Jamming-Aided Secrecy Performance in Secure Uplink NOMA System

A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work. We first characterize secrecy performance in terms of positive secrecy rate probability, secrecy outage probability (SOP) and effective secrecy throughput (EST), and derive the closed-expressions of individual secrecy performance. The analytical results not only show an improvement on secrecy performance with the aid of cooperative jamming, but also clearly illustrate how each jammer affects the secrecy performance. We then continue the study of the individual secrecy performance for its asymptotic behaviors, and reveal it is only dependent on its relative distance to the eavesdropper over the desired receiver in a high signal-to-noise ratio (SNR) regime. Finally, the maximization of overall secrecy performance is covered by investigating two optimization problems: 1) optimal selection of jammer(s) under the same transmit power; 2) optimal power allocation to each transmitter, including jammers, under the constraint of limited total transmit power. The solutions to these two problems are presented and demonstrated by an appropriate case.

[1]  Qi Zhang,et al.  Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.

[2]  E. Tekin,et al.  On Secure Signaling for the Gaussian Multiple Access Wire-tap Channel , 2005, Conference Record of the Thirty-Ninth Asilomar Conference onSignals, Systems and Computers, 2005..

[3]  Huiming Wang,et al.  Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things , 2018, IEEE Access.

[4]  E. Tekin Secrecy Sum-Rates for the Multiple-Access WireTap Channel with Ergodic Block Fading , 2007 .

[5]  George K. Karagiannidis,et al.  A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.

[6]  H. Vincent Poor,et al.  Securing Downlink Massive MIMO-NOMA Networks With Artificial Noise , 2019, IEEE Journal of Selected Topics in Signal Processing.

[7]  Jinhong Yuan,et al.  Beamforming Design and Power Allocation for Secure Transmission With NOMA , 2018, IEEE Transactions on Wireless Communications.

[8]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[9]  Yijie Zhong,et al.  Secure Computation Efficiency Maximization in NOMA-Enabled Mobile Edge Computing Networks , 2019, IEEE Access.

[10]  Shuangfeng Han,et al.  Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.

[11]  Zhen Li,et al.  SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels , 2018, IEEE Access.

[12]  Zhenling Wang,et al.  Secrecy Performance Analysis of Relay Selection in Cooperative NOMA Systems , 2019, IEEE Access.

[13]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.

[14]  Jianwei Xie,et al.  Secure degrees of freedom of the Gaussian multiple access wiretap channel , 2013, 2013 IEEE International Symposium on Information Theory.

[15]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[16]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[17]  Fuhui Zhou,et al.  Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach , 2019, IEEE Transactions on Information Forensics and Security.

[18]  Sudhan Majhi,et al.  Secure Beamforming for MIMO-NOMA-Based Cognitive Radio Network , 2018, IEEE Communications Letters.

[19]  Lajos Hanzo,et al.  Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.

[20]  Jian Yang,et al.  Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network , 2018, IEEE Transactions on Information Forensics and Security.

[21]  Quanzhong Li,et al.  Secure Beamforming in Downlink MIMO Nonorthogonal Multiple Access Networks , 2017, IEEE Signal Processing Letters.

[22]  Kai-Kit Wong,et al.  A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked Beamforming , 2012, IEEE Communications Letters.

[23]  Raef Bassily,et al.  Ergodic Secret Alignment , 2010, IEEE Transactions on Information Theory.

[24]  Eiji Okamoto,et al.  An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation , 2019, 2019 International Conference on Information Networking (ICOIN).

[25]  Zhen Li,et al.  Individual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation , 2017, EURASIP J. Wirel. Commun. Netw..

[26]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[27]  Rose Qingyang Hu,et al.  Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks , 2019, IEEE Transactions on Communications.

[28]  Mohamed-Slim Alouini,et al.  Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[29]  Zhen Li,et al.  ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel , 2017, IEEE Access.

[30]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.

[31]  Xin Fan,et al.  The Secrecy Analysis over Physical Layer in NOMA-Enabled Cognitive Radio Networks , 2018, 2018 IEEE International Conference on Communications (ICC).

[32]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[33]  Yueming Cai,et al.  Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.

[34]  Yuanwei Liu,et al.  Physical Layer Security in Uplink NOMA Multi-Antenna Systems With Randomly Distributed Eavesdroppers , 2017, IEEE Access.

[35]  Cheng-Xiang Wang,et al.  Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.

[36]  Zhen Li,et al.  Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[37]  Norman C. Beaulieu,et al.  Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks , 2019, IEEE Transactions on Communications.

[38]  Pritam Mukherjee,et al.  Secure degrees of freedom of the multiple access wiretap channel with no eavesdropper CSI , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[39]  Jianwei Xie,et al.  Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure , 2014, IEEE Transactions on Information Theory.