Rank-Based Secrecy Rate Improvement Using NOMA for Ultra Dense Network

Non-orthogonal multiple access (NOMA) has emerged as an integral component for the future cellular networks. The purpose to install more small cells in the vicinity of a macrocell is to provide seamless and ubiquitous coverage to a huge density of users. Hence, security becomes an important aspect, which needs to resolve for users under critically acclaimed applications. The conventional encryption techniques and physical layer security measures may not be feasible always in Ultra Dense Network due to limited resources. Thus, the NOMA-based multiple access (MA) technique is emphasized to ensure reliability and confidentiality to users under dense picocells deployment. This paper sheds light on the security challenges of vehicular users and examines the impact of the NOMA-based MA technique on overall performance in comparison to the conventional approach. We design a training model to determine the density of vehicular users in a given picocell, before assigning power and resources. However, the proposed approach takes care of low mobile vehicular users as the eavesdropper tends to impact them more. The operation of NOMA-enabled users under the influence of intracellular and intercellular interference is also discussed. The results demonstrate that NOMA is successful in achieving a high sum rate for vehicular users by efficiently exploiting the resources in the power domain. To end this, we also compare the NOMA-based solution for the same scenario with the conventional approaches.

[1]  Ying Wang,et al.  Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study , 2016, IEEE Access.

[2]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[3]  Song Guo,et al.  D2D-based content delivery with parked vehicles in vehicular social networks , 2016, IEEE Wireless Communications.

[4]  Zhi Chen,et al.  Secrecy Performance Analysis in Downlink NOMA Systems with Cooperative Full-Duplex Relaying , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[5]  Anass Benjebbour,et al.  Design considerations for a 5G network architecture , 2014, IEEE Communications Magazine.

[6]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[7]  H. Vincent Poor,et al.  On the Sum Rate of MIMO-NOMA and MIMO-OMA Systems , 2017, IEEE Wireless Communications Letters.

[8]  Xianda Zhang,et al.  Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.

[9]  Mohamed-Slim Alouini,et al.  Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[10]  Günes Karabulut-Kurt,et al.  Nonorthogonal Multiple Access for 5G and Beyond , 2018, Wirel. Commun. Mob. Comput..

[11]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[12]  Leandro N. Balico,et al.  Localization Prediction in Vehicular Ad Hoc Networks , 2018, IEEE Communications Surveys & Tutorials.

[13]  Garima Chopra,et al.  A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions , 2017, J. Netw. Comput. Appl..

[14]  Wen-Jun Lu,et al.  A Closed-Form and Stochastic Wall Insertion Loss Model for Dense Small Cell Networks , 2018, IEEE Access.

[15]  H. Vincent Poor,et al.  Cooperative Non-orthogonal Multiple Access With Simultaneous Wireless Information and Power Transfer , 2015, IEEE Journal on Selected Areas in Communications.

[16]  Walaa Hamouda,et al.  Physical Layer Security in Ultra-Dense Networks , 2017, IEEE Wireless Communications Letters.

[17]  H. Vincent Poor,et al.  Random Beamforming in Millimeter-Wave NOMA Networks , 2016, IEEE Access.

[18]  Xuemin Shen,et al.  Cloud assisted HetNets toward 5G wireless networks , 2015, IEEE Communications Magazine.

[19]  Garima Chopra,et al.  TPA: Prediction of Spoofing Attack Using Thermal Pattern Analysis in Ultra Dense Network for High Speed Handover Scenario , 2018, IEEE Access.

[20]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[21]  Nhu Tri Do,et al.  A BNBF User Selection Scheme for NOMA-Based Cooperative Relaying Systems With SWIPT , 2017, IEEE Communications Letters.

[22]  Victor C. M. Leung,et al.  Coverage Analysis of Max-SIR Cell Association in HetNets Under Nakagami Fading , 2018, IEEE Transactions on Vehicular Technology.

[23]  Hui Tian,et al.  Social-aware energy harvesting device-to-device communications in 5G networks , 2016, IEEE Wireless Communications.

[24]  Garima Chopra,et al.  Possible Security Attack Modeling in Ultradense Networks Using High-Speed Handover Management , 2018, IEEE Transactions on Vehicular Technology.

[25]  Ming Xiao,et al.  A Survey of Advanced Techniques for Spectrum Sharing in 5G Networks , 2017, IEEE Wireless Communications.

[26]  Qiang Li,et al.  Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.

[27]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[28]  Ming Xiao,et al.  Performance Analysis and Optimization in Downlink NOMA Systems With Cooperative Full-Duplex Relaying , 2017, IEEE Journal on Selected Areas in Communications.

[29]  Amr M. Youssef,et al.  Ultra-Dense Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[30]  Mohamed-Slim Alouini,et al.  Non-Orthogonal Multiple Access for Large-Scale 5G Networks: Interference Aware Design , 2017, IEEE Access.

[31]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[32]  H. Vincent Poor,et al.  Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.

[33]  Tharek Abd Rahman,et al.  Path loss and RMS delay spread model for 5G channel at 19 GHz , 2017, 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA).

[34]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[35]  Sanjeev Jain,et al.  Novel Beamforming Approach for Secure Communication in UDN to Maximize Secrecy Rate and Fairness Security Assessment , 2019, IEEE Internet of Things Journal.

[36]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[37]  Mohamad Yassin,et al.  A survey of positioning techniques and location based services in wireless networks , 2015, 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES).