Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection

被引:9
作者
Duy-Hung Ha [1 ]
Tran Trung Duy [2 ]
Pham Ngoc Son [3 ]
Thuong Le-Tien [4 ]
Voznak, Miroslav [1 ]
机构
[1] VSB Tech Univ Ostrava, Fac Elect Engn & Comp Sci, Ostrava 70800, Czech Republic
[2] Posts & Telecommun Inst Technol, Ho Chi Minh City 700000, Vietnam
[3] Ho Chi Minh City Univ Technol & Educ, Fac Elect & Elect Engn, Ho Chi Minh City 700000, Vietnam
[4] Ho Chi Minh City Univ Technol, VNU HCM, Ho Chi Minh City 700000, Vietnam
关键词
Relays; Protocols; NOMA; Jamming; Security; Reliability; Receivers; Physical-layer security; rateless codes; cooperative jamming; outage probability; intercept probability; PHYSICAL-LAYER SECURITY; SECRECY PERFORMANCE; OUTAGE ANALYSIS; IOT NETWORKS; UPLINK NOMA; TRANSMISSION; ENERGY; MIMO; SYSTEMS; SCHEME;
D O I
10.1109/ACCESS.2021.3114343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, two encoded packets can be sent to the destinations at the same time. In addition, two partial relay selection methods are studied to enhance reliability of the data transmission at the first and second hops. For protecting the source-relay and relay-destination transmission against an eavesdropper, cooperative jamming technique is employed. Particularly, in the first phase of each data transmission cycle, the remaining relays (except the selected relay) are used to transmit artificial noise on the eavesdropper, and cooperate with the selected relay to cancel interference components. In the second phase, trusted nodes that are near the destinations are employed to play a role as the cooperative jammers. For a fair performance comparison, we design a simple transmit power allocation for the transmitter and jammer nodes at the first and second phases. We also propose an adaptive power allocation method, where fractions of the transmit power are appropriately allocated to the signals, relying on instantaneous channel gains between the selected relay and the destinations. This paper also derives exact closed-form formulas of outage probability and intercept probability over Rayleigh fading channel. All the performance analysis is then validated by Monte-Carlo simulations. The obtained results clearly show a trade-off between security and reliability that can be enhanced by optimally designing the system parameters.
引用
收藏
页码:131087 / 131108
页数:22
相关论文
共 55 条
[31]   Opportunistic Relaying and Jamming Based on Secrecy-Rate Maximization for Multiuser Buffer-Aided Relay Systems [J].
Lu, Xiaotao ;
Lamare, Rodrigo C. de .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :15269-15283
[32]   Relay Placement for Physical Layer Security: A Secure Connection Perspective [J].
Mo, Jianhua ;
Tao, Meixia ;
Liu, Yuan .
IEEE COMMUNICATIONS LETTERS, 2012, 16 (06) :878-881
[33]   Secure Massive MIMO With the Artificial Noise-Aided Downlink Training [J].
Nam-Phong Nguyen ;
Hien Quoc Ngo ;
Duong, Trung Q. ;
Hoang Duong Tuan ;
Tourki, Kamel .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) :802-816
[34]   Exploiting Fountain Codes for Secure Wireless Delivery [J].
Niu, Hao ;
Iwai, Masayuki ;
Sezaki, Kaoru ;
Sun, Li ;
Du, Qinghe .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (05) :777-780
[35]   Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments [J].
Phu Tran Tin ;
Nguyen, Tan N. ;
Sang, Nguyen Q. ;
Tran Trung Duy ;
Tran, Phuong T. ;
Voznak, Miroslav .
ENTROPY, 2019, 21 (07) :1-18
[36]   NOMA-Based IoT Networks: Impulsive Noise Effects and Mitigation [J].
Selim, Bassant ;
Alam, Md Sahabul ;
Evangelista, Joao V. C. ;
Kaddoum, Georges ;
Agba, Basile L. .
IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (11) :69-75
[37]   Cooperative Jamming for Secure Transmission With Both Active and Passive Eavesdroppers [J].
Si, Jiangbo ;
Cheng, Zihao ;
Li, Zan ;
Cheng, Julian ;
Wang, Hui-Ming ;
Al-Dhahir, Naofal .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (09) :5764-5777
[38]   Fountain-Coding Aided Secure Transmission With Delay and Content Awareness [J].
Sun, Li ;
Huang, Dantong ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (07) :7992-7997
[39]   Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback [J].
Sun, Li ;
Xu, Hongbin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (01) :740-753
[40]   Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks [J].
Sun, Li ;
Ren, Pinyi ;
Du, Qinghe ;
Wang, Yichen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (01) :291-300