Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems: A Zero-Sum Game Approach

被引:3
作者
Chen, Yanqiu [1 ]
Ji, Xiaopeng [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Elect & Informat Engn, Nanjing 210044, Peoples R China
来源
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES | 2023年 / 136卷 / 01期
基金
中国国家自然科学基金;
关键词
Non-orthogonal multiple access technology (NOMA); physical layer security; game theory; nash equilibrium; zero-sum game; PHYSICAL LAYER SECURITY; NONORTHOGONAL MULTIPLE-ACCESS; ARTIFICIAL-NOISE; WIRELESS NETWORKS; RELAY; COMMUNICATION; CHALLENGES;
D O I
10.32604/cmes.2023.024531
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Non-orthogonal multiple access technology (NOMA), as a potentially promising technology in the 5G/B5G era, suffers from ubiquitous security threats due to the broadcast nature of the wireless medium. In this paper, we focus on artificial-signal-assisted and relay-assisted secure downlink transmission schemes against external eavesdropping in the context of physical layer security, respectively. To characterize the non-cooperative confrontation around the secrecy rate between the legitimate communication party and the eavesdropper, their interactions are modeled as a two-person zero-sum game. The existence of the Nash equilibrium of the proposed game models is proved, and the pure strategy Nash equilibrium and mixed-strategy Nash equilibrium profiles in the two schemes are solved and analyzed, respectively. The numerical simulations are conducted to validate the analytical results, and show that the two schemes improve the secrecy rate and further enhance the physical layer security performance of NOMA systems.
引用
收藏
页码:531 / 553
页数:23
相关论文
共 30 条
[1]   A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case [J].
Alsaba, Yamen ;
Leow, Chee Yen ;
Rahim, Sharul Kamal Abdul .
IEEE ACCESS, 2018, 6 :58764-58773
[2]   Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Li, Tengyao ;
Tian, Jiwei ;
Gong, Fengkui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :2930-2943
[3]   Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Li, Tengyao ;
Gong, Fengkui .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (02) :1942-1955
[4]   Secure Transmission via Beamforming Optimization for NOMA Networks [J].
Cao, Yang ;
Zhao, Nan ;
Chen, Yunfei ;
Jin, Minglu ;
Ding, Zhiguo ;
Li, Yonghui ;
Yu, F. Richard .
IEEE WIRELESS COMMUNICATIONS, 2020, 27 (01) :193-199
[5]   Security at Physical Layer in NOMA Relaying Networks With Cooperative Jamming [J].
Chen, Bingcai ;
Li, Rui ;
Ning, Qian ;
Lin, Kai ;
Han, Chaoqi ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (04) :3883-3888
[6]   Security Enhancement Using a Novel Two-Slot Cooperative NOMA Scheme [J].
Chen, Bingcai ;
Chen, Yu ;
Cao, Yang ;
Chen, Yunfei ;
Zhao, Nan ;
Ding, Zhiguo ;
Wang, Xianbin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (03) :3470-3475
[7]  
Dai LL, 2015, IEEE COMMUN MAG, V53, P74, DOI 10.1109/MCOM.2015.7263349
[8]   A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends [J].
Ding, Zhiguo ;
Lei, Xianfu ;
Karagiannidis, George K. ;
Schober, Robert ;
Yuan, Jinhong ;
Bhargava, Vijay K. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (10) :2181-2195
[9]   On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming [J].
Ding, Zhiguo ;
Zhao, Zhongyuan ;
Peng, Mugen ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (07) :3151-3163
[10]   Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access [J].
Feng, Youhong ;
Yan, Shihao ;
Liu, Chenxi ;
Yang, Zhen ;
Yang, Nan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1670-1683