Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach

被引:80
作者
Lv, Lu [1 ,2 ]
Zhou, Fuhui [1 ,3 ]
Chen, Jian [1 ]
Al-Dhahir, Naofal [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
[2] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
[3] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Jiangxi, Peoples R China
[4] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Physical layer security; non-orthogonal multiple access; cooperative jamming; untrusted relay; ergodic secrecy sum rate; NONORTHOGONAL MULTIPLE-ACCESS; OPTIMAL POWER ALLOCATION; ARTIFICIAL-NOISE; TRANSMISSION; PERFORMANCE; SYSTEMS; DESIGN; SCHEME;
D O I
10.1109/TIFS.2019.2912337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a novel non-orthogonal multiple access (NOMA)-inspired jamming and relaying scheme to enhance the physical layer security of untrusted relay networks. Particularly, during the first phase, with the application of the downlink NOMA principle, the source sends a superimposed version of a desired signal and a jamming signal, where the jamming signal is designed to deliberately confuse the untrusted relay by exploiting the beamforming design and adapting the transmission rate at the source. During the second phase, relying on the uplink NOMA principle, the untrusted relay forwards its received signals and, simultaneously, the source transmits a new desired signal that cannot be wiretapped by the untrusted relay to maximize the secrecy sum rate. Scenarios of single-antenna and multiple-antenna relaying are considered, and the impact of different antenna configurations at the source and the untrusted relay on the secrecy performance is investigated. Analytical expressions of an ergodic secrecy sum rate (ESSR) lower bound and an asymptotic ESSR scaling law are derived to evaluate the secrecy performance of the proposed NOMA-inspired jamming and relaying scheme. Computer simulations are presented to validate the accuracy of the derived analytical results, and demonstrate the significant ESSR improvement of the proposed scheme over the conventional orthogonal multiple access-based relaying schemes.
引用
收藏
页码:3191 / 3205
页数:15
相关论文
共 54 条
  • [1] Abramowitz M., 1972, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables
  • [2] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [3] Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access
    Chen, Xiaoming
    Zhang, Zhaoyang
    Zhong, Caijun
    Ng, Derrick Wing Kwan
    Jia, Rundong
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 788 - 801
  • [4] A Survey on Multiple-Antenna Techniques for Physical Layer Security
    Chen, Xiaoming
    Ng, Derrick Wing Kwan
    Gerstacker, Wolfgang H.
    Chen, Hsiao-Hwa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1027 - 1053
  • [5] Multi-Antenna Relay Aided Wireless Physical Layer Security
    Chen, Xiaoming
    Zhong, Caijun
    Yuen, Chau
    Chen, Hsiao-Hwa
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) : 40 - +
  • [6] Optimal User Scheduling and Power Allocation for Millimeter Wave NOMA Systems
    Cui, Jingjing
    Liu, Yuanwei
    Ding, Zhiguo
    Fan, Pingzhi
    Nallanathan, Arumugam
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (03) : 1502 - 1517
  • [7] Dai LL, 2015, IEEE COMMUN MAG, V53, P74, DOI 10.1109/MCOM.2015.7263349
  • [8] Secrecy Transmission With a Helper: To Relay or to Jam
    Deng, Hao
    Wang, Hui-Ming
    Guo, Wei
    Wang, Wenjie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 293 - 307
  • [9] On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming
    Ding, Zhiguo
    Zhao, Zhongyuan
    Peng, Mugen
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (07) : 3151 - 3163
  • [10] The Application of MIMO to Non-Orthogonal Multiple Access
    Ding, Zhiguo
    Adachi, Fumiyuki
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 537 - 552