A Game-Theoretical Modelling Approach for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System

被引:7
作者
Alsaba, Yamen [1 ]
Leow, Chee Yen [1 ]
Rahim, Sharul Kamal Abdul [1 ]
机构
[1] Univ Teknol Malaysia, Sch Elect Engn, Fac Engn, Wireless Commun Ctr, Johor Baharu 81310, Malaysia
基金
欧盟地平线“2020”;
关键词
Non-orthogonal multiple access; physical layer security; game theory; Stackelberg game; null-steering beamforming; harvest-and-jam; WIRELESS INFORMATION; PERFORMANCE ANALYSIS; RESOURCE-ALLOCATION; ALGORITHM;
D O I
10.1109/ACCESS.2018.2889494
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the physical layer security of a downlink non-orthogonal multiple access (NOMA) communication system, wherein a base station is communicating with two paired active users in the presence of an eavesdropper and multiple idle nodes (helpers). In order to enhance the secrecy performance, a two-phase harvest-and-jam null-steering jamming technique is deployed. In the first phase, the base station provides the helper with power in addition to active users and eavesdropper's information via simultaneous wireless information and power transfer technique. The helpers exploit the harvested energy and the information received in the first phase to build a null-steering beamformer and jam the eavesdropper, during the information exchange between the base station and the legitimate users in the second phase. A game theory is introduced to the proposed scheme, and the base station-helpers interactions are modeled as a Stackelberg game, where the helpers play the leader role and the base station is the follower. The utility functions of both the leader and follower are formed, and the Stackelberg equilibrium is reached by means of the backward induction technique. The proposed scheme demonstrates better secrecy performance when compared with the artificial noise-aided secure NOMA system.
引用
收藏
页码:5896 / 5904
页数:9
相关论文
共 35 条
[1]   Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game [J].
Al-Talabani, Ali ;
Deng, Yansha ;
Nallanathan, A. ;
Nguyen, Huan X. .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (06) :1112-1115
[2]   A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case [J].
Alsaba, Yamen ;
Leow, Chee Yen ;
Rahim, Sharul Kamal Abdul .
IEEE ACCESS, 2018, 6 :58764-58773
[3]   Full-Duplex Cooperative Non-Orthogonal Multiple Access With Beamforming and Energy Harvesting [J].
Alsaba, Yamen ;
Leow, Chee Yen ;
Rahim, Sharul Kamal Abdul .
IEEE ACCESS, 2018, 6 :19726-19738
[4]  
[Anonymous], 1991, GAME THEORY
[5]  
Benjebbour A, 2013, IEEE GLOBE WORK, P66, DOI 10.1109/GLOCOMW.2013.6824963
[6]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[7]   Secure Wireless Powered and Cooperative Jamming D2D Communications [J].
Chu, Zheng ;
Nguyen, Huan X. ;
Tuan Anh Le ;
Karamanoglu, Mehmet ;
Ever, Enver ;
Yazici, Adnan .
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2018, 2 (01) :1-13
[8]   Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems [J].
Chu, Zheng ;
Nguyen, Huan X. ;
Caire, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) :926-939
[9]  
Chu Z, 2017, IFIP WIREL DAY, P95, DOI 10.1109/WD.2017.7918122
[10]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888