Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers

We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with the aid of energy harvesting (EH) jammers. During each time frame, communication is divided into two phases. At the first phase, the base station (BS) transfers wireless power to EH receivers (EHRs). At the second phase, users perform uplink NOMA transmission to BS, while one of EHRs is selected as a friendly jammer that uses the energy harvested from the previous phase to emit the artificial noise for confusing the eavesdropper. In terms of the requirement of channel state information (CSI), we propose three friendly EH jammer selection schemes, namely random EH jammer selection (REJS) scheme without the requirement of any CSI, maximal EH jammer selection (MEJS) scheme with the CSI between BS and each EHR, and optimal EH jammer selection (OEJS) scheme where both the CSIs from BS to EHRs and from EHRs to the eavesdropper need to be known. Analytical closed-form expressions for the connection outage probability (COP), secrecy outage probability (SOP) and effective secrecy throughput (EST) are derived to evaluate the system performance achieved by the proposed schemes, respectively. Also, the asymptotic analysis is provided to gain further insights. The analytical and numerical results indicate that the proposed schemes can realize better secrecy performance than conventional scheme without an EH jammer. Both the secrecy diversity orders of the REJS and MEJS schemes are one while the OEJS scheme can achieve a full secrecy diversity order. Furthermore, owing to the impact of connection outage, the three schemes converge to the same EST floor with the increase of signal-to-noise ratio (SNR).

[1]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[2]  H. Vincent Poor,et al.  Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.

[3]  Mengyu Liu,et al.  Power Allocation for Secure SWIPT Systems With Wireless-Powered Cooperative Jamming , 2017, IEEE Communications Letters.

[4]  Furqan Jameel,et al.  A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.

[5]  Jinhong Yuan,et al.  Beamforming Design and Power Allocation for Secure Transmission With NOMA , 2018, IEEE Transactions on Wireless Communications.

[6]  Fengkui Gong,et al.  Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users , 2020, IEEE Transactions on Vehicular Technology.

[7]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[8]  Fuhui Zhou,et al.  Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach , 2019, IEEE Transactions on Information Forensics and Security.

[9]  Lajos Hanzo,et al.  Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.

[10]  Pingzhi Fan,et al.  Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions , 2016, IEEE Transactions on Vehicular Technology.

[11]  Huiming Wang,et al.  Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.

[12]  Fengkui Gong,et al.  Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping , 2020, IEEE Transactions on Information Forensics and Security.

[13]  Trung Q. Duong,et al.  Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.

[14]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[15]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[16]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[17]  Cheng-Xiang Wang,et al.  Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.

[18]  Zhiguo Ding,et al.  Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.

[19]  George K. Karagiannidis,et al.  A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.

[20]  Rui Zhang,et al.  Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.

[21]  Li Sun,et al.  Physical layer security with its applications in 5G networks: A review , 2017, China Communications.

[22]  Chenxi Liu,et al.  Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access , 2019, IEEE Transactions on Information Forensics and Security.

[23]  Abbas Jamalipour,et al.  Accumulate Then Transmit: Toward Secure Wireless Powered Communication Networks , 2018, IEEE Transactions on Vehicular Technology.

[24]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[25]  Mohamed-Slim Alouini,et al.  Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes , 2018, IEEE Transactions on Communications.

[26]  Shuangfeng Han,et al.  Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.

[27]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[28]  Bin Li,et al.  Secrecy Outage Probability Analysis of Friendly Jammer Selection Aided Multiuser Scheduling for Wireless Networks , 2019, IEEE Transactions on Communications.

[29]  Kun Lu,et al.  A Survey of Non-Orthogonal Multiple Access for 5G , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[30]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[31]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[32]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[33]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[34]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.