scholarly journals Impact of Antenna Selection on Physical-Layer Security of NOMA Networks

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Dan Deng ◽  
Chao Li ◽  
Lisheng Fan ◽  
Xin Liu ◽  
Fasheng Zhou

This paper studies the impacts of antenna selection algorithms in decode-and-forward (DF) cooperative nonorthogonal multiple access (NOMA) networks, where the secure information from the relay can be overheard by an eavesdropper in the networks. In order to ensure the secure transmission, an optimal antenna selection algorithm is proposed to choose one best relay’s antenna to assist the secure transmission. We study the impact of antenna selection on the system secure communication through deriving the analytical expression of the secrecy outage probability along with the asymptotic expression in the high regime of signal-to-noise ratio (SNR) and main-to-eavesdropper ratio (MER). From the analytical and asymptotic expressions, we find that the system secure performance is highly dependent on the system parameters such as the number of antennas at the relay, SNR, and MER. In particular, the secrecy diversity order of the system is equal to the antenna number, when the interference from the second user is limited.

2021 ◽  
Author(s):  
Shu Xu ◽  
Chen Liu ◽  
Hong Wang ◽  
Mujun Qian ◽  
Wenfeng Sun

Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay-antenna selection (RAS) to enhance physical-layer security (PLS) of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency (RF) chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining (MRC) or selection combining (SC) to process the received signals. Under the condition that the channel state information (CSI) of the eavesdropping channel is available or unavailable, two e↵ective relay-antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay-antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access (OMA) scheme obviously.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5692
Author(s):  
Van-Duc Phan ◽  
Tan N. Nguyen ◽  
Anh Vu Le ◽  
Miroslav Voznak

In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system. We consider a system model including one transmitter that tries to transmit information to one receiver under the help of multiple relay users and in the presence of one eavesdropper that attempts to overhear the confidential information. More specifically, to investigate the secrecy performance, we derive closed-form expressions of outage probability (OP) and secrecy outage probability for dynamic power splitting-based relaying (DPSBR) and static power splitting-based relaying (SPSBR) schemes. Moreover, the lower bound of secrecy outage probability is obtained when the source’s transmit power goes to infinity. The Monte Carlo simulations are given to corroborate the correctness of our mathematical analysis. It is observed from simulation results that the proposed DPSBR scheme outperforms the SPSBR-based schemes in terms of OP and SOP under the impact of different parameters on system performance.


2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Zhongwu Xiang ◽  
Weiwei Yang ◽  
Yueming Cai ◽  
Yunpeng Cheng ◽  
Heng Wu ◽  
...  

This paper exploits nonorthogonal multiple access (NOMA) to enhance the uplink secure transmission in Internet of Things (IoT) networks. Considering the different intercept ability of eavesdroppers (Eve), secrecy performances of both strong and weak Eve wiretap scenarios have been investigated. In strong Eve wiretap scenario (SWS), Eve is assumed to be powerful enough to decode message without interference and, in weak Eve wiretap scenario (WWS), Eve is assumed to have significant demodulation capability constraint. The new closed-form expressions of joint connection outage probability (JCOP), joint secrecy outage probability (JSOP), and sum secrecy throughput (SST) are derived in these two scenarios to indicate the impact of parameters, i.e., transmit power, codeword rate, and the placement of devices, on security performance. In order to demonstrate the superiority of NOMA, we also investigate the secrecy performance of orthogonal multiple access (OMA) system as a benchmark. Analysis results show that the performance in WWS is always better than that in SWS and, in low signal-to-noise ratio (SNR) or high codeword rate region, the performances of these two scenarios are close. In addition, we present the condition that NOMA outperforms OMA in terms of SST. Moreover, the placements of devices are significant to the SST performance of NOMA system. The suboptimal device placement scheme has been designed to maximize SST. Analysis results demonstrate that when Eve is far away from legal users, the suboptimal results tend to optimal.


2021 ◽  
Author(s):  
Nesrine Zaghdoud ◽  
Adel Ben Mnaouer ◽  
Hatem Boujemaa ◽  
Farid Touati

Abstract Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Access (NOMA) and full-duplex techniques has been overwhelming, still analyzing the security aspects of such systems under different scenarios and settings is an important concern that needs further exploration. In particular, when considering fading in wiretap channels and scenarios, achieving secrecy has posed many challenges. In this context, we propose to study the physical layer security (PLS) of cooperative NOMA (C-NOMA) system using the general fading distribution κ - μ. This distribution facilitates mainly the effect of light-of-sight as well as multipath fading. It also includes multiple distributions as special cases like: Rayleigh, Rice, Nakagami-m which help to understand the comportment of C-NOMA systems under different fading parameters. The use of Half-Duplex and Full-Duplex communication is also investigated for both Amplify-and-forward (AF) and Decode-and-Forward (DF) relaying protocols. To characterize the secrecy performance of the proposed C-NOMA systems, closed form expressions of the Secrecy Outage Probability (SOP) and the Strictly Positive Secrcey Capacity (SPSC) metrics for the strong and weak users are given for high signal-to-noise ratio (SNR) due to the intractable nature of the exact expressions. Based on the analytical analysis, numerical and simulation results are given under different network parameters.


2021 ◽  
Author(s):  
Wided Hadj Alouane

Abstract In this paper, we investigate physical layer security of multi-relay non-orthogonal multiple access (NOMA) networks with partial relay selection considering decode-and-forward (DF) and amplify-and-forward (AF) protocols. We propose a partial relay scheme aiming to select the best relay based on the highest signal-to-noise-ratio (SNR) of the first link. We derive new exact and asymptotic expressions for strictly positive secrecy capacity (SPSC) and secrecy outage probability (SOP) considering Rayleigh fading channels. Numerical results demonstrate that AF and DF provide almost a similar secrecy performance. Moreover, they prove that partial relay selection improves SPSC and reduces SOP when the relay-cluster is closer to the legitimate receiver.


Entropy ◽  
2019 ◽  
Vol 21 (4) ◽  
pp. 427 ◽  
Author(s):  
Yi Song ◽  
Weiwei Yang ◽  
Zhongwu Xiang ◽  
Yiliang Liu ◽  
Yueming Cai

Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link blockages are taken into account. For the secure transmission in the presence of spatially random eavesdroppers, an adaptive transmission scheme is adopted, for which sector secrecy guard zone and artificial noise (AN) are employed to enhance secrecy performance. When there exists no eavesdroppers within the sector secrecy guard zone, the transmitter only transmits information-bearing signal, and, conversely, AN along with information-bearing signal are transmitted. The closed-form expressions for secrecy outage probability (SOP), connection outage probability (COP) and secrecy throughput are derived under stochastic geometry. Then, we evaluate the effect of the sector secrecy guard zone and AN on the secrecy performance. Our results reveal that the application of the sector secrecy guard zone and AN can significantly improve the security of the system, and blockages also can be utilized to improve secrecy performance. An easy choice of transmit power and power allocation factor is provided for achieving higher secrecy throughput. Furthermore, increasing the density of eavesdroppers not always deteriorates the secrecy performance due to the use of the sector secrecy guard zone and AN.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Xiaoqi Wang ◽  
Hanwei Zhang ◽  
Zheng Hou

This paper explores the secrecy analysis of a multihop hybrid satellite-terrestrial relay network (HSTRN) with jamming, where one satellite source is aimed at communicating with destination users via multihop decode-and-forward (DF) terrestrial relays, in the existence of an eavesdropper. All the destination users are deployed randomly following a homogeneous Poisson point process (PPP) based on stochastic geometry. Each relay operates not only as a conventional DF relay to forward the received signal but also as a jammer to generate intentional interference to degrade the eavesdropper link, considering shadowed-Rician fading for legitimate link and wiretap link while Rayleigh fading for jamming link. To characterize the secrecy performance of the considered network, the accurate analytical expression for the secrecy outage probability (SOP) is derived. In order to reveal further insights on the achievable diversity order of the network, the asymptotic behavior of SOP expression at high signal-to-noise ratio (SNR) region is deduced. Moreover, the throughput of the system is discussed to characterize the secrecy performance. Finally, the theoretical results are validated through comparison with simulation results and show that (1) the secrecy performance of the considered network gets better with the decreasing of the hops and with the decreasing severity of the channel fading scenario, (2) the relay of the network operating as a jammer can provide better secrecy performance without extra network resources, and (3) small hops and high SNR can yield to high throughput of the system.


Frequenz ◽  
2015 ◽  
Vol 69 (7-8) ◽  
Author(s):  
Yajun Zhang ◽  
Tao Liang ◽  
Aiwei Sun

AbstractIn this paper, we propose a hybrid scheme called transmit antenna selection and receiver’s artificial noise (TAS–rAN) for security enhancement in multiple-input single-output (MISO) wiretap channels. In this scheme, by using TAS protocol, the transmitter selects a single antenna that maximizes the instantaneous signal-to-noise ratio (SNR) at the full-duplex receiver. While the transmitter uses this antenna to transmit secrecy data, the full-duplex receiver would send artificial noise (AN) to confuse the potential eavesdropper. For the proposed protocol, we consider Rayleigh fading channels with different parameters for the main channel and the eavesdropper’s channel, and derive new closed-form expressions for the exact secrecy outage probability and the asymptotic secrecy outage probability. We demonstrate that the proposed TAS–


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1160 ◽  
Author(s):  
Phu Tin ◽  
Pham Minh Nam ◽  
Tran Trung Duy ◽  
Phuong Tran ◽  
Miroslav Voznak

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.


Sign in / Sign up

Export Citation Format

Share Document