1. Trang chủ
  2. » Tất cả

Impact of untrusted relay on physical layer security in non orthogonal multiple access networks

20 2 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Impact of untrusted relay on physical layer security in non-orthogonal multiple access networks
Tác giả Dinh-Thuan Do, Minh-Sang Van Nguyen
Trường học Ton Duc Thang University
Chuyên ngành Electrical and Electronics Engineering
Thể loại Journal article
Năm xuất bản 2019
Thành phố Ho Chi Minh City
Định dạng
Số trang 20
Dung lượng 1,34 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Impact of Untrusted Relay on Physical Layer Security in Non Orthogonal Multiple Access Networks Vol (0123456789) Wireless Personal Communications https //doi org/10 1007/s11277 019 06219 y 1 3 Impact[.]

Trang 1

Impact of Untrusted Relay on Physical Layer Security

in Non‑Orthogonal Multiple Access Networks

Dinh‑Thuan Do 1,2  · Minh‑Sang Van Nguyen 3

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Abstract

In this study, the wireless sensor network is investigated in scenario of untrusted relay required to user at far distance In particular, an untrusted relay assists long distance trans-mission in  situation of non-existence of the direct link between source and destination This paper employs non-orthogonal multiple access (NOMA) scheme to serve large num-ber of users at different allocated power levels to adapt secure criteria Specifically , to evaluate the security performance we first examine the secure outage probability (SOP) and then strictly positive secrecy capacity (SPSC) is studied To further characterize the trade-off between system security and other controlling coefficients, we then investigate the impacts of power allocation factors and power levels of the eavesdropper In order to find tractable expressions to provide additional insights in term of the performance evaluation, the asymptotic expressions regarding both SOP and SPSC are performed in high signal-to-noise ratio (SNR) region In addition, secure performance of considered NOMA network

is compared in two modes related to untrusted relay, including Amplify-and-Forward and Decode-and-Forward mode Finally, simulation results are presented to corroborate the proposed methodology

Keywords Strictly positive secrecy capacity · Non-orthogonal multiple access · Jamming signal · Secure outage probability · Physical layer security

* Dinh-Thuan Do

dodinhthuan@tdtu.edu.vn

Minh-Sang Van Nguyen

sangnguyen.fet@gmail.com

1 Wireless Communications Research Group, Ton Duc Thang University, Ho Chi Minh City,

Vietnam

2 Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam

3 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Ho Chi Minh City, Vietnam

Trang 2

1 Introduction

To familiarize substantially growth regarding the throughput in the fifth generation (5G) networks, it required the unprecedented evolution of new Internet-enabled smart devices, and related applications and services Considering several techniques to improve the spec-tral efficiency, key architectures such as novel multiple access (MA) techniques, cognitive radio, heterogeneous networks, millimeter wave communications, input multiple-output (MIMO) for large-scale networks can be implemented to upgrade current networks Regarding MA schemes including orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA), these considered main categories are deployed to primarily pro-vide multiple access methodology In MA, it is introduced that signals distinguishing a explicit resource block can be employed by multiple users [1 2] More specifically, code-domain NOMA and power-code-domain NOMA are classified for NOMA upon exploring the multiplexing gain from the different domains [3]

Lately, cooperative jamming and artificial noise (AN) assisted model to improve physi-cal layer security (PLS), even if the the legitimate receivers have worse channel conditions than the eavesdroppers [4 5] Goel and Negi in [6] proposed a technique by generating

AN at the transmitter to decrease the eavesdroppers reception In principle, improving the security by producing AN at the transmitter is different scheme compared with a detrimen-tal effect of noise and interference, because it destroys the channel conditions of eaves-droppers without disturbing those of the legitimate receivers The perfect and imperfect channel state information (CSI) at both the transmitter and receiver are examined in an

AN based multi-antenna assisted secure transmission scheme affected by colluding eaves-droppers [7] As a further development, the authors in [8] using both beamforming and sectoring techniques to achieve the secrecy enhancement in wireless Ad Hoc networks Specially, the authors in [8 12] presented an effective technique to confuse the eavesdrop-per by deploying AN at the legitimate transmitter As an effective method to enhance the system security, the authors in [9] have also been performed cooperative full-duplex relay

In [7], a relay networks can be able to largely improve the physical layer security through using AN-aided strategy In other trends, many secure transmission strategies are intro-duced, for example cooperative beamforming (CB) [8] and cooperative jamming (CJ) [9]

by conveying the benefits of AN assistance in cooperation with relaying transmission It can be realized the randomness and time-varying nature of the wireless channels to sup-port for network security without deploying any encryption algorithm, PLS is proposed in both information security and wireless communications [13] Zhang et al proved that the secrecy sum rate performance of NOMA better than the one of the conventional OMA in scenario of the security performance of single-input-single-output (SISO) NOMA system [14] Qin et al [15] derived new secrecy outage probability (SOP) in forms of exact and asymptotic expressions to explore physical channel-assisted security of NOMA networks

in large-scale networks wherein spatially randomly location deployment for both NOMA users and eavesdroppers Furthermore, the authors in [16] presented the exact and asymp-totic expressions for SOP in term of the secrecy performance in case of NOMA employ-ing multiple antenna and artificial noise as well To improve the secrecy performance

of a MIMO system, optimal antenna selection (OAS) and suboptimal antenna selection (SAS) schemes are proposed which based on whether the base station has the global chan-nel state information (CSI) of both the main and wiretap chanchan-nels [17], and those perfor-mance were compared with the outdated space time transmission (STT) scheme The the exact and asymptotic SOP in closed-form expressions is derived for an underlay MIMO

Trang 3

system system [18] Recently, stochastic geometry model is deployed in networks wherein the physical layer security was considered for applications in 5G NOMA [19] Later, sin-gle antenna and multiple-antenna stochastic geometry networks were untaken in [20] in which two different schemes were suggested to evaluate the secrecy performance In [21], their results showed that optimal designs of decoding order, transmission rates, and power allocated to each user are examined to satisfy secrecy considerations in a new design of NOMA

To the best of the authors’ knowledge, the analysis of the physical layer security in coop-erative NOMA systems is still considered in few related works In particular, the design of system to examine secrecy performance for cooperative NOMA is still not perfect in in many scenarios related to signal or channel at physical layer As a result, these observation motivate us to perform analytical expressions as detailed study in this work The secure performance of NOMA using untrusted relay circumstance in cooperative manner is exam-ined as main aim of this work We focus on a related scenarios reflected in [22–25] to answer this important question However, these papers did not consider system model with assistance of untrusted relay Furthermore, in order to examine practical situation regarding the network security, wherein AN-aided relay and related illegal channel between source and untrusted relay is in degrading performance due to imperfect AN cancellation The pri-mary contributions of the paper are shortened as follows We comprehensively investigate the design of NOMA against the untrusted relay (eavesdropper) under the secrecy outage constraint

The main contributions of this paper can be shown as:

– The new architecture related to untrusted relay-aware NOMA communication is inves-tigated and the main impacts of related channel gains and secure target rates on system performance are studied Such system model is built as combination of the unstrusted reaying model and NOMA protocol in unique system model to evaluate secure in physi-cal layer

– We derive some analytical expressions of SOP and SPSC in term of signal-to-noise ratio (SNR) In this paper, the wiretap network model is constructed according to the technical characteristics of both NOMA and untrusted relaying network In addition, new asymptotic expressions of these important secure metrics including SOP and SPSC are derived in special case of high SNR at source node

– The power allocation factor for two separated signals in NOMA is derived to evaluation optimal secure performance of such NOMA system The interesting finding exhibits power fractions which can be chosen reasonably to achieve balancing optimal perfor-mance for both SOP and SPSC

– Moreover, the accuracy of the derived results are validated via Monte-Carlo simula-tions The results show that the SOP, SPSC corresponding distinctive characterizations

of secure performance for the such proposed NOMA system with selected key param-eters are investigated to provide insights in practical design

The remainder of this paper is organized as follows: Sect. 2 presents the system model and signal analysis with secure capacity deployed in NOMA system is investigated In Sect. 3, we derive the analytical expressions of SOP and SPSC in AF mode of concerned NOMA while DF mode is considered as a benchmark as present in Sect. 4 Section 5

examines the simulation results Finally, Sect. 6 completes with conclusion remarks for the paper and reviews the important results

Trang 4

2 System Model

We consider an untrusted relaying NOMA network shown in Fig. 1, where a source (S) com-municates with two destination nodes (D1, D2) through an untrusted relay (R) In this paper,

it can be assumed that source node S generates the artificial noise (AN) signal, the

destina-tion node can cancel it prior to informadestina-tion decoding which is different with the untrusted relay It is further assumed that the untrusted relay node is considered in situation of non-colluding, it is refer as they independently intercept the information More importantly, we assume that design of AN precoding matrix related to the jammer is performed in such a way that the jamming signal is injected to only degrade the untrusted relay’s channel It is

assumed that a straight link between S and destination nodes are unavailable due to deep fading Consider a NOMA system including two users (D1, strong user, and D2, weak user)

can be deployed in several networks such as mobile network, sensor wireless

communica-tion or IoT systems In such system model, S is situated in the center point within cover-age range regarding serving cell, and users D1 and D2 are very near with border of such

cell where contains received signal at weak level of power We extra undertake that single antenna equipped in all nodes in the network It is familiarity with works in the literature all the channels exhibit independent Rayleigh fading In additional assumption, it is recalled that block Rayleigh fading is applied, i.e., each channel is still constant in one block and changes via different the coherence blocks Initially, the superimposed mixture is transmit-ted in the first time slot, (𝛼1s1+ 𝛼2s2)

from S to the relay, where s i (i = 1, 2) is the unit power

signal received by user D i and 𝛼 i denoted as the power allocation factor To achieve

destina-tion node’s QoS requests, it is required that 𝛼1≥ 𝛼2 and these allocated coefficients must be

constrained by equation 𝛼2

1+ 𝛼2

2= 1 In addition, noise term namely additive white

Gauss-ian noise (AWGN) happens at each receiver with zero mean and varGauss-iance N0 We call P s , P r

are transmit power at source and relay respectively We denote the fading coefficients

cor-responding link between source and relay is g s,r while link between relay and destination

users D i are g r,i We denote 𝛺1, 𝛺2 as the Rayleigh channel parameters corresponding to g s,r ,

g r,i , respectively Similar to many works in literature, it is noted that two links from relay to two destination in NOMA scheme is similar and average channel gain is the same In our proposed scheme, full channel state information (CSI) of the communication links should be available at the node where need it to obtain related calculations

Considering secure performance in this work, to make it possible for reliable and secure communication between S and destination nodes, we utilized the widely-adopted Wyners

Fig 1 System model of secure NOMA under impact of untrusted relay

Trang 5

wiretap code [26] This coding scheme consists of the codeword transmission rate, R0 and

confidential information rate, R i The rate increment of R e = R0− R i is the expense of confusing listener The untrusted relay will try attempt to overhear on the ongoing

trans-missions from S to two destination nodes The untrusted relay nodes are assumed to be

non-colluding which means that they intercept the information independently It worth not-ing that the jammnot-ing signal intends to eavesdropper will affect the received signal at the untrusted relay, i.e using artificial noise signal It is practical that relay can be classify between pure signal from source transfers to destination and artificial noise term ([24, 25])

It is worth noting that relay in such NOMA is assumed to detach received mixture signal as destination using SIC Detailed explanations of untrusted relay to detect its own signals is beyond the scope of our paper

The transmission in such system model is divided into two phases In the first phase, the received signal at the untrusted relay can be expressed as

For AF scheme in untrusted relaying NOMA network, two users employ two concur-rence time slots to obtain received signal via help of relay which is called as untrusted

device Then, the expected signal can be computed at D i as

where 𝜔 r,i stands for noise term concerning as additive Gaussian noise and it’s

characteri-zation of zero mean and variance N0 It is noted that the amplifying factor is G in AF mode

given by

Without loss of generality, we assume that P r = P s , then the the amplifying factor is re-expressed as

where 𝜌 = P s ∕N0= P r ∕N0 denotes the average SNR achieved at legal links

Then, the instantaneous signal-to-interference-plus-noise ratio (SINR) at D1 can be computed by

Following principle of NOMA, to detect signal need be achieved at receiver it requires

implementation of successive interference cancellation (SIC) to signal s i is obtained for

user D i As a result, the received SNR at D2 can be expressed by

(1)

y r = g s,r

𝛼1s1+ 𝛼2s2�√

P s + 𝜔 r

(2)

y AF r,i = Gy r g r,i + 𝜔 r,i

(3)

P s ||g s,r||2

+ N0

(4)

||g s,r||2

+1

𝜌

(5)

𝛾 r,1 AF= ||g r,1||2

||g s,r||2

𝛼2 1

||g r,1||2

||g s,r||2

𝛼22+1

𝜌 ||g r,1||2

+1

𝜌 ||g s,r||2

+ 1

𝜌2

(6)

𝛾 r,2 AF = 𝜌||g s,r||2

||g r,2||2

𝛼2 2

||g r,2||2

+ ||g s,r||2

+1

𝜌

Trang 6

Hence, considering link between the relay and user, the AF-based transmission capacity from can be written as

In this work, it is assumed that jamming signal is imperfect canceled at the untrusted relay

to distinguish the superimposed mixture It worth noting that the received average SNR corresponding with the illegal link in situation in which untrusted relay is activated

where 𝜅 is affected factor due to imperfect jamming signal cancellation.

It worth noting that channel gain in S–R link in case that existence of jamming signal

is different with case that main channel of S–R link reserved for pure signal

communica-tion Therefore, we call 𝜌 E is SNR corresponding with jamming-aware channel and average

channel gain denoted by 𝜆0

Similarly, the channel capacity from the relay for received signal related jamming signal can be computed as

Therefore, the secrecy rate of the AF-based NOMA systems for user is formulated by

where [x]+= max {x, 0}.

As benchmark of AF-NOMA, we consider scenario of DF untrusted relay, in which the

relay initially decodes its received superimposed message from S in the first phase and then

re-encodes and onwards it to the destination in the second phase Then, the received signals

at D i can be shown as

The equivalent SNR in DF-NOMA case is expressed by

The channel capacity of a DF relaying system is related to min{C S −R , C R −Di}

, where C S −R

and C R −Di denote the capacity from S to relay and relay to D i , respectively Hence, the capacity of the main channels for D1 is

And, the capacity of the main channels for D2 is

(7)

C AF r,i =1

2log2

(

1+ 𝛾 AF r,i

)

(8)

𝛾 E,i AF = 𝛼2i 𝜌𝜅||g s,r||2

= 𝛼2i 𝜌 E ||g s,r||2

,

(9)

C E,i AF=1

2log2

(

1+ 𝛾 AF E,i

)

(10)

C AF

C AF r,i − C AF E,i

]+

,

(11)

y DF r,i = g r,i

𝛼1s1+ 𝛼2s2�√

P s + 𝜔 r,i

(12)

𝛾 r,i DF= min

{

𝜌||g s,r||2

𝛼12 𝜌||g s,r||2

𝛼2

, 𝜌||g r,i||2

𝛼12 𝜌||g r,i||2

𝛼2

}

(13)

C DF S −D1=1

2log2

(

1+ min

{

𝜌||g s,r||2

𝛼2 1

𝜌||g s,r||2

𝛼2

, 𝜌||g r,1||2

𝛼2 1

𝜌||g r,1||2

𝛼2

})

Trang 7

Similarly, the capacity of the eavesdropping channel is

By conveying definition of the secrecy capacity, it can be expressed for considered

DF-based NOMA systems at D i as

3 Secure Performance Analysis in Case of AF‑Based NOMA System

3.1 SOP Performance Analysis

In this subsection, we evaluate the secrecy performance in terms of SOP metrics Moti-vated by novel results from [27], we further analyse secure performance in untrusted sce-nario To achieve tractable form of derived formula, we also provide the asymptotic SOP

analysis The SOP is initiated by the fact that R successfully intercepts the source private

signals, which reflects the secure communication In NOMA systems, with regard to the help of untrusted relay for forwarding two signals transmitted from the source to D1 and

D2, respectively Therefore, outage event occurs when C AF

1 , C AF

2 drop under their own

target rates R i respectively To evaluate the secrecy performance comprehensively of the untrusted relay NOMA network, the secure performance can be further illustrated by SOP

In particular, we can expressed SOP in such NOMA network for evaluate secrecy per-formance as

where C i

th= 22R i

Proposition 1 The approximation of secure performance in DF-NOMA can be found by

where 𝜉1= 1−𝛼

2C1

th

𝛼2𝛼2C1

th , A = C2

th 𝜌 E

𝜌 , B = C2

th−1

𝜌𝛼2

3.2 SPSC Analysis

In other metric, existence of secrecy capacity should be determined In particular, we consider SPSC as fundamental benchmark which is evaluated to further confirmation on

(14)

C DF S −D2=1

2log2

(

1+ min

{

𝜌||g s,r||2

𝛼22, 𝜌||g r,2||2

𝛼22

})

(15)

C DF

R −Ei= 1

2log2

(

1+ 𝛼2

i 𝜌 E ||g s,r||2)

(16)

C DF i =[

C DF,i S −Di − C DF

R −Ei

]+

(17)

SOP AF= Pr(

C AF1 < R1or C AF2 < R2)

=1 − Pr

(

1+ 𝛾 AF r,1

1+ 𝛾 AF E,1

> C1th,1

+ 𝛾 AF r,2

1+ 𝛾 AF E,2

> C2th

)

=1 − Pr 1,

(18)

SOP AF= 1 +

(

e

(

𝜉1

𝜌E 𝛺1

)

− 1

)

𝛺2

𝛺1A + 𝛺2e

(

1

(1−A)𝛺1+

1

𝛺2

)

B

Trang 8

secrecy performance In term of the SPSC, secrecy capacity performance corresponding with an AF relaying NOMA system is computed as

Due to influence of jamming signal, it can be noted that 𝜌 > 𝜌 E , hence we can obtain new expression as

Then, we further obtain the following formula as

Remark 1 According to [(19) and (21)], we state that for the scenario of untrusted relay happens in main transmission, changing the channel gain factors of all transmission hops can effectively enhance the secrecy performance including SOP and SPSC metrics of such NOMA communications Moreover, the secrecy performance of the NOMA scheme will

be influenced by the varying of the predefined threshold secure rates Thus, a good tradeoff between key parameters and secrecy performance is introduced by the numerical simula-tion in following secsimula-tion In addisimula-tion, the jamming scheme make worse performance of untrusted relay and then evaluation of impact of jamming on secure performance is also careful considered in these circumstances

4 Secure Performance Analysis in Case of DF‑Based NOMA System

4.1 SOP Analysis in DF‑NOMA

Regarding on DF-based NOMA systems, the SOP can be computed by

(19)

SPSC AF= Pr(

C AF

1 > 0, C AF

2 >0,)

= Pr(

𝛾 AF r,1 > 𝛾 AF E,1 , 𝛾 AF r,2 > 𝛾 AF E,2

)

(20)

SPSC AF= Pr

(

||g s,r||2

< 1

𝜌 E 𝛼22, min

{

𝜌||g s,r||2

, 𝜌||g r,2||2}

> 𝜌 E ||g s,r||2

)

= Pr

(

||g s,r||2

< 1

𝜌 E 𝛼2

2, ||g r,2||2

> 𝜌 E ||g s,r||2

𝜌

)

(21)

SPSC AF= ∫

1

𝜌E 𝛼2

0

exp

(

𝜌 E x

𝜌𝛺2

) 1

𝜆0exp

(

x

𝜆0

)

dx

=1

𝜆0∫

1

𝜌E 𝛼2

0

exp

(

(

𝜌 E

𝜌𝛺2 + 1

𝜆0

)

x

)

dx

𝜆0𝜌 E + 𝛺2𝜌

[

1− exp

(

(

𝜌 E

𝜌𝛺2 + 1

𝜆0

) 1

𝜌 E 𝛼2 2

)]

(22)

SOP DF = Pr(

C DF1 < R1or C2DF < R2)

=1 − Pr(

C DF1 > R1or C DF2 > R2)

=1 − Pr 2

Trang 9

Similar to the analysis done in previous subsection related AF mode, we can obtain an upper bound of instantaneous SINR as 𝜌|g s,r|2

𝛼2

𝜌|g s,r|2

𝛼2 +1≈ 𝜌|g r,1|2

𝛼2

𝜌|g r,1|2

𝛼2 +1 ≈𝛼

2

𝛼2 Then, it is noted that

Pr2 can be expressed as

Proposition 2 Secure outage event in DF-NOMA can be computed in closed-form expres-sion as below

4.2 SPSC Analysis in DF‑NOMA

In similar manner, we also have 𝜌|g s,r|2

𝛼2

𝜌|g s,r|2

𝛼2 +1 ≈ 𝜌|g r,1|2

𝛼2

𝜌|g r,1|2

𝛼2 +1≈ 𝛼

2

𝛼2 Then, the SPSC for a DF case can be expressed as

We consider the situation in untrusted relay where the condition 𝜌 > 𝜌 E is satisfied There-fore, SPSC in such DF case can be obtained easily after several computation steps

(23)

Pr 2 < Pr

1+𝛼

2

𝛼2

1+ 𝛼2

1𝜌 E ��g s,r��2 > C1

th,

1+ min

𝜌��g s,r��2

𝛼2

2, 𝜌��g r,2��2

𝛼2 2

1+ 𝛼2

2𝜌 E ��g s,r��2 > C2

th

= Pr 2 < Pr

��g s,r��2

< 𝜉1

𝜌 E, 1+ min

𝜌��g s,r��2

𝛼22, 𝜌��g r,2��2

𝛼22

> C2th

1+ 𝛼2

2𝜌 E ��g s,r��2��

(24)

SOP DF= 1 − 𝛺2e

B

𝛺2

𝜆0A + 𝛺2

{ exp

(

(

A

𝛺2 + 1

𝜆0

)

B (1 − A)

)

− exp

(

(

A

𝛺2 + 1

𝜆0

)

𝜉1

𝜌 E

)}

(25)

SPSC DF= Pr�

C DF

1 > 0, C DF

2 >0,�

≈ Pr

1+𝛼

2

𝛼2

1+ 𝛼2

1𝜌 E ��g s,r��2 >1,

1+ min�

𝜌��g s,r��2

𝛼22, 𝜌��g r,2��2

𝛼22

1+ 𝛼2

2𝜌 E ��g s,r��2 >1

(26)

SPSC DF = Pr

(

||g s,r||2

< 1

𝛼2

2𝜌 E , ||g r,2||2

> 𝜌 E ||g s,r||2

𝜌

) ,

= ∫

1

𝛼2

2𝜌E

0

exp

(

𝜌 E x

𝜌𝛺2

) 1

𝜆0exp

(

x

𝜆0

)

dx

=1

𝜆0∫

1

𝛼2

2𝜌E

0

exp

(

(

𝜌 E

𝜌𝛺2 + 1

𝜆0

)

x

)

dx

Trang 10

As a result, it can be expressed SPSC in DF-NOMA as below

5 Simulation Results

Unless otherwise stated, regarding on untrusted relay-aware NOMA, source transmission

power, P s= 1 (J/s) and path loss exponent m = 3 (which corresponds to an urban cellular

network environment ) In practice, different rates are assigned for different users, but in

this study we set the secure target rate, R i= 3 (bits/s/Hz) in the both transmission links for simple analysis The distances in each hop of relaying NOMA system are normalized to unit value For simplicity, similar noise variances at the relay and the destination nodes are

assumed, i.e., different kinds of noise variance is set as N0= 0.01 Power allocation

fac-tors for NOMA 𝛼2

1= 0.2, 𝛼2

2= 0.8 except to specific simulation results The mean values,

𝛺1, 𝛺2 of the exponential random variables in two hop of relaying NOMA, respectively, are set to 1

Figure 2 shows the SOP versus transmit SNR at source achieved by the proposed AF-NOMA scheme, where a close agreement between the simulated and analytical results can

be observed, and they match verwy well in high SNRregime For a comparison, the SOP achieved by the proposed scheme we change power allocation factors From this figure, we have the following informative observations such as high SNR such NOMA system is more secure In particular, simulation and analytical lines are matched very well only at high SNR This is consistent with Proposition 1, in the sense that the proposed NOMA scheme not only intentionally decreases the capability for eavesdropper, but also effectively cre-ates channel difference for same link S–R, thus guaranteeing a forceful secure AF-NOMA transmission Furthermore, the power allocation factor has different impacts on the secure

(27)

𝜆0𝜌 E + 𝜌𝛺2

[

1− exp

(

(

𝜌 E

𝜌𝛺2 + 1

𝜆0

) 1

𝛼2

2𝜌 E

)]

SNR (dB)

10-2

10-1

10 0

SOP AF: α1 = 0.55 Sim.

SOP AF: α1 = 0.65 Sim.

SOP AF: α1 = 0.75 Sim.

SOP AF: α1 = 0.85 Sim.

Fig 2 SOP of untrusted relay AF-NOMA versus transmit SNR at source as varying 𝛼1

Ngày đăng: 22/11/2022, 14:09

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
1. Qin, Z., Liu, Y., Ding, Z., Gao, Y., &amp; Elkashlan, M. (2016). Physical layer security for 5G non-orthog- onal multiple access in large-scale networks. In Proceedings of international conference on communi- cations (ICC), May 2016, pp. 1–6 Sách, tạp chí
Tiêu đề: Proceedings of the IEEE International Conference on Communications (ICC)
Tác giả: Z. Qin, Y. Liu, Z. Ding, Y. Gao, M. Elkashlan
Nhà XB: IEEE
Năm: 2016
23. Zheng, B., et al. (2018). Secure NOMA based two-way relay networks using artificial noise and full duplex. IEEE Journal on Selected Areas in Communications, 36(7), 1426–1440 Sách, tạp chí
Tiêu đề: Secure NOMA based two-way relay networks using artificial noise and full duplex
Tác giả: Zheng, B., et al
Nhà XB: IEEE Journal on Selected Areas in Communications
Năm: 2018
25. Chen, D., et al. (2018). Energy-efficient secure transmission design for the Internet of Things with an untrusted relay. IEEE Access, 6, 11862–11870 Sách, tạp chí
Tiêu đề: Energy-efficient secure transmission design for the Internet of Things with an untrusted relay
Tác giả: Chen, D., et al
Nhà XB: IEEE Access
Năm: 2018
26. Wyner, A. D. (1975). The wiretap channel. Bell System Technical Journal, 54(8), 1355–1387 Sách, tạp chí
Tiêu đề: The wiretap channel
Tác giả: Wyner, A. D
Nhà XB: Bell System Technical Journal
Năm: 1975
27. Chen, J., Yang, L., &amp; Alounini, M.-S. (2018). Physical layer security for cooperative NOMA systems. IEEE Transactions on Vehicular Technology, 67(5), 4645–4649 Sách, tạp chí
Tiêu đề: Physical layer security for cooperative NOMA systems
Tác giả: Chen, J., Yang, L., Alounini, M.-S
Nhà XB: IEEE Transactions on Vehicular Technology
Năm: 2018
24. Le, N. Q., Do, D.-T., &amp; An, B. (2017). Secure wireless powered relaying networks: Energy harvesting policies and performance analysis. International Journal of Communication Systems (Wiley), 30(18), e3369 Khác

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm

w