Null-Steering Beamforming for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System

This paper addresses enhancing the physical layer security of a downlink non-orthogonal multiple access systems. The proposed scheme consists of a base station, multiple legitimate users, and an eavesdropper. In each transmission slot, the base station communicates with two paired users, under the malicious attempts of the eavesdropper to intercept the information messages. In order to impair the eavesdropper’s channel without affecting the legitimate paired users, a jamming signal is injected into the system by means of null-steering beamforming. In null-steering precoding, the jamming signal is directed toward the malicious node while being suppressed in the legitimate users’ directions. Null-steering jamming is exploited in two different mainstreams, namely, self-cooperative and nonself-cooperative jamming. In the self-cooperative strategy, the base station implements the null-steering beamformer to transmit the jamming signal during the information exchange with the legitimate users, whereas in the nonself-cooperative jamming scheme, idle legitimate users (helpers) utilize the harvested energy in the first phase to transmit the jamming signal toward the eavesdropper in the second phase during the base station communication with the legitimate users. The outage behavior in the two considered scenarios is investigated, and the secrecy outage probability for both paired users is derived and provided in closed-form expressions. Numerical simulations are performed to validate the derived analytical results and to compare the two considered strategies secrecy performance. Comparisons yield that self-cooperative jamming has better outage behavior unless the number of helpers in the system is large enough.

[1]  Benjamin Friedlander,et al.  Performance analysis of a null-steering algorithm based on direction-of-arrival estimation , 1989, IEEE Trans. Acoust. Speech Signal Process..

[2]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[3]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[4]  Kai-Kit Wong,et al.  To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.

[5]  Yue Gao,et al.  Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[6]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[7]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.

[8]  K P Peppas A Simple, Accurate Approximation to the Sum of Gamma–Gamma Variates and Applications in MIMO Free-Space Optical Systems , 2011, IEEE Photonics Technology Letters.

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  C. Fox The $G$ and $H$ functions as symmetrical Fourier kernels , 1961 .

[11]  Chee Yen Leow,et al.  Full-Duplex Cooperative Non-Orthogonal Multiple Access With Beamforming and Energy Harvesting , 2018, IEEE Access.

[12]  Zhiguo Ding,et al.  Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.

[13]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[14]  Keyvan Zarifi,et al.  Collaborative Null-Steering Beamforming for Uniformly Distributed Wireless Sensor Networks , 2010, IEEE Transactions on Signal Processing.

[15]  Zhiguo Ding,et al.  Performance Analysis and Optimization for SWIPT Wireless Sensor Networks , 2017, IEEE Transactions on Communications.

[16]  Anass Benjebbour,et al.  System-level performance evaluation of downlink non-orthogonal multiple access (NOMA) , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[17]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[18]  Zhiguo Ding,et al.  Design of Cooperative Non-Orthogonal Multicast Cognitive Multiple Access for 5G Systems: User Scheduling and Performance Analysis , 2017, IEEE Transactions on Communications.

[19]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[20]  Anass Benjebbour,et al.  System-level performance of downlink NOMA for future LTE enhancements , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[21]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[22]  Ranjan K. Mallik,et al.  Performance analysis of MIMO free-space optical systems in gamma-gamma fading , 2009, IEEE Transactions on Communications.

[23]  M. Chial,et al.  in simple , 2003 .

[24]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[25]  George K. Karagiannidis,et al.  On the Distribution of the Sum of Gamma-Gamma Variates and Applications in RF and Optical Wireless Communications , 2009, IEEE Transactions on Communications.

[26]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[27]  Chee Yen Leow,et al.  A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case , 2018, IEEE Access.

[28]  Xiuzhen Cheng,et al.  Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.