Robust Physical Layer Security for Power Domain Non-Orthogonal Multiple Access-Based HetNets and HUDNs: SIC Avoidance at Eavesdroppers

In this paper, we investigate the physical layer security in downlink of Power Domain Non-Orthogonal Multiple Access (PD-NOMA)-based heterogeneous cellular network (HetNet). In this paper, we assume two categories of users are available: 1) Trusted users and 2) untrusted users (eavesdroppers) at which transparency of users is not clear for the BSs, i.e., they are potential eavesdroppers. Our aim is to maximize the sum secrecy rate of the network. To this end, we formulate joint subcarrier and power allocation optimization problems to increase sum secrecy rate. Moreover, we propose a novel scheme at which the eavesdroppers are prevented from doing Successive Interference Cancellation (SIC), while legitimate users are able to do it. In practical systems, perfectly availability of all eavesdroppers’ Channel State Information (CSI) at legitimate transmitters are impractical. Also CSIs of legitimate users may be also imperfect due to the error of channel estimation. Hence, we study two cases of CSI availability: 1) Perfect CSI of nodes (legitimate users and eavesdroppers) are available at the BSs and 2) imperfect CSI of nodes are available at the BSs. Since the proposed optimization problems are non-convex, we adopt the well-known iterative algorithm called Alternative Search Method (ASM). In this algorithm, the optimization problems are converted to two subproblems, power allocation and subcarrier allocation. We solve the power allocation problem by the Successive Convex Approximation approach and solve the subcarrier allocation subproblem, by exploiting the Mesh Adaptive Direct Search algorithm (MADS). Moreover, in order to study the optimality gap of the proposed solution method, we apply the monotonic optimization method. Moreover, we evaluate the proposed scheme for secure massive connectivity in Heterogeneous Ultra Dense Networks (HUDNs). Furthermore, we investigate multiple antennas base stations scenario in this literature. Finally, we numerically compare the proposed scheme with the conventional case at which the eavesdroppers are able to apply SIC. Numerical results highlight that the proposed scheme significantly improves the sum secrecy rate compared with the conventional case.

[1]  Pingzhi Fan,et al.  On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users , 2014, IEEE Signal Processing Letters.

[2]  Wei Yu,et al.  Massive Connectivity With Massive MIMO—Part I: Device Activity Detection and Channel Estimation , 2017, IEEE Transactions on Signal Processing.

[3]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[4]  Derrick Wing Kwan Ng,et al.  Optimal Joint Power and Subcarrier Allocation for Full-Duplex Multicarrier Non-Orthogonal Multiple Access Systems , 2016, IEEE Transactions on Communications.

[5]  Kenichi Higuchi,et al.  Non-orthogonal access with SIC in cellular downlink for user fairness enhancement , 2011, 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS).

[6]  Tho Le-Ngoc,et al.  Joint Subchannel Assignment and Power Allocation for OFDMA Femtocell Networks , 2014, IEEE Transactions on Wireless Communications.

[7]  Ioannis Krikidis,et al.  Fairness for Non-Orthogonal Multiple Access in 5G Systems , 2015, IEEE Signal Processing Letters.

[8]  H. Vincent Poor,et al.  Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.

[9]  Luc Vandendorpe,et al.  Iterative Resource Allocation for Maximizing Weighted Sum Min-Rate in Downlink Cellular OFDMA Systems , 2011, IEEE Trans. Signal Process..

[10]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[11]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[12]  Shaodan Ma,et al.  Outage Performance Analysis for Wireless Non-Orthogonal Multiple Access Systems , 2018, IEEE Access.

[13]  J. G. Andrews,et al.  Interference cancellation for cellular systems: a contemporary overview , 2005, IEEE Wireless Communications.

[14]  Paeiz Azmi,et al.  Optimal and Fair Energy Efficient Resource Allocation for Energy Harvesting-Enabled-PD-NOMA-Based HetNets , 2018, IEEE Transactions on Wireless Communications.

[15]  Tho Le-Ngoc,et al.  Limited-Feedback Resource Allocation in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Vehicular Technology.

[16]  Xiang-Gen Xia,et al.  Joint Power Allocation and Beamforming for Non-Orthogonal Multiple Access (NOMA) in 5G Millimeter Wave Communications , 2017, IEEE Transactions on Wireless Communications.

[17]  Tiejun Lv,et al.  Millimeter-Wave NOMA Transmission in Cellular M2M Communications for Internet of Things , 2018, IEEE Internet of Things Journal.

[18]  Anass Benjebbour,et al.  System-level performance evaluation of downlink non-orthogonal multiple access (NOMA) , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[19]  Di Yuan,et al.  Joint Optimization of Power and Channel Allocation with Non-Orthogonal Multiple Access for 5G Cellular Systems , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[20]  Suvra Sekhar Das,et al.  Power allocation in OFDM based NOMA systems: A DC programming approach , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[21]  Jeffrey G. Andrews,et al.  Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.

[22]  Xiaofeng Tao,et al.  Joint Power and Sub-Channel Allocation for Secure Transmission in NOMA-Based mMTC Networks , 2019, IEEE Systems Journal.

[23]  Jinho Choi,et al.  Minimum Power Multicast Beamforming With Superposition Coding for Multiresolution Broadcast and Application to NOMA Systems , 2015, IEEE Transactions on Communications.

[24]  Halim Yanikomeroglu,et al.  Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.

[25]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[26]  Zhu Han,et al.  Resource allocation for non-orthogonal multiple access in heterogeneous networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[27]  Meng Wang,et al.  Secrecy Performance Analysis of Uplink NOMA in IoT Networks , 2018, 2018 IEEE/CIC International Conference on Communications in China (ICCC).

[28]  Gordon P. Wright,et al.  Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..

[29]  Bin Li,et al.  Energy-Efficient User Scheduling and Power Allocation for NOMA-Based Wireless Networks With Massive IoT Devices , 2018, IEEE Internet of Things Journal.

[30]  Aydin Behnad,et al.  Performance analysis of decode-and-forward dual-hop opportunistic relaying with power control , 2014, 2014 IEEE International Conference on Communications (ICC).

[31]  Aydin Behnad,et al.  Distance Statistics of the Communication Best Neighbor in a Poisson Field of Nodes , 2015, IEEE Transactions on Communications.

[32]  H. Vincent Poor,et al.  A General MIMO Framework for NOMA Downlink and Uplink Transmission Based on Signal Alignment , 2015, IEEE Transactions on Wireless Communications.

[33]  IMT Vision – Framework and overall objectives of the future development of IMT for 2020 and beyond M Series Mobile , radiodetermination , amateur and related satellite services , 2015 .

[34]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[35]  Muhammad Ali Imran,et al.  Uplink non-orthogonal multiple access for 5G wireless networks , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).

[36]  Emil Björnson,et al.  Globally Optimal Energy-Efficient Power Control and Receiver Design in Wireless Networks , 2016, IEEE Transactions on Signal Processing.

[37]  Yueming Cai,et al.  Physical layer security of non-orthogonal multiple access in cognitive radio networks , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[38]  Zhiguo Ding,et al.  Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.

[39]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.

[40]  Zhijin Qin,et al.  User Association and Resource Allocation in Unified Non-Orthogonal Multiple Access Enabled Heterogeneous Ultra Dense Networks , 2018, ArXiv.

[41]  Thomas M. Cover,et al.  Broadcast channels , 1972, IEEE Trans. Inf. Theory.

[42]  Taneli Riihonen,et al.  Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.

[43]  Ali Kuhestani,et al.  Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[44]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[45]  Ying Jun Zhang,et al.  Monotonic Optimization in Communication and Networking Systems , 2013, Found. Trends Netw..

[46]  Xiaodong Wang,et al.  Coordinated Scheduling and Power Allocation in Downlink Multicell OFDMA Networks , 2009, IEEE Transactions on Vehicular Technology.

[47]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[48]  Miao Pan,et al.  Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation , 2018, IEEE Journal on Selected Areas in Communications.

[49]  Shuangfeng Han,et al.  Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.

[50]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[51]  Muhammad Imran,et al.  Non-Orthogonal Multiple Access (NOMA) for cellular future radio access , 2017 .

[52]  Derrick Wing Kwan Ng,et al.  Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems , 2017, IEEE Transactions on Communications.

[53]  Carsten Bockelmann,et al.  Massive machine-type communications in 5g: physical and MAC-layer solutions , 2016, IEEE Communications Magazine.

[54]  Yung Yi,et al.  REFIM: A Practical Interference Management in Heterogeneous Wireless Access Networks , 2011, IEEE Journal on Selected Areas in Communications.

[55]  Zhu Han,et al.  Secrecy sum rate maximization in NOMA systems with wireless information and power transfer , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[56]  Ha H. Nguyen,et al.  Fast Global Optimal Power Allocation in Wireless Networks by Local D.C. Programming , 2012, IEEE Transactions on Wireless Communications.

[57]  H. Vincent Poor,et al.  On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.

[58]  Pablo Soldati Interference coordination and resource allocation in dense small cell networks , 2014, 2014 IEEE Global Communications Conference.

[59]  Muhammad R. A. Khandaker,et al.  Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks , 2018, IEEE Transactions on Wireless Communications.

[60]  Emil Björnson,et al.  A framework for globally optimal energy-efficient resource allocation in wireless networks , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[61]  Yonghui Song,et al.  A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things , 2018, IEEE Internet of Things Journal.

[62]  Pingzhi Fan,et al.  Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions , 2016, IEEE Transactions on Vehicular Technology.