A Game-Theoretical Modelling Approach for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System

This paper investigates the physical layer security of a downlink non-orthogonal multiple access (NOMA) communication system, wherein a base station is communicating with two paired active users in the presence of an eavesdropper and multiple idle nodes (helpers). In order to enhance the secrecy performance, a two-phase harvest-and-jam null-steering jamming technique is deployed. In the first phase, the base station provides the helper with power in addition to active users and eavesdropper’s information via simultaneous wireless information and power transfer technique. The helpers exploit the harvested energy and the information received in the first phase to build a null-steering beamformer and jam the eavesdropper, during the information exchange between the base station and the legitimate users in the second phase. A game theory is introduced to the proposed scheme, and the base station-helpers interactions are modeled as a Stackelberg game, where the helpers play the leader role and the base station is the follower. The utility functions of both the leader and follower are formed, and the Stackelberg equilibrium is reached by means of the backward induction technique. The proposed scheme demonstrates better secrecy performance when compared with the artificial noise-aided secure NOMA system.

[1]  Zhiguo Ding,et al.  Nonorthogonal Multiple Access for 5G , 2018, 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management.

[2]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[3]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[4]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[5]  Miao Pan,et al.  Joint Sensing Duration Adaptation, User Matching, and Power Allocation for Cognitive OFDM-NOMA Systems , 2018, IEEE Transactions on Wireless Communications.

[6]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[7]  Arumugam Nallanathan,et al.  Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game , 2016, IEEE Communications Letters.

[8]  Qi Zhang,et al.  Price-Based Power Allocation for Non-Orthogonal Multiple Access Systems , 2016, IEEE Wireless Communications Letters.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Xianbin Wang,et al.  Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication , 2018, IEEE Transactions on Vehicular Technology.

[11]  Chee Yen Leow,et al.  A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case , 2018, IEEE Access.

[12]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.

[13]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[14]  Zhiguo Ding,et al.  Performance Analysis and Optimization for SWIPT Wireless Sensor Networks , 2017, IEEE Transactions on Communications.

[15]  Anass Benjebbour,et al.  System-level performance evaluation of downlink non-orthogonal multiple access (NOMA) , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[16]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[17]  Adnan Yazici,et al.  Secure Wireless Powered and Cooperative Jamming D2D Communications , 2018, IEEE Transactions on Green Communications and Networking.

[18]  Li Xu,et al.  Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme , 2018, IEEE Transactions on Information Forensics and Security.

[19]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[20]  Giuseppe Caire,et al.  Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems , 2018, IEEE Transactions on Information Forensics and Security.

[21]  Xiuzhen Cheng,et al.  Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.

[22]  Theofilos Chrysikos,et al.  Wireless Information-Theoretic Security in MANETs , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[23]  Adnan Yazici,et al.  Game theory based secure wireless powered D2D communications with cooperative jamming , 2017, 2017 Wireless Days.

[24]  Chen He,et al.  Optimal Price-Based Power Control Algorithm in Cognitive Radio Networks , 2014, IEEE Transactions on Wireless Communications.

[25]  Kai-Kit Wong,et al.  To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.

[26]  Huiling Jiang,et al.  System-level performance of downlink NOMA combined with SU-MIMO for future LTE enhancements , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[27]  Chee Yen Leow,et al.  Full-Duplex Cooperative Non-Orthogonal Multiple Access With Beamforming and Energy Harvesting , 2018, IEEE Access.

[28]  Benjamin Friedlander,et al.  Performance analysis of a null-steering algorithm based on direction-of-arrival estimation , 1989, IEEE Trans. Acoust. Speech Signal Process..

[29]  Mehul Motani,et al.  Price-Based Resource Allocation for Spectrum-Sharing Femtocell Networks: A Stackelberg Game Approach , 2012, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[30]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[31]  Drew Fudenberg,et al.  Game theory (3. pr.) , 1991 .

[32]  Yue Gao,et al.  Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[33]  Erik G. Larsson,et al.  Competition Versus Cooperation on the MISO Interference Channel , 2008, IEEE Journal on Selected Areas in Communications.