Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection

被引:9
作者
Duy-Hung Ha [1 ]
Tran Trung Duy [2 ]
Pham Ngoc Son [3 ]
Thuong Le-Tien [4 ]
Voznak, Miroslav [1 ]
机构
[1] VSB Tech Univ Ostrava, Fac Elect Engn & Comp Sci, Ostrava 70800, Czech Republic
[2] Posts & Telecommun Inst Technol, Ho Chi Minh City 700000, Vietnam
[3] Ho Chi Minh City Univ Technol & Educ, Fac Elect & Elect Engn, Ho Chi Minh City 700000, Vietnam
[4] Ho Chi Minh City Univ Technol, VNU HCM, Ho Chi Minh City 700000, Vietnam
关键词
Relays; Protocols; NOMA; Jamming; Security; Reliability; Receivers; Physical-layer security; rateless codes; cooperative jamming; outage probability; intercept probability; PHYSICAL-LAYER SECURITY; SECRECY PERFORMANCE; OUTAGE ANALYSIS; IOT NETWORKS; UPLINK NOMA; TRANSMISSION; ENERGY; MIMO; SYSTEMS; SCHEME;
D O I
10.1109/ACCESS.2021.3114343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, two encoded packets can be sent to the destinations at the same time. In addition, two partial relay selection methods are studied to enhance reliability of the data transmission at the first and second hops. For protecting the source-relay and relay-destination transmission against an eavesdropper, cooperative jamming technique is employed. Particularly, in the first phase of each data transmission cycle, the remaining relays (except the selected relay) are used to transmit artificial noise on the eavesdropper, and cooperate with the selected relay to cancel interference components. In the second phase, trusted nodes that are near the destinations are employed to play a role as the cooperative jammers. For a fair performance comparison, we design a simple transmit power allocation for the transmitter and jammer nodes at the first and second phases. We also propose an adaptive power allocation method, where fractions of the transmit power are appropriately allocated to the signals, relying on instantaneous channel gains between the selected relay and the destinations. This paper also derives exact closed-form formulas of outage probability and intercept probability over Rayleigh fading channel. All the performance analysis is then validated by Monte-Carlo simulations. The obtained results clearly show a trade-off between security and reliability that can be enhanced by optimally designing the system parameters.
引用
收藏
页码:131087 / 131108
页数:22
相关论文
共 55 条
[1]   Enhanced Secrecy Performance of Multihop IoT Networks With Cooperative Hybrid-Duplex Jamming [J].
Abdullah, Zaid ;
Chen, Gaojie ;
Abdullah, Mohammed A. M. ;
Chambers, Jonathon A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) :161-172
[2]   A Secrecy Study of UAV Based Networks With Fountain Codes and FD Jamming [J].
Abughalwa, Monir ;
Hasna, Mazen O. .
IEEE COMMUNICATIONS LETTERS, 2021, 25 (06) :1796-1800
[3]   Secrecy Performance of a Multi-NOMA-MIMO System in the UEH Relaying Network Using the PSO Algorithm [J].
Anh, Le Thi ;
Hong, Ic Pyo .
IEEE ACCESS, 2021, 9 :2317-2331
[4]   Secure Connectivity Using Randomize-and-Forward Strategy in Cooperative Wireless Networks [J].
Cai, Chunxiao ;
Cai, Yueming ;
Yang, Weiwei ;
Yang, Wendong .
IEEE COMMUNICATIONS LETTERS, 2013, 17 (07) :1340-1343
[5]   Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Lv, Lu ;
Dong, Runze ;
Cheng, Tianhao ;
Gong, Fengkui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :786-799
[6]   On the Security Enhancement of Uplink NOMA Systems With Jammer Selection [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Lv, Lu ;
Tian, Jiwei ;
Gong, Fengkui .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (09) :5747-5763
[7]   Security-Reliability Tradeoff Analysis for Underlay Cognitive Two-Way Relay Networks [J].
Cao, Zhanghua ;
Ji, Xiaodong ;
Wang, Jue ;
Zhang, Shibing ;
Ji, Yancheng ;
Wang, Jiangzhou .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (12) :6030-6042
[8]   Physical Layer Security for Cooperative NOMA Systems [J].
Chen, Jianchao ;
Yang, Liang ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) :4645-4649
[9]   Secure Cognitive MIMO Wiretap Networks With Different Antenna Transmission Schemes [J].
Chen, Yong ;
Zhang, Tao ;
Qiao, Xiaoqiang ;
Wu, Hao ;
Zhang, Jiang .
IEEE ACCESS, 2021, 9 (09) :5779-5790
[10]   Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access [J].
Dang The Hung ;
Tran Trung Duy ;
Tran, Phuong T. ;
Do Quoc Trinh ;
Tan Hanh .
ENTROPY, 2019, 21 (10)