Secrecy-Enhancing Design for Cooperative Downlink and Uplink NOMA With an Untrusted Relay

We investigate a secrecy-enhancing design for cooperative downlink and uplink non-orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the NOMA principle to have downlink and uplink transmissions with a near user and a far user, and the communications between the source and the far user are aided by an untrusted relay. To minimize information leakage at the untrusted relay and achieve secure NOMA communications, adaptive downlink and uplink cooperative jamming schemes are proposed, where the far user in downlink and the near user in uplink adaptively emit a jamming signal to the untrusted relay to impair its eavesdropping capability. Both downlink and uplink jamming power are optimized to fully exploit the benefits of the proposed schemes for security enhancement. Then, for each scheme, we quantify the secrecy performance by deriving the ergodic secrecy sum rate lower bound and its scaling law. Finally, computer simulation is used to demonstrate the effectiveness of the proposed adaptive downlink and uplink cooperative jamming schemes and verify the accuracy of the derived analytical results.

[1]  Linglong Dai,et al.  On the Performance of NOMA-Based Cooperative Relaying Systems Over Rician Fading Channels , 2017, IEEE Transactions on Vehicular Technology.

[2]  Miao Pan,et al.  Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation , 2018, IEEE Journal on Selected Areas in Communications.

[3]  Hai Jiang,et al.  Relay Selection Schemes and Performance Analysis Approximations for Two-Way Networks , 2013, IEEE Transactions on Communications.

[4]  Yueming Cai,et al.  Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.

[5]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[6]  Tho Le-Ngoc,et al.  Rate Maximization Based Power Allocation and Relay Selection With IRI Consideration for Two-Path AF Relaying , 2015, IEEE Transactions on Wireless Communications.

[7]  Zhiguo Ding,et al.  Exploiting Adaptive Jamming in Secure Cooperative NOMA with an Untrusted Relay , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[8]  H. Vincent Poor,et al.  On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.

[9]  Zhiguo Ding,et al.  Design of Cooperative Non-Orthogonal Multicast Cognitive Multiple Access for 5G Systems: User Scheduling and Performance Analysis , 2017, IEEE Transactions on Communications.

[10]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[11]  Jaesung Lim,et al.  Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays , 2015, IEEE Transactions on Wireless Communications.

[12]  Yueming Cai,et al.  Secure Transmission in Non-Orthogonal Multiple Access Networks With an Untrusted Relay , 2019, IEEE Wireless Communications Letters.

[13]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[14]  Yinghui Ye,et al.  Performance Analysis of Relay Selection in Cooperative NOMA Networks , 2019, IEEE Communications Letters.

[15]  Zhiguo Ding,et al.  Secrecy Performance of Untrusted Relay Systems With a Full-Duplex Jamming Destination , 2018, IEEE Transactions on Vehicular Technology.

[16]  Zhiguo Ding,et al.  Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.

[17]  Geoffrey Ye Li,et al.  Modulation and Multiple Access for 5G Networks , 2017, IEEE Communications Surveys & Tutorials.

[18]  Jinhong Yuan,et al.  Beamforming Design and Power Allocation for Secure Transmission With NOMA , 2018, IEEE Transactions on Wireless Communications.

[19]  Octavia A. Dobre,et al.  Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[20]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[21]  Hai Jiang,et al.  Cognitive Non-Orthogonal Multiple Access with Cooperative Relaying: A New Wireless Frontier for 5G Spectrum Sharing , 2018, IEEE Communications Magazine.

[22]  Takuro Sato,et al.  Capacity Analysis of NOMA With mmWave Massive MIMO Systems , 2017, IEEE Journal on Selected Areas in Communications.

[23]  Robert Schober,et al.  Diversity Analysis of Multi-User Multi-Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[24]  Shuangfeng Han,et al.  Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.

[25]  Mohamed-Slim Alouini,et al.  Secrecy Analysis for Cooperative NOMA Networks With Multi-Antenna Full-Duplex Relay , 2019, IEEE Transactions on Communications.

[26]  Yindi Jing,et al.  Channel Training Design in Amplify-and-Forward MIMO Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[27]  Kyung Sup Kwak,et al.  Coordinated Uplink Transmission for Cooperative NOMA Systems , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[28]  Pingzhi Fan,et al.  Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions , 2016, IEEE Transactions on Vehicular Technology.

[29]  Hai Jiang,et al.  Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper , 2017, IEEE Transactions on Wireless Communications.

[30]  Chenxi Liu,et al.  Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access , 2019, IEEE Transactions on Information Forensics and Security.

[31]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.

[32]  Caijun Zhong,et al.  Non-Orthogonal Multiple Access With Cooperative Full-Duplex Relaying , 2016, IEEE Communications Letters.

[33]  Xinwei Yu,et al.  ML-Based Channel Estimations for Non-Regenerative Relay Networks with Multiple Transmit and Receive Antennas , 2012, IEEE Journal on Selected Areas in Communications.

[34]  Mohamed-Slim Alouini,et al.  Secrecy Outage of Max–Min TAS Scheme in MIMO-NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[35]  Yue Chen,et al.  Modeling and Analysis of Two-Way Relay Non-Orthogonal Multiple Access Systems , 2018, IEEE Transactions on Communications.

[36]  Fuhui Zhou,et al.  Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach , 2019, IEEE Transactions on Information Forensics and Security.

[37]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[38]  Mohamed-Slim Alouini,et al.  Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes , 2018, IEEE Transactions on Communications.

[39]  In-Ho Lee,et al.  Non-Orthogonal Multiple Access in Coordinated Direct and Relay Transmission , 2015, IEEE Communications Letters.

[40]  Soo Young Shin,et al.  Coordinated Direct and Relay Transmission Using Uplink NOMA , 2018, IEEE Wireless Communications Letters.

[41]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[42]  Kwok Hung Li,et al.  Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes , 2016, IEEE Transactions on Information Forensics and Security.

[43]  Mohamed-Slim Alouini,et al.  Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[44]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[45]  Xiaodong Wang,et al.  NOMA-Based Multi-Pair Two-Way Relay Networks With Rate Splitting and Group Decoding , 2017, IEEE Journal on Selected Areas in Communications.

[46]  H. Vincent Poor,et al.  Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios , 2018, IEEE Transactions on Information Forensics and Security.

[47]  Cheng-Xiang Wang,et al.  Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.

[48]  Zhijin Qin,et al.  Non-Orthogonal Multiple Access in Large-Scale Heterogeneous Networks , 2017, IEEE Journal on Selected Areas in Communications.

[49]  H. Vincent Poor,et al.  A General MIMO Framework for NOMA Downlink and Uplink Transmission Based on Signal Alignment , 2015, IEEE Transactions on Wireless Communications.

[50]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[51]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[52]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.