An HARQ Assisted Cognitive NOMA Scheme for Secure Transmission With Imperfect SIC

被引:7
作者
Xiang, Zhongwu [1 ]
Yang, Weiwei [2 ]
Pan, Gaofeng [3 ]
Cai, Yueming [2 ]
Ding, Zhiguo [4 ,5 ]
Zou, Yulong [6 ]
机构
[1] Naval Univ Engn, Natl Key Lab Sci & Technol Vessel Integrated Pow, Wuhan 430033, Peoples R China
[2] Army Engn Univ PLA, Coll Commun Engn, Nanjing 210007, Peoples R China
[3] Beijing Inst Technol, Sch Informat & Elect, Beijing 100081, Peoples R China
[4] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[5] Univ Manchester, Sch Elect & Elect Engn, Manchester M13 9PL, Lancs, England
[6] Nanjing Univ Posts & Telecommun, Sch Telecommun & Informat Engn, Nanjing 210007, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
NOMA; Internet of Things; Quality of service; Silicon carbide; Resource management; Performance evaluation; Benchmark testing; non-orthogonal multiple access; hybrid automatic repeat request; physical layer security; NONORTHOGONAL MULTIPLE-ACCESS; NETWORKS; SYSTEMS; RELIABILITY; PERFORMANCE; INTERNET; SECRECY; DESIGN; ISSUES;
D O I
10.1109/TCOMM.2021.3050798
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper employs hybrid automatic repeat request (HARQ) to assist the cognitive non-orthogonal multiple access (NOMA) scheme for secure transmission in Internet of Things networks where the security-required (SR) users with high-security requirements and quality of services (QoS)-sensitive (QS) users with real-time process requirements are paired to perform NOMA for increasing the network connectivity. In addition, the imperfect successive interference cancellation (SIC) is considered at both legitimate users and eavesdropper for providing a realistic analysis. The closed-form expressions for the connection outage probability (COP), the secrecy transmission probability (RSP), and effective secrecy throughput (EST) of the SR user are derived in the proposed lightweight but efficient randomized retransmission scheme (RRS). As benchmarks, the secrecy performances of the fixed retransmission scheme (FRS) and orthogonal multiple access (OMA) scheme are also investigated. Besides, the asymptotic secrecy analysis is given to gain a better insight into secrecy performance. The analytical results developed in the paper demonstrate that HARQ is beneficial to secrecy transmission and the RRS outperforms or equals to the FRS and OMA scheme when the transmit power and secrecy coding redundancy is sufficiently high.
引用
收藏
页码:1930 / 1946
页数:17
相关论文
共 49 条
[11]   Performance Analysis and Optimization of NOMA With HARQ for Short Packet Communications in Massive IoT [J].
Ghanami, Fatemeh ;
Hodtani, Ghosheh Abed ;
Vucetic, Branka ;
Shirvanimoghaddam, Mahyar .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4736-4748
[12]  
Gradshteyn IS., 2007, Table of Integrals, V7
[13]   On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ [J].
Guan, Xinrong ;
Cai, Yueming ;
Yang, Weiwei .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (03) :479-482
[14]   Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT [J].
Han, Shujun ;
Xu, Xiaodong ;
Fang, Sisai ;
Sun, Yan ;
Cao, Yue ;
Tao, Xiaofeng ;
Zhang, Ping .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :5674-5690
[15]   On the Design of Secure Non-Orthogonal Multiple Access Systems [J].
He, Biao ;
Liu, An ;
Yang, Nan ;
Lau, Vincent K. N. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (10) :2196-2206
[16]   Secure ARQ Protocol for Wireless Communications: Performance Analysis and Packet Coding Design [J].
He, Hongliang ;
Ren, Pinyi .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (08) :7158-7169
[17]   Using a Large Data Set to Improve Industrial Wireless Communications Latency, Reliability, and Security [J].
Jiang, Xiaolin ;
Pang, Zhibo ;
Luvisotto, Michele ;
Pan, Fei ;
Candell, Richard ;
Fischione, Carlos .
IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2019, 13 (01) :6-12
[18]   Rate Adaptation for Secure HARQ Protocols [J].
Le Treust, Mael ;
Szczecinski, Leszek ;
Labeau, Fabrice .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (12) :2981-2994
[19]   Deep Cognitive Perspective: Resource Allocation for NOMA-Based Heterogeneous IoT With Imperfect SIC [J].
Liu, Miao ;
Song, Tiecheng ;
Gui, Guan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2885-2894
[20]   Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks [J].
Liu, Yuanwei ;
Qin, Zhijin ;
Elkashlan, Maged ;
Gao, Yue ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (03) :1656-1672