An HARQ Assisted Cognitive NOMA Scheme for Secure Transmission With Imperfect SIC

被引:7
作者
Xiang, Zhongwu [1 ]
Yang, Weiwei [2 ]
Pan, Gaofeng [3 ]
Cai, Yueming [2 ]
Ding, Zhiguo [4 ,5 ]
Zou, Yulong [6 ]
机构
[1] Naval Univ Engn, Natl Key Lab Sci & Technol Vessel Integrated Pow, Wuhan 430033, Peoples R China
[2] Army Engn Univ PLA, Coll Commun Engn, Nanjing 210007, Peoples R China
[3] Beijing Inst Technol, Sch Informat & Elect, Beijing 100081, Peoples R China
[4] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[5] Univ Manchester, Sch Elect & Elect Engn, Manchester M13 9PL, Lancs, England
[6] Nanjing Univ Posts & Telecommun, Sch Telecommun & Informat Engn, Nanjing 210007, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
NOMA; Internet of Things; Quality of service; Silicon carbide; Resource management; Performance evaluation; Benchmark testing; non-orthogonal multiple access; hybrid automatic repeat request; physical layer security; NONORTHOGONAL MULTIPLE-ACCESS; NETWORKS; SYSTEMS; RELIABILITY; PERFORMANCE; INTERNET; SECRECY; DESIGN; ISSUES;
D O I
10.1109/TCOMM.2021.3050798
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper employs hybrid automatic repeat request (HARQ) to assist the cognitive non-orthogonal multiple access (NOMA) scheme for secure transmission in Internet of Things networks where the security-required (SR) users with high-security requirements and quality of services (QoS)-sensitive (QS) users with real-time process requirements are paired to perform NOMA for increasing the network connectivity. In addition, the imperfect successive interference cancellation (SIC) is considered at both legitimate users and eavesdropper for providing a realistic analysis. The closed-form expressions for the connection outage probability (COP), the secrecy transmission probability (RSP), and effective secrecy throughput (EST) of the SR user are derived in the proposed lightweight but efficient randomized retransmission scheme (RRS). As benchmarks, the secrecy performances of the fixed retransmission scheme (FRS) and orthogonal multiple access (OMA) scheme are also investigated. Besides, the asymptotic secrecy analysis is given to gain a better insight into secrecy performance. The analytical results developed in the paper demonstrate that HARQ is beneficial to secrecy transmission and the RRS outperforms or equals to the FRS and OMA scheme when the transmit power and secrecy coding redundancy is sufficiently high.
引用
收藏
页码:1930 / 1946
页数:17
相关论文
共 49 条
[21]   Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach [J].
Lv, Lu ;
Zhou, Fuhui ;
Chen, Jian ;
Al-Dhahir, Naofal .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) :3191-3205
[22]   Cognitive Non-Orthogonal Multiple Access with Cooperative Relaying: A New Wireless Frontier for 5G Spectrum Sharing [J].
Lv, Lu ;
Chen, Jian ;
Ni, Qiang ;
Ding, Zhiguo ;
Jiang, Hai .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (04) :188-195
[23]   Secure Industrial Internet of Things Critical Infrastructure Node Design [J].
McGinthy, Jason M. ;
Michaels, Alan J. .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8021-8037
[24]   On the Performance of HARQ Protocols With Blanking in NOMA Systems [J].
Mheich, Zeina ;
Yu, Wenjuan ;
Xiao, Pei ;
Ul Quddus, Atta ;
Maaref, Amine .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (11) :7423-7438
[25]   5G Radio Access: Requirements, Concept and Experimental Trials [J].
Nakamura, Takehiro ;
Benjebbour, Anass ;
Kishiyama, Yoshihisa ;
Suyama, Satoshi ;
Imai, Tetsuro .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (08) :1397-1406
[26]   On the Secrecy of UAV Systems With Linear Trajectory [J].
Pan, Gaofeng ;
Lei, Hongjiang ;
An, Jianping ;
Zhang, Shuo ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (10) :6277-6288
[27]   Achievable Diversity Order of HARQ-Aided Downlink NOMA Systems [J].
Shi, Zheng ;
Zhang, Chenmeng ;
Fu, Yaru ;
Wang, Hong ;
Yang, Guanghua ;
Ma, Shaodan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (01) :471-487
[28]   Cooperative HARQ-Assisted NOMA Scheme in Large-Scale D2D Networks [J].
Shi, Zheng ;
Ma, Shaodan ;
ElSawy, Hesham ;
Yang, Guanghua ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (09) :4286-4302
[29]   On the Fundamental Limits of Random Non-Orthogonal Multiple Access in Cellular Massive IoT [J].
Shirvanimoghaddam, Mahyar ;
Condoluci, Massimo ;
Dohler, Mischa ;
Johnson, Sarah J. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (10) :2238-2252
[30]   Secure Transmission in mmWave NOMA Networks With Cognitive Power Allocation [J].
Song, Yi ;
Yang, Weiwei ;
Xiang, Zhongwu ;
Wang, Biao ;
Cai, Yueming .
IEEE ACCESS, 2019, 7 :76104-76119