Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach

被引:82
作者
Lv, Lu [1 ,2 ]
Zhou, Fuhui [1 ,3 ]
Chen, Jian [1 ]
Al-Dhahir, Naofal [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
[2] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
[3] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Jiangxi, Peoples R China
[4] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Physical layer security; non-orthogonal multiple access; cooperative jamming; untrusted relay; ergodic secrecy sum rate; NONORTHOGONAL MULTIPLE-ACCESS; OPTIMAL POWER ALLOCATION; ARTIFICIAL-NOISE; TRANSMISSION; PERFORMANCE; SYSTEMS; DESIGN; SCHEME;
D O I
10.1109/TIFS.2019.2912337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a novel non-orthogonal multiple access (NOMA)-inspired jamming and relaying scheme to enhance the physical layer security of untrusted relay networks. Particularly, during the first phase, with the application of the downlink NOMA principle, the source sends a superimposed version of a desired signal and a jamming signal, where the jamming signal is designed to deliberately confuse the untrusted relay by exploiting the beamforming design and adapting the transmission rate at the source. During the second phase, relying on the uplink NOMA principle, the untrusted relay forwards its received signals and, simultaneously, the source transmits a new desired signal that cannot be wiretapped by the untrusted relay to maximize the secrecy sum rate. Scenarios of single-antenna and multiple-antenna relaying are considered, and the impact of different antenna configurations at the source and the untrusted relay on the secrecy performance is investigated. Analytical expressions of an ergodic secrecy sum rate (ESSR) lower bound and an asymptotic ESSR scaling law are derived to evaluate the secrecy performance of the proposed NOMA-inspired jamming and relaying scheme. Computer simulations are presented to validate the accuracy of the derived analytical results, and demonstrate the significant ESSR improvement of the proposed scheme over the conventional orthogonal multiple access-based relaying schemes.
引用
收藏
页码:3191 / 3205
页数:15
相关论文
共 54 条
[1]  
Abramowitz M., 1972, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables
[2]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[3]   Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access [J].
Chen, Xiaoming ;
Zhang, Zhaoyang ;
Zhong, Caijun ;
Ng, Derrick Wing Kwan ;
Jia, Rundong .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) :788-801
[4]   A Survey on Multiple-Antenna Techniques for Physical Layer Security [J].
Chen, Xiaoming ;
Ng, Derrick Wing Kwan ;
Gerstacker, Wolfgang H. ;
Chen, Hsiao-Hwa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1027-1053
[5]   Multi-Antenna Relay Aided Wireless Physical Layer Security [J].
Chen, Xiaoming ;
Zhong, Caijun ;
Yuen, Chau ;
Chen, Hsiao-Hwa .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) :40-+
[6]   Optimal User Scheduling and Power Allocation for Millimeter Wave NOMA Systems [J].
Cui, Jingjing ;
Liu, Yuanwei ;
Ding, Zhiguo ;
Fan, Pingzhi ;
Nallanathan, Arumugam .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (03) :1502-1517
[7]  
Dai LL, 2015, IEEE COMMUN MAG, V53, P74, DOI 10.1109/MCOM.2015.7263349
[8]   Secrecy Transmission With a Helper: To Relay or to Jam [J].
Deng, Hao ;
Wang, Hui-Ming ;
Guo, Wei ;
Wang, Wenjie .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) :293-307
[9]   On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming [J].
Ding, Zhiguo ;
Zhao, Zhongyuan ;
Peng, Mugen ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (07) :3151-3163
[10]   The Application of MIMO to Non-Orthogonal Multiple Access [J].
Ding, Zhiguo ;
Adachi, Fumiyuki ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :537-552