Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users

The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the same frequency band to improve the spectral efficiency. Whereas a security flaw emerges in the presence of untrusted users or low security clearance users who can access the messages of trusted users due to the spectrum sharing and may work as eavesdroppers. To achieve reliable and secure communications of NOMA systems under untrusted users, we in this paper propose two relay selection (RS) schemes termed decode-and-forward (DF) and amplify-and-forward (AF) protocols based optimal relay selection (i.e., DORS and AORS) schemes, respectively. To explicitly reveal the benefits of the DORS and AORS schemes, we derive the exact and asymptotic closed-form expressions of the secrecy outage probability (SOP) and positive secrecy capacity probability (PSCP) achieved by the two schemes, and analyze the optimality of the two schemes. Analysis and simulation results indicate that both the DORS and AORS schemes significantly outperform the benchmark schemes, in addition to achieving the same SOP and desirable PSCP at high SNR.

[1]  Xian Liu,et al.  Probability of Strictly Positive Secrecy Capacity of the Rician-Rician Fading Channel , 2013, IEEE Wireless Communications Letters.

[2]  Yueming Cai,et al.  Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.

[3]  H. Vincent Poor,et al.  Relay Selection for Cooperative NOMA , 2016, IEEE Wireless Communications Letters.

[4]  Haiyang Ding,et al.  Adaptive Cooperative Jamming for Secure Communication in Energy Harvesting Relay Networks , 2019, IEEE Wireless Communications Letters.

[5]  H. Vincent Poor,et al.  Cooperative Non-Orthogonal Multiple Access in 5G Systems , 2015, IEEE Communications Letters.

[6]  H. Vincent Poor,et al.  On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.

[7]  Hongwu Yang,et al.  Outage Performance Analysis for SWIPT-Based Cooperative Non-Orthogonal Multiple Access Systems , 2019, IEEE Communications Letters.

[8]  Zufan Zhang,et al.  Optimal Relay Selection Schemes for Cooperative NOMA , 2018, IEEE Transactions on Vehicular Technology.

[9]  Li Sun,et al.  Design for NOMA: Combat Eavesdropping and Improve Spectral Efficiency in the Two-User Relay Network , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[10]  In-Ho Lee,et al.  Capacity Analysis of Cooperative Relaying Systems Using Non-Orthogonal Multiple Access , 2015, IEEE Communications Letters.

[11]  Fuhui Zhou,et al.  Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach , 2019, IEEE Transactions on Information Forensics and Security.

[12]  Taneli Riihonen,et al.  Performance of Cooperative NOMA Systems under Passive Eavesdropping , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[13]  Zhiguo Ding,et al.  Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.

[14]  Chenxi Liu,et al.  Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access , 2019, IEEE Transactions on Information Forensics and Security.

[15]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.

[16]  Yinghui Ye,et al.  Performance Analysis of Relay Selection in Cooperative NOMA Networks , 2019, IEEE Communications Letters.

[17]  Octavia A. Dobre,et al.  Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[18]  Hua Yu,et al.  Non-Orthogonal Multiple Access for Cooperative Communications: Challenges, Opportunities, and Trends , 2018, IEEE Wireless Communications.

[19]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[20]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[21]  Zhiguo Ding,et al.  Design of Cooperative Non-Orthogonal Multicast Cognitive Multiple Access for 5G Systems: User Scheduling and Performance Analysis , 2017, IEEE Transactions on Communications.

[22]  Shuangfeng Han,et al.  Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.

[23]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.

[24]  Shankar Prakriya,et al.  Performance of Adaptive OMA/Cooperative-NOMA Scheme With User Selection , 2018, IEEE Communications Letters.

[25]  Yoshihisa Kishiyama,et al.  Enhancing user fairness in non-orthogonal access with successive interference cancellation for cellular downlink , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).

[26]  Mohamed-Slim Alouini,et al.  Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes , 2018, IEEE Transactions on Communications.

[27]  Xian Liu,et al.  Probability of strictly positive secrecy capacity of the Weibull fading channel , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[28]  G. Mazzini Equal BER with successive interference cancellation DS-CDMA systems on AWGN and Ricean channels , 1995, Proceedings of 6th International Symposium on Personal, Indoor and Mobile Radio Communications.

[29]  Anass Benjebbour,et al.  Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[30]  Kaishun Wu,et al.  Physical-Layer Security of NOMA Systems Under Untrusted Users , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[31]  Rui Zhang,et al.  Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.

[32]  Omid Abbasi,et al.  NOMA Inspired Cooperative Relaying System Using an AF Relay , 2019, IEEE Wireless Communications Letters.

[33]  Pingzhi Fan,et al.  Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions , 2016, IEEE Transactions on Vehicular Technology.

[34]  Reinaldo A. Valenzuela,et al.  V-BLAST: an architecture for realizing very high data rates over the rich-scattering wireless channel , 1998, 1998 URSI International Symposium on Signals, Systems, and Electronics. Conference Proceedings (Cat. No.98EX167).

[35]  Derrick Wing Kwan Ng,et al.  The Application of Relay to Massive Non-Orthogonal Multiple Access , 2018, IEEE Transactions on Communications.

[36]  Zhiguo Ding,et al.  Novel Relay Selection Strategies for Cooperative NOMA , 2017, IEEE Transactions on Vehicular Technology.

[37]  Jeffrey G. Andrews,et al.  The Guard Zone in Wireless Ad hoc Networks , 2007, IEEE Transactions on Wireless Communications.

[38]  A. Sridharan Broadcast Channels , 2022 .

[39]  J. G. Andrews,et al.  Interference cancellation for cellular systems: a contemporary overview , 2005, IEEE Wireless Communications.

[40]  Mugen Peng,et al.  Hybrid Precoding-Based Millimeter-Wave Massive MIMO-NOMA With Simultaneous Wireless Information and Power Transfer , 2018, IEEE Journal on Selected Areas in Communications.

[41]  Daniel Benevides da Costa,et al.  Improving the Performance of Cell-Edge Users in NOMA Systems Using Cooperative Relaying , 2018, IEEE Transactions on Communications.

[42]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[43]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[44]  Mohamed-Slim Alouini,et al.  Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.