Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks

This paper investigates the secure transmission in hybrid automatic repeat request (HARQ)-assisted non-orthogonal multiple access (NOMA) networks, where a security-required (SR) user is paired with an opportunity-served (OS) user to perform NOMA. Different from the previous works where NOMA and HARQ are separately considered for secure transmissions, in this paper, both NOMA and HARQ are utilized to enhance the security of the SR user. We derive the closed-form expressions for connection outage probability (COP), secrecy outage probability (SOP), reliable and secure transmission probability (RSP) and effective secrecy throughput (EST) of the SR user in both maximum ratio combining (MRC) and selection combining (SC) schemes. The security-reliability trade-off (SRT) results of the SR user in both MRC and SC schemes are also provided. Analysis and simulation results show that HARQ improves secrecy performance in MRC and SC schemes in terms of RSP, especially in low transmit power region. Besides, since every retransmission is utilized in the MRC scheme, it strictly outperforms the SC scheme in terms of the SRT metric. However, the SC scheme has the potential to achieve higher EST than the MRC scheme by optimizing the transmit power or the power allocation factor. Significantly, the quality of service (QoS) of the OS user can be guaranteed by pairing an SR user who is far away from the transmitter and the secrecy performance of the SR user can be enhanced by pairing an OS user.

[1]  Yueming Cai,et al.  Secure Transmission in Non-Orthogonal Multiple Access Networks With an Untrusted Relay , 2019, IEEE Wireless Communications Letters.

[2]  Zhiguo Ding,et al.  On the Performance of NOMA With Hybrid ARQ , 2018, IEEE Transactions on Vehicular Technology.

[3]  George K. Karagiannidis,et al.  A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.

[4]  Qi Zhang,et al.  Simple Hybrid ARQ Schemes Based on Systematic Polar Codes for IoT Applications , 2017, IEEE Communications Letters.

[5]  H. Vincent Poor,et al.  Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.

[6]  Tao Zhang,et al.  Secure On-Off Transmission in mmWave Systems With Randomly Distributed Eavesdroppers , 2019, IEEE Access.

[7]  Jinho Choi,et al.  On HARQ-IR for Downlink NOMA Systems , 2016, IEEE Transactions on Communications.

[8]  Sarah J. Johnson,et al.  Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations , 2016, IEEE Communications Magazine.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Yueming Cai,et al.  Physical Layer Security in HARQ-Assisted Non-Orthogonal Multiple Access Networks , 2019, 2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT).

[11]  H. Vincent Poor,et al.  On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.

[12]  Xiangyun Zhou,et al.  Secure Transmission in Linear Multihop Relaying Networks , 2017, IEEE Transactions on Wireless Communications.

[13]  Kwok-Yan Lam,et al.  Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.

[14]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[15]  Ke Xiao,et al.  Opportunistic Multicast NOMA with Security Concerns in a 5G Massive MIMO System , 2018, IEEE Communications Magazine.

[16]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[17]  Pinyi Ren,et al.  Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis , 2019, IEEE Transactions on Information Forensics and Security.

[18]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[19]  Cheng-Xiang Wang,et al.  Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.

[20]  Shihao Yan,et al.  Secure Transmission to the Strong User in Non-Orthogonal Multiple Access , 2018, IEEE Communications Letters.

[21]  Jinho Choi On Multiple Access Using H-ARQ with SIC Techniques for Wireless Ad Hoc Networks , 2013, Wirel. Pers. Commun..

[22]  Yichen Wang,et al.  Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks , 2017, IEEE Access.

[23]  Zhiguo Ding,et al.  Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.

[24]  Yangyang Zhang,et al.  NOMA-based multiple-antenna and multiple-relay networks over Nakagami-m fading channels with imperfect CSI and SIC error , 2018, IET Commun..

[25]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[26]  Yueming Cai,et al.  On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ , 2014, IEEE Communications Letters.

[27]  Shi Jin,et al.  On the Secure Spectral-Energy Efficiency Tradeoff in Random Cognitive Radio Networks , 2016, IEEE Journal on Selected Areas in Communications.

[28]  Yueming Cai,et al.  Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.

[29]  Sarah J. Johnson,et al.  On the Fundamental Limits of Random Non-Orthogonal Multiple Access in Cellular Massive IoT , 2017, IEEE Journal on Selected Areas in Communications.

[30]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[31]  Yongming Huang,et al.  Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks , 2019, IEEE Transactions on Information Forensics and Security.

[32]  Mohamed-Slim Alouini,et al.  Cooperative HARQ-Assisted NOMA Scheme in Large-Scale D2D Networks , 2017, IEEE Transactions on Communications.

[33]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[34]  Pierre Duhamel,et al.  Rate Adaptation for Incremental Redundancy Secure HARQ , 2016, IEEE Transactions on Communications.

[35]  Mohamed-Slim Alouini,et al.  Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2012, IEEE Transactions on Wireless Communications.

[36]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[37]  Mohamed-Slim Alouini,et al.  Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[38]  Pinyi Ren,et al.  Secure ARQ Protocol for Wireless Communications: Performance Analysis and Packet Coding Design , 2018, IEEE Transactions on Vehicular Technology.

[39]  Branka Vucetic,et al.  Timely Status Update in Internet of Things Monitoring Systems: An Age-Energy Tradeoff , 2019, IEEE Internet of Things Journal.

[40]  Leszek Szczecinski,et al.  Rate Adaptation for Secure HARQ Protocols , 2018, IEEE Transactions on Information Forensics and Security.

[41]  Chao Zhai,et al.  Non-orthogonal multiple access relaying with truncated ARQ , 2017, IET Commun..

[42]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[43]  Lajos Hanzo,et al.  Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.