. Amari,et al.  Closed-form expressions for distribution of sum of exponential random variables , 1997 .

[38]  Li Sun,et al.  Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.

[39]  Zhongshan Zhang,et al.  Secure Full-Duplex Two-Way Relaying Networks With Optimal Relay Selection , 2017, IEEE Communications Letters.

[40]  Trung Q. Duong,et al.  Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.

[41]  Li Sun,et al.  Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback , 2019, IEEE Transactions on Vehicular Technology.

[42]  Mazen O. Hasna,et al.  Physical Layer Security for TAS/MRC Systems With and Without Co-Channel Interference Over $\eta$–$\mu$ Fading Channels , 2018, IEEE Transactions on Vehicular Technology.

[43]  Yunfei Chen,et al.  On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI , 2016, IEEE Transactions on Communications.

[44]  Yuan Liu,et al.  Secrecy Rate Maximization With Outage Constraint in Multihop Relaying Networks , 2018, IEEE Communications Letters.

[45]  Phu Tran Tin,et al.  Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments , 2019, Entropy.

[46]  Joong Bum Rhim,et al.  Fountain Codes , 2010 .

[47]  Tran Trung Duy,et al.  Secondary Spectrum Access in Cognitive Radio Networks Using Rateless Codes over Rayleigh Fading Channels , 2014, Wirel. Pers. Commun..

[48]  Hong-Chuan Yang,et al.  Simultaneous Wireless Information and Power Transfer in Cooperative Relay Networks With Rateless Codes , 2015, IEEE Transactions on Vehicular Technology.

[49]  Phu Tran Tin,et al.  Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments , 2019, Entropy.

[50]  Yongyi Mao,et al.  Rateless coding over fading channels , 2006, IEEE Communications Letters.

[51]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[52]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[53]  Yongming Huang,et al.  Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems With Outdated CSI , 2018, IEEE Transactions on Communications.

[54]  Ali Kuhestani,et al.  Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[55]  Nan Yang,et al.  Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks , 2016, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[56]  Li Sun,et al.  Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.

[58]  Wei Ni,et al.  Analysis on Secrecy Capacity of Cooperative Non-Orthogonal Multiple Access With Proactive Jamming , 2019, IEEE Transactions on Vehicular Technology.

[59]  Le-Nam Tran,et al.  On Transmission Efficiency for Wireless Broadcast Using Network Coding and Fountain Codes , 2011, IEEE Communications Letters.