Advanced Search
Volume 45 Issue 4
Apr.  2023
Turn off MathJax
Article Contents
ZHANG Yanliang, TIAN Yuehua, LI Xingwang, HUANG Gaojian. Research on Physical Layer Security of Cooperative NOMA System Based on MF Protocol[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1211-1218. doi: 10.11999/JEIT220246
Citation: ZHANG Yanliang, TIAN Yuehua, LI Xingwang, HUANG Gaojian. Research on Physical Layer Security of Cooperative NOMA System Based on MF Protocol[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1211-1218. doi: 10.11999/JEIT220246

Research on Physical Layer Security of Cooperative NOMA System Based on MF Protocol

doi: 10.11999/JEIT220246
Funds:  The Science and Technology Project of Henan Province (212102210504, 212102210557), The Youth Fundation of the National Natural Science Foundation of China (62001320)
  • Received Date: 2022-03-09
  • Rev Recd Date: 2022-04-29
  • Available Online: 2022-06-28
  • Publish Date: 2023-04-10
  • For evaluating the problem of information security transmission in cooperative Non-Orthogonal Multiple Access (NOMA) system, a Physical Layer Secure (PLS) transmission scheme based on Modify-and-Forward (MF) relay is proposed. The scheme uses MF relay to modify the decoded information and then forward it, to avoid disclosing the legitimate information to the eavesdropping node. Firstly, the NOMA-MF system is modeled, and then Secrecy Outage Probability (SOP), Strictly Positive Security Capacity (SPSC) and Intercept Probability (IP) are deduced to measure the confidentiality and security of the system and Outage Probability (OP) to measure its reliability. In addition, the asymptotic performance of the system is derived, and the performance of NOMA-DF system and NOMA-MF system under Decode-and-Forward (DF) protocol is compared. The derivation and the simulation results show that: The confidentiality and security performance of NOMA-MF system has more advantages than that of NOMA-DF system; There is an optimal Signal-to-Noise Ratio (SNR) between OP and IP of NOMA-MF system to achieve the balance of system safety and reliability; There is an optimal power allocation parameter to achieve the lowest SOP and OP.
  • loading
  • [1]
    DAI Linglong, WANG Bichai, YUAN Yifei, et al. Non-orthogonal Multiple Access for 5G: Solutions, challenges, opportunities, and future research trends[J]. IEEE Communications Magazine, 2015, 53(9): 74–81. doi: 10.1109/MCOM.2015.7263349
    [2]
    DING Zhiguo, LIU Yuanwei, CHOI J, et al. Application of non-orthogonal multiple access in LTE and 5G networks[J]. IEEE Communications Magazine, 2017, 55(2): 185–191. doi: 10.1109/MCOM.2017.1500657CM
    [3]
    LV Lu, YE Qiang, DING Zhiguo, et al. Multi-antenna two-way relay based cooperative NOMA[J]. IEEE Transactions on Wireless Communications, 2020, 19(10): 6486–6503. doi: 10.1109/TWC.2020.3003615
    [4]
    DING Zhiguo, ADACHI F, and POOR H V. The application of MIMO to non-orthogonal multiple access[J]. IEEE Transactions on Wireless Communications, 2016, 15(1): 537–552. doi: 10.1109/TWC.2015.2475746
    [5]
    XU Yongjun, HU R Q, and LI Guoquan. Robust energy-efficient maximization for cognitive NOMA networks under channel uncertainties[J]. IEEE Internet of Things Journal, 2020, 7(9): 8318–8330. doi: 10.1109/JIOT.2020.2989464
    [6]
    徐勇军, 刘子腱, 李国权, 等. 基于NOMA的无线携能D2D通信鲁棒能效优化算法[J]. 电子与信息学报, 2021, 43(5): 1289–1297. doi: 10.11999/JEIT200175

    XU Yongjun, LIU Zijian, LI Guoquan, et al. Robust energy efficiency optimization algorithm for NOMA-based D2D communication with simultaneous wireless information and power transfer[J]. Journal of Electronics &Information Technology, 2021, 43(5): 1289–1297. doi: 10.11999/JEIT200175
    [7]
    KHAN R, KUMAR P, JAYAKODY D N K, et al. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions[J]. IEEE Communications Surveys & Tutorials, 2020, 22(1): 196–248. doi: 10.1109/COMST.2019.2933899
    [8]
    YANG Nan, WANG Lifeng, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015, 53(4): 20–27. doi: 10.1109/MCOM.2015.7081071
    [9]
    WYNER A D. The wire-tap channel[J]. The Bell System Technical Journal, 1975, 54(8): 1355–1387. doi: 10.1002/j.1538-7305.1975.tb02040.x
    [10]
    LIU Yuanwei, QIN Zhijin, ELKASHLAN M, et al. Enhancing the physical layer security of Non-orthogonal Multiple Access in large-scale networks[J]. IEEE Transactions on Wireless Communications, 2017, 16(3): 1656–1672. doi: 10.1109/TWC.2017.2650987
    [11]
    LI Xingwang, LI Jingjing, LIU Yuanwei, et al. Residual transceiver hardware impairments on cooperative NOMA networks[J]. IEEE Transactions on Wireless Communications, 2020, 19(1): 680–695. doi: 10.1109/TWC.2019.2947670
    [12]
    LI Xingwang, ZHENG Yike, ALSHEHRI M D, et al. Cognitive AmBC-NOMA IoV-MTS networks with IQI: Reliability and security analysis[J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(2): 2596–2607. doi: 10.1109/TITS.2021.3113995
    [13]
    TAO Xiaofeng, XU Xiaodong, and CUI Qimei. An overview of cooperative communications[J]. IEEE Communications Magazine, 2012, 50(6): 65–71. doi: 10.1109/MCOM.2012.6211487
    [14]
    CHEN Jianchao, YANG Liang, and ALOUINI M S. Physical layer security for cooperative NOMA systems[J]. IEEE Transactions on Vehicular Technology, 2018, 67(5): 4645–4649. doi: 10.1109/TVT.2017.2789223
    [15]
    ZAGHDOUD N, MNAOUER A B, BOUJEMAA H, et al. Secrecy performance analysis of cooperative NOMA system with multiple DF relays[C]. 2020 International Wireless Communications and Mobile Computing, Limassol, Cyprus, 2020: 2160–2163.
    [16]
    CHEN Xiaoming, NG D W K, GERSTACKER W H, et al. A survey on Multiple-Antenna techniques for physical layer security[J]. IEEE Communications Surveys & Tutorials, 2017, 19(2): 1027–1053. doi: 10.1109/COMST.2016.2633387
    [17]
    KIM S W. Modify-and-Forward for securing cooperative relay communications[C]. 23th International Zurich Seminar on Communications, Zurich, Switzerland, 2014: 136–139.
    [18]
    VIEN Q T, LE T A, NGUYEN H X, et al. A secure network coding based Modify-and-Forward scheme for cooperative wireless relay networks[C]. 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 2016: 1–5.
    [19]
    VIEN Q T, LE T A, and DUONG T Q. Opportunistic secure transmission for wireless relay networks with Modify-and-Forward protocol[C]. 2017 IEEE International Conference on Communications, Paris, France, 2017: 1–6.
    [20]
    CHU S I. Secrecy analysis of Modify-and-Forward relaying with relay selection[J]. IEEE Transactions on Vehicular Technology, 2019, 68(2): 1796–1809. doi: 10.1109/TVT.2018.2885807
    [21]
    PENG Hongxing, QI Hongyan, LI Xingwang, et al. Hardware impaired Modify-and-Forward relaying with relay selection: Reliability and security[J]. Physical Communication, 2021, 46: 101315. doi: 10.1016/j.phycom.2021.101315
    [22]
    QIN Zhijin, LIU Yuanwei, DING Zhiguo, et al. Physical layer security for 5G Non-orthogonal Multiple Access in large-scale networks[C]. 2016 IEEE International Conference on Communications, Kuala Lumpur, Malaysia, 2016: 1–6.
    [23]
    SHARMA P K and KIM D I. UAV-enabled downlink wireless system with non-orthogonal multiple access[C]. 2017 IEEE Globecom Workshops, Singapore, 2017: 1–6.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)

    Article Metrics

    Article views (825) PDF downloads(77) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return