Power allocation-Assisted secrecy analysis for NOMA enabled cooperative network under multiple eavesdroppers

被引:4
作者
Nayak, V. Narasimha [1 ]
Gurrala, Kiran Kumar [1 ]
机构
[1] Natl Inst Technol Andhra Pradesh, Dept Elect & Commun Engn, Tadepalligudem, Andhra Prades, India
关键词
control jamming; DF; NOMA; physical layer security; secrecy rate; PHYSICAL LAYER SECURITY; RELAY SELECTION; ACCESS; PERFORMANCE; SYSTEMS;
D O I
10.4218/etrij.2020-0084
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work, the secrecy of a typical wireless cooperative dual-hop non-orthogonal multiple access (NOMA)-enabled decode-and-forward (DF) relay network is investigated with the impact of collaborative and non-collaborative eavesdropping. The system model consists of a source that broadcasts the multiplexed signal to two NOMA users via a DF relay, and information security against the eavesdropper nodes is provided by a helpful jammer. The performance metric is secrecy rate and ergodic secrecy capacity is approximated analytically. In addition, a differential evolution algorithm-based power allocation scheme is proposed to find the optimal power allocation factors for relay, jammer, and NOMA users by employing different jamming schemes. Furthermore, the secrecy rate analysis is validated at the NOMA users by adopting different jamming schemes such as without jamming (WJ) or conventional relaying, jamming (J), and with control jamming (CJ). Simulation results demonstrate the superiority of CJ over the J and WJ schemes. Finally, the proposed power allocation outperforms the fixed power allocation under all conditions considered in this work.
引用
收藏
页码:758 / 768
页数:11
相关论文
共 27 条
[21]   Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes [J].
Sun, Li ;
Ren, Pinyi ;
Du, Qinghe ;
Wang, Yichen ;
Gao, Zhenzhen .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (03) :463-466
[22]  
Tang L, 2011, IEEE GLOBE WORK, P849, DOI 10.1109/GLOCOMW.2011.6162575
[23]   Secrecy Performance Analysis of Relay Selection in Cooperative NOMA Systems [J].
Wang, Zhenling ;
Peng, Zhangyou .
IEEE ACCESS, 2019, 7 :86274-86287
[24]   Forwarding Strategy Selection in Dual-Hop NOMA Relaying Systems [J].
Xiao, Yue ;
Hao, Li ;
Ma, Zheng ;
Ding, Zhiguo ;
Zhang, Zhengquan ;
Fan, Pingzhi .
IEEE COMMUNICATIONS LETTERS, 2018, 22 (08) :1644-1647
[25]   Secrecy Outage Performance Analysis for Cooperative NOMA Over Nakagami-m Channel [J].
Yu, Chao ;
Ko, Hak-Lim ;
Peng, Xin ;
Xie, Wenwu .
IEEE ACCESS, 2019, 7 :79866-79876
[26]   Non-Orthogonal Multiple Access With Cooperative Full-Duplex Relaying [J].
Zhong, Caijun ;
Zhang, Zhaoyang .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (12) :2478-2481
[27]   Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT [J].
Zhou, Fuhui ;
Chu, Zheng ;
Sun, Haijian ;
Hu, Rose Qingyang ;
Hanzo, Lajos .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) :918-931