Exploiting Opportunistic Scheduling Schemes to Improve Physical-Layer Security in MU-MISO NOMA Systems

This paper studies opportunistic scheduling schemes to enhance the secrecy performance in multi-user multiple-input single-output (MU-MISO) non-orthogonal multiple access (NOMA) systems, in which a multiple antenna base station (BS) serves multiple single-antenna cell-center and cell-edge users in the presence of multiple single-antenna eavesdroppers. In order to improve the secrecy performance, we propose an opportunistic scheduling scheme, called the proposed antenna/users selection (PAUS) scheme. Additionally, we consider two practical eavesdropping scenarios, namely colluding and non-colluding eavesdroppers. We derive the exact closed-form expression for secrecy outage probability (SOP) and asymptotic SOP of the PAUS scheme under different eavesdropping scenarios. We provide the 2D golden section search-based algorithm to find the optimal values of the transmit power and power allocation coefficient that minimize the system secrecy outage performance. The developed analyses are verified by Monte Carlo simulations. The numerical results show that the PAUS scheme improves secrecy performances compared to the benchmark random antenna/users selection (RAUS) scheme. To provide further insights into the system secure performance, the effects of transmit signal-to-noise ratio (SNR), power allocation coefficient, the number of transmit antennas at the BS, number of cell-center and cell-edge users, and the eavesdropper placements are extensively evaluated and discussed.

[1]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[2]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[3]  Thomas M. Cover,et al.  Broadcast channels , 1972, IEEE Trans. Inf. Theory.

[4]  Yueming Cai,et al.  Physical layer security of non-orthogonal multiple access in cognitive radio networks , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[5]  W. Marsden I and J , 2012 .

[6]  Dongwoo Kim,et al.  Performance analysis with and without torch node in secure communications , 2015, 2015 International Conference on Advanced Technologies for Communications (ATC).

[7]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[8]  Xiaofan Li,et al.  Theoretical Analysis of the Dynamic Decode Ordering SIC Receiver for Uplink NOMA Systems , 2017, IEEE Communications Letters.

[9]  Daniel Benevides da Costa,et al.  An Efficient Relay–Destination Selection Scheme for Multiuser Multirelay Downlink Cooperative Networks , 2012, IEEE Transactions on Vehicular Technology.

[10]  Yen-Ching Chang,et al.  N-Dimension Golden Section Search: Its Variants and Limitations , 2009, 2009 2nd International Conference on Biomedical Engineering and Informatics.

[11]  Mohamed-Slim Alouini,et al.  Secrecy Outage of Max–Min TAS Scheme in MIMO-NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[12]  Zhi Chen,et al.  Joint Channel Estimation and Multiuser Detection for Uplink Grant-Free NOMA , 2018, IEEE Wireless Communications Letters.

[13]  Yunfei Chen,et al.  Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[14]  Honglin Zhao,et al.  Relay Selection for Improved Security in Cognitive Relay Networks With Jamming , 2017, IEEE Wireless Communications Letters.

[15]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[16]  D. Owen Handbook of Mathematical Functions with Formulas , 1965 .

[17]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[18]  Mohamed-Slim Alouini,et al.  Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[19]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[20]  George K. Karagiannidis,et al.  Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.

[21]  Shuangfeng Han,et al.  Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.

[22]  Beongku An,et al.  Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks , 2018, Wirel. Commun. Mob. Comput..

[23]  Daniel Benevides da Costa,et al.  A New Efficient Low-Complexity Scheme for Multi-Source Multi-Relay Cooperative Networks , 2011, IEEE Transactions on Vehicular Technology.

[24]  Aarnout Brombacher,et al.  Probability... , 2009, Qual. Reliab. Eng. Int..

[25]  Beongku An,et al.  Performance Analysis of Wireless Energy Harvesting Multihop Cluster-Based Networks Over Nakagami- ${m}$ Fading Channels , 2018, IEEE Access.

[26]  Yue Gao,et al.  Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[27]  Beongku An,et al.  Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks , 2017, Sensors.

[28]  Nguyen Van Toan,et al.  An energy efficient protocol based on fuzzy logic to extend network lifetime and increase transmission efficiency in wireless sensor networks , 2018, J. Intell. Fuzzy Syst..

[29]  Vincenzo Mancuso,et al.  A Survey on Opportunistic Scheduling in Wireless Communications , 2013, IEEE Communications Surveys & Tutorials.

[30]  Nhu Tri Do,et al.  A BNBF User Selection Scheme for NOMA-Based Cooperative Relaying Systems With SWIPT , 2017, IEEE Communications Letters.

[31]  Xin Liu,et al.  Efficient Antenna Selection and User Scheduling in 5G Massive MIMO-NOMA System , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[32]  H. Vincent Poor,et al.  Cooperative Non-orthogonal Multiple Access With Simultaneous Wireless Information and Power Transfer , 2015, IEEE Journal on Selected Areas in Communications.

[33]  Daniel Benevides da Costa,et al.  Improving the Performance of Cell-Edge Users in MISO-NOMA Systems Using TAS and SWIPT-Based Cooperative Transmissions , 2018, IEEE Transactions on Green Communications and Networking.

[34]  Theodoros A. Tsiftsis,et al.  Secure Users Oriented Downlink MISO NOMA , 2019, IEEE Journal of Selected Topics in Signal Processing.

[35]  Nguyen Van Toan,et al.  Incremental relaying networks with energy harvesting relay selection: Performance analysis , 2018, Trans. Emerg. Telecommun. Technol..

[36]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[37]  David Tse,et al.  Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.

[38]  Gennaro Fedele N-branch diversity reception of mary DPSK signals in slow and nonselective nakagami fading , 1996, Eur. Trans. Telecommun..

[39]  Sarah J. Johnson,et al.  Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations , 2016, IEEE Communications Magazine.

[40]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[41]  Xiaohong Jiang,et al.  On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.

[42]  Halim Yanikomeroglu,et al.  Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.

[43]  Georges Kaddoum,et al.  Secure Transmit Antenna Selection Protocol for MIMO NOMA Networks Over Nakagami-m Channels , 2018, IEEE Systems Journal.

[44]  H. Vincent Poor,et al.  Power Splitting-Based SWIPT With Decode-and-Forward Full-Duplex Relaying , 2016, IEEE Transactions on Wireless Communications.

[45]  George K. Karagiannidis,et al.  A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.

[46]  Derrick Wing Kwan Ng,et al.  NOMA in Downlink SDMA With Limited Feedback: Performance Analysis and Optimization , 2017, IEEE Journal on Selected Areas in Communications.

[47]  S. Leigh,et al.  Probability and Random Processes for Electrical Engineering , 1989 .

[48]  Nuwan S. Ferdinand,et al.  Secrecy Outage Performance of MIMO Wiretap Channels with Multiple Jamming Signals , 2016 .