Secrecy Rate Analysis of Satellite Communications With Frequency Domain NOMA

Due to the inherent broadcasting nature and broad coverage of satellite, satellite communications are well known to be vulnerable to security threats. Since the distance difference from satellite to terrestrial terminals is negligible, the channels of different users are similar, posing a challenge of achieving secure satellite downlink transmission in the presence of eavesdroppers (Eves). In this paper, we consider satellite communications in areas without terrestrial networks converge, and investigate the physical layer security in the satellite downlink. To achieve a positive secrecy rate, a frequency domain non-orthogonal multiple access (FD-NOMA) scheme and an according multiuser cooperative scheme are proposed. Particularly, by adopting the FD-NOMA, the spectrum efficiency can be improved at the cost of raising inter-user interference (IUI), and the inherent IUI is elegantly leveraged to suppress the signal-to-interference-plus-noise ratio (SINR) of Eves while the intended SINR of legitimate users can be enhanced by the cooperative scheme. The secrecy rate of satellite communications with FD-NOMA is analyzed, and a tight lower bound is derived, which is validated via numerical results. In addition, the secrecy rate is found to be affected by the level of spectral overlapping, and there exists an optimal spectral overlapping factor (SOF) which can maximize the secrecy rate.

[1]  Jun Du,et al.  Secure Satellite-Terrestrial Transmission Over Incumbent Terrestrial Networks via Cooperative Beamforming , 2018, IEEE Journal on Selected Areas in Communications.

[2]  H. Vincent Poor,et al.  On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.

[3]  Hsiao-Hwa Chen,et al.  Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach Based on Ordered Eigenvalues of Wishart Matrices , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Kwok Hung Li,et al.  Generalized Relay Selection for Improved Security in Cooperative DF Relay Networks , 2016, IEEE Wireless Communications Letters.

[5]  Ying Li,et al.  Capacity-Achieving MIMO-NOMA: Iterative LMMSE Detection , 2019, IEEE Transactions on Signal Processing.

[6]  Zhiguo Ding,et al.  Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.

[7]  George C. Alexandropoulos,et al.  Secrecy Outage Analysis Over Correlated Composite Nakagami- $m$ /Gamma Fading Channels , 2017, IEEE Communications Letters.

[8]  Zhen Liu,et al.  Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.

[9]  Wei-Ping Zhu,et al.  Secure Transmission in Cognitive Satellite Terrestrial Networks , 2016, IEEE Journal on Selected Areas in Communications.

[10]  Fengchao Zhu,et al.  Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming , 2016, IEEE Transactions on Vehicular Technology.

[11]  Xiaoming Xu,et al.  Resource Allocations for Secure Cognitive Satellite-Terrestrial Networks , 2017, IEEE Wireless Communications Letters.

[12]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[13]  Minglu Li,et al.  Characterizing Urban Vehicle-to-Vehicle Communications for Reliable Safety Applications , 2020, IEEE Transactions on Intelligent Transportation Systems.

[14]  Andrew Thangaraj,et al.  Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.

[15]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[16]  Ana Isabel Pérez Neira,et al.  Spectrum sharing backhaul satellite-terrestrial systems via analog beamforming , 2018 .

[17]  Louis J. Ippolito,et al.  Satellite communications systems engineering : atmospheric effects, satellite link design, and system performance , 2008 .

[18]  Juan M. Romero-Jerez,et al.  Asymptotically Exact Approximations for the Symmetric Difference of Generalized Marcum $Q$-Functions , 2015, IEEE Transactions on Vehicular Technology.

[19]  Weihua Zhuang,et al.  Software Defined Space-Air-Ground Integrated Vehicular Networks: Challenges and Solutions , 2017, IEEE Communications Magazine.

[20]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[21]  Wei Zhang,et al.  Artificial-Noise-Aided Optimal Beamforming in Layered Physical Layer Security , 2019, IEEE Communications Letters.

[22]  Rohit Budhiraja,et al.  SER Analysis of MMSE Combining For MIMO FBMC-OQAM Systems With Imperfect CSI , 2019, IEEE Communications Letters.

[23]  Chenxi Liu,et al.  Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access , 2019, IEEE Transactions on Information Forensics and Security.

[24]  Wei-Ping Zhu,et al.  Joint Beamforming for Secure Communication in Cognitive Satellite Terrestrial Networks , 2018, IEEE Journal on Selected Areas in Communications.

[25]  Fuhui Zhou,et al.  Robust Chance-Constrained Secure Transmission for Cognitive Satellite–Terrestrial Networks , 2018, IEEE Transactions on Vehicular Technology.

[26]  Kwok Hung Li,et al.  Physical Layer Security in Heterogeneous Networks With Pilot Attack: A Stochastic Geometry Approach , 2018, IEEE Transactions on Communications.

[27]  Cihan Tepedelenlioglu,et al.  Multiple Device-to-Device Users Overlaying Cellular Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[28]  Jiaru Lin,et al.  Optimal Secure Multicast With Simultaneous Wireless Information and Power Transfer in Presence of Multiparty Eavesdropper Collusion , 2016, IEEE Transactions on Vehicular Technology.

[29]  Igor Bisio,et al.  Satellite Communications Supporting Internet of Remote Things , 2016, IEEE Internet of Things Journal.

[30]  Nei Kato,et al.  Space-Air-Ground Integrated Network: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[31]  Xuemin Shen,et al.  An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security , 2018, IEEE Journal on Selected Areas in Communications.

[32]  Athanasios G. Kanatas,et al.  Radio Wave Propagation and Channel Modeling for Earth–Space Systems , 2016 .

[33]  Yongming Huang,et al.  Robust Secure Beamforming for 5G Cellular Networks Coexisting With Satellite Networks , 2018, IEEE Journal on Selected Areas in Communications.

[34]  Lajos Hanzo,et al.  Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection , 2017, IEEE Transactions on Vehicular Technology.

[35]  Feng Lyu,et al.  Space/Aerial-Assisted Computing Offloading for IoT Applications: A Learning-Based Approach , 2019, IEEE Journal on Selected Areas in Communications.

[36]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[37]  Xiaodong Lin,et al.  Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.

[38]  Naitong Zhang,et al.  Broadband Hybrid Satellite-Terrestrial Communication Systems Based on Cognitive Radio toward 5G , 2016, IEEE Wireless Communications.

[39]  Hui Gao,et al.  Echo State Network for Fast Channel Prediction in Ricean Fading Scenarios , 2017, IEEE Communications Letters.