scholarly journals Cooperative Relay Transmission under Physical Layer Security for Non-Orthogonal Networks

2020 ◽  
pp. 633-638
Author(s):  
Mohammed A. Salem ◽  
◽  
Azlan B. Abd. Aziz ◽  
Mohamad Y. Alias

In this paper, the secrecy performance for a downlink cooperative non-orthogonal multiple access (NOMA) communication system is studied under two cases. In the first case, the presence of an untrusted user is studied. While, the presence of an eavesdropper node is considered in the second case. The base station transmits superimposed information signals to the half-duplex two-way relay node. The relay amplifies-and-forwards the received signal towards the users. This paper studies the effectiveness of two factors on the secrecy performance in terms of secrecy capacity. these factors are the power allocated for each user, and the distance between the untrusted user and the cooperative relay node with respect to the strong user. Moreover, this paper proposes the shared jamming signal strategy in order to enhance the physical layer security of the cooperative NOMA in the presence of an eavesdropper node. Furthermore, simulations of the secrecy capacity are presented and compared with a conventional scheme based on null-steering jamming scheme. Based on the result the proposed technique outperforms the conventional technique in terms the of secrecy capacity.

Author(s):  
Mohammed Ahmed Salem ◽  
Azlan Bin Abd.Aziz ◽  
Hatem Fahd Al-Selwi ◽  
Mohamad Yusoff Bin Alias ◽  
Tan Kim Geok ◽  
...  

Cooperative non-orthogonal multi access communication is a promising paradigm for the future wireless networks because of its advantages in terms of energy efficiency, wider coverage and interference mitigating. In this paper, we study the secrecy performance of a downlink cooperative non-orthogonal multi access (NOMA) communication system under the presence of an eavesdropper node. Smart node selection based on feed forward neural networks (FFNN) is proposed in order to improve the physical layer security (PLS) of a cooperative NOMA network. The selected cooperative relay node is employed to enhance the channel capacity of the legal users, where the selected cooperative jammer is employed to degrade the capacity of the wiretapped channel. Simulations of the secrecy performance metric namely the secrecy capacity ($C_S$) are presented and compared with the conventional technique based on fuzzy logic node selection technique. Based on our simulations and discussions the proposed technique outperforms the existing technique in term the of secrecy performance.


Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

AbstractAiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a user-aided cooperative non-orthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting (EH) technology-based SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation (SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise (AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve the above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


Electronics ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 167 ◽  
Author(s):  
Thanh-Nam Tran ◽  
Miroslav Voznak

Non-Orthogonal Multiple Access (NOMA) is the key technology promised to be applied in next-generation networks in the near future. In this study, we propose a multi-points cooperative relay (MPCR) NOMA model instead of just using a relay as in previous studies. Based on the channel state information (CSI), the base station (BS) selects a closest user equipment (UE) and sends a superposed signal to this UE as a first relay node. We have assumed that there are N UEs in the network and the N-th UE, which is farthest from BS, has the poorest quality signal transmitted from the BS compared the other UEs. The N-th UE received a forwarded signal from N - 1 relaying nodes that are the UEs with better signal quality. At the i-th relaying node, it detects its own symbol by using successive interference cancellation (SIC) and will forward the superimposed signal to the next closest user, namely the ( i + 1 ) -th UE, and include an excess power which will use for energy harvesting (EH) intention at the next UE. By these, the farthest UE in network can be significantly improved. In addition, closed-form expressions of outage probability for users over both the Rayleigh and Nakagami-m fading channels are also presented. Analysis and simulation results performed by Matlab software, which are presented accurately and clearly, show that the effectiveness of our proposed model and this model will be consistent with the multi-access wireless network in the future.


2014 ◽  
Vol 62 (24) ◽  
pp. 6391-6401 ◽  
Author(s):  
Fengchao Zhu ◽  
Feifei Gao ◽  
Minli Yao ◽  
Hongxing Zou

Entropy ◽  
2019 ◽  
Vol 21 (10) ◽  
pp. 998 ◽  
Author(s):  
Sheng-Hong Lin ◽  
Rong-Rong Lu ◽  
Xian-Tao Fu ◽  
An-Ling Tong ◽  
Jin-Yuan Wang

In this paper, the physical layer security over the M-distributed fading channel is investigated. Initially, an exact expression of secrecy outage probability (SOP) is derived, which has an integral term. To get a closed-form expression, a lower bound of SOP is obtained. After that, the exact expression for the probability of strictly positive secrecy capacity (SPSC) is derived, which is in closed-form. Finally, an exact expression of ergodic secrecy capacity (ESC) is derived, which has two integral terms. To reduce its computational complexity, a closed-from expression for the lower bound of ESC is obtained. As special cases of M-distributed fading channels, the secure performance of the K, exponential, and Gamma-Gamma fading channels are also derived, respectively. Numerical results show that all theoretical results match well with Monte-Carlo simulation results. Specifically, when the average signal-to-noise ratio of main channel is larger than 40 dB, the relative errors for the lower bound of SOP, the probability of SPSC, and the lower bound of ESC are less than 1.936%, 6.753%, and 1.845%, respectively. This indicates that the derived theoretical expressions can be directly used to evaluate system performance without time-consuming simulations. Moreover, the derived results regarding parameters that influence the secrecy performance will enable system designers to quickly determine the optimal available parameter choices when facing different security risks.


Sign in / Sign up

Export Citation Format

Share Document