Next Article in Journal
Moderating Effect of Gender on the Relationship between Technology Readiness Index and Consumers’ Continuous Use Intention of Self-Service Restaurant Kiosks
Next Article in Special Issue
Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis
Previous Article in Journal
Research on Generation Method of Grasp Strategy Based on DeepLab V3+ for Three-Finger Gripper
Previous Article in Special Issue
CFM-RFM: A Cascading Failure Model for Inter-Domain Routing Systems with the Recovery Feedback Mechanism
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving Physical Layer Security of Cooperative NOMA System with Wireless-Powered Full-Duplex Relaying

1
Shaanxi Key Laboratory of Information Communication Network and Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
2
School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Information 2021, 12(7), 279; https://doi.org/10.3390/info12070279
Submission received: 7 June 2021 / Revised: 7 July 2021 / Accepted: 8 July 2021 / Published: 10 July 2021
(This article belongs to the Special Issue Secure and Trustworthy Cyber–Physical Systems)

Abstract

:
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively. In this paper, we study the physical layer security of a wireless-powered full-duplex (FD) relay-aided cooperative NOMA system. In particular, the source is wiretapped by an eavesdropper, and the FD relay assists the transmission from the source to a near user and a far user with self-energy recycling. To enhance the security performance of the system, we propose an artificial noise (AN)-aided cooperative transmission scheme, in which the relay emits a jamming signal to confuse the eavesdropper while receiving the signal from the source. For the proposed scheme, the ergodic secrecy sum rate (ESSR) is derived to characterize the secrecy performance and a lower bound of ESSR is obtained. Finally, numerical results verify the accuracy of the theoretical analysis of the proposed AN-aided secure transmission scheme. The superiority of the proposed scheme is also demonstrated since this scheme can achieve better secrecy performance, compared to the conventional cooperative NOMA scheme.

1. Introduction

With the development of the Internet of Things (IoT), the number of data traffics originated from wireless data services is exploding, which requires the 5G mobile communication system to satisfy higher spectral efficiency (SE), lower transmission delay, and higher reliability. Non-orthogonal multiple access (NOMA) can be applied in the power domain and significantly improves SE by using superposition coding and successive interference cancellation (SIC) techniques to serve multiple users simultaneously in the same time/frequency/code resource block. Full duplex (FD) is also a technique that can effectively improve SE. In particular, according to its characteristics, the FD relay is able to transmit and receive signals simultaneously [1]. Therefore, combining NOMA with FD has received increasing attention from both industry and academia [2].
Wireless energy harvesting (EH) is a promising technology for extending the lifetime of wireless nodes and improving energy efficiency in energy-constrained scenarios and can harvest energy from radio frequency signals [3]. In this regard, wireless EH has been conducted in half-duplex relaying systems to boost energy efficiency. Moreover, for FD relaying system, the self-interference can be viewed as an extra power source to facilitate wireless EH. The combination of wireless-powered FD technology and NOMA improves the SE of the system and provides energy supply to the energy-constrained nodes to increase their working time, which deserves significant attention and investigation. In [4], Yang et al. considered a decode-and-forward (DF) FD wireless relay network with self-energy recycling and analyzed the outage probability performance of this system. In [5], Liu et al. proposed a new cooperative NOMA scheme with simultaneous wireless information and power transfer (SWIPT), where the user close to the transmitter worked as a wireless-powered relay to help the far user. The authors in [6] investigated the outage performance of NOMA-based cooperative relaying systems, where SWIPT was applied at the near user to help the far user for data transmission. Moreover, in [7], Guo et al. proposed a cooperative NOMA network with EH and FD relay, which could effectively reduce the outage probability and improve the ergodic rate.
On the other hand, the security performance of wireless networks faces a great challenge due to the broadcast nature of wireless channels. Physical layer security (PLS) is an attractive approach to enhance information security by exploiting the inherent characteristics of wireless channels (e.g., fading, noise and interference) to ensure that eavesdroppers cannot wiretap legitimate information at the physical layer [8]. Therefore, PLS has been recognized as an effective method to enable secure communications. In recent years, many research interests have focused on dealing with the security issues in NOMA-enabled networks. In [9], Chen et al. analyzed the security performance of NOMA systems with cooperative relay, and the results indicated that amplify-and-forward (AF) and DF have almost the same impact on outage performance. In another study [10], Feng et al. proposed that the combination of FD and artificial noise (AN) techniques in cooperative NOMA networks can effectively reduce the secrecy outage probability (SOP). In [11], Liu et al. studied a cooperative NOMA system with the strong user as FD relay forwarding signals to the weak user, and the SOP could be improved by suppressing the self-interference (SI). Lv et al., in [12], considered a downlink and uplink cooperative NOMA system with an untrusted relay and proposed an AN-assisted method for enhancing the security performance. Lei et al., in [13], proposed three relay selection schemes in the NOMA network for Nakagami-m fading channels to improve SOP. Furthermore, in [14], Salem et al. investigated the secrecy performance of different relay selection schemes in cooperative NOMA systems, where the source node communicated with multiple users through multiple EH relays in the presence of passive eavesdroppers. Guo et al., in [15], analyzed the ergodic secrecy rate and SOP of a NOMA system with EH and FD relaying.
However, to the best of our knowledge, there are few works on the analysis of the secrecy performance of a cooperative NOMA system with wireless-powered FD relaying. Motivated by this, in this paper, we consider a cooperative NOMA system with wireless-powered FD relaying. The main contributions of this paper are summarized as follows:
  • We investigate a cooperative NOMA system with wireless-powered FD relaying. In particular, an AN-aided secrecy enhancing scheme is proposed for self-sustained FD relay to reduce the decoding performance of the eavesdropper, where the FD relay can harvest energy from the source and SI signal.
  • For the proposed AN-aided secrecy enhancing scheme, the lower bound of the ergodic secrecy sum rate (ESSR) is analyzed with closed-form expressions. In particular, the proposed scheme achieves a positive lower bound of ESSR, indicating that perfect secrecy can be guaranteed.
  • Monte Carlo simulations are provided to verify the accuracy of the theoretical analysis, and the superiority of the proposed AN-aided secure transmission scheme over the benchmark scheme is also presented. This indicates that adopting AN at the wireless-powered FD relay can significantly improve the secrecy performance in the cooperative NOMA systems.
The rest of the paper is organized as follows. Section 2 introduces the system model and the AN-aided secure transmission scheme. Section 3 analyzes the ESSR of our proposed scheme. Numerical results are evaluated in Section 4. Finally, the paper is concluded in Section 5.

2. System Model and the Proposed Scheme

2.1. System Model

As shown in Figure 1, we consider secure communications in a wireless-powered FD-relay-aided cooperative NOMA system. It consists of a source S, a DF relay R, two users (the near user U 1 and the far user U 2 ) , and an eavesdropper E. It is assumed that direct links between the source and the two users do not exist due to the shadow fading. The source, two users, and the eavesdropper are all equipped with a single antenna, whereas the relay is equipped with two antennas for receiving and transmitting simultaneously. We assume that the eavesdropper can wiretap the transmitted signals from the source and have the SIC ability, i.e., E will decode the signal of the far user U 2 before decoding the signal of the near user U 1 .
The whole transmission block time T is divided into two equal phases. In the first phase, the source transmits superposed signals to the relay, which adopts power splitting (PS) for EH and information decoding (ID). Relay is equipped with a battery that has sufficient initial power to supply transmission consumption before EH. At the same time, the FD relay emits AN to the eavesdropper, and the two users keep silent. In the second phase, the source only transmits energy symbol to the relay, and the relay employs DF protocol to forward signals to the two NOMA users while conducting EH from the source.
We consider Rayleigh fading channels. The channel coefficients between the links S R , R U 1 , R U 2 , R E , and S E are denoted as h s r , h r u 1 , h r u 2 , h s e , and h r e , respectively. We assume that all channels in the system obey independent complex Gaussian distribution with zero mean and variance ε s r , ε r u 1 , ε r u 2 , ε s e , and ε r e , respectively. The corresponding channel gains are denoted as g s r = h s r 2 , g r u 1 = h r u 1 2 , g r u 2 = h r u 2 2 , g s e = h s e 2 , and g r e = h r e 2 , respectively. The additive Gaussian white noise of R, U 1 , U 2 , and E are denoted as n r , n u 1 , n u 2 , and n e , respectively, and all of them are with mean zero and variance σ 2 . The whole transmit power of S is P s , and the signal-to-noise ratio (SNR) of the system is defined as ρ = P s σ 2 .

2.2. Proposed Scheme

In this subsection, we discuss the joint time and power allocation scheme in the cooperative NOMA network with wireless-powered FD relaying and propose an AN-aided secure transmission scheme to guarantee the secrecy performance of the system.
In the first phase, the source emits superposed signals to the relay. The superposed signals can be expressed as
x s = α 1 P s x 1 + α 2 P s x 2 ,
where x 1 and x 2 are information symbols for U 1 and U 2 , respectively; α 1 and α 2 are power allocation factors for user U 1 and user U 2 , respectively, satisfying α 1 < α 2 and α 1 + α 2 = 1 . FD relay harvests power from the received signal using PS architecture, i.e., the part of β P s 0 β 1 for EH and the rest part of ( 1 β ) P s for ID. At the same time, the relay emits a jamming signal w to the eavesdropper, and the two users keep silent. Therefore, the signals received at the relay and the eavesdropper are given by
y 1 , r = ( 1 β ) h s r x s + P 1 , r h r r w + n r ,
y e = h s e x s + P 1 , r h r e w + n e ,
where h r r is the SI channel and P 1 , r is the transmit power of R in the first phase.
The harvested energy at R in the first phase is given by
E 1 , r = T 2 η α 1 β P s h s r 2 + α 2 β P s h s r 2 + P 1 , r h r r 2 ,
where η ( 0 < η < 1 ) is the EH efficiency. The transmit power from R can be expressed as
P 1 , r = η β P s h s r 2 1 η h r r 2 .
The relay decodes the signals of x 1 and x 2 according to SIC. In NOMA, the SIC decoding of each receiver always starts from a weak signal to a strong signal. The signal-to-interference-plus-noise ratio (SINR) of R for decoding x 1 and x 2 can be written as
γ s r x 2 = 1 β α 2 ρ s h s r 2 1 β α 1 ρ s h s r 2 + ζ ρ 1 , r + 1 ,
γ s r x 1 = 1 β α 1 ρ s h s r 2 ζ ρ 1 , r + 1 ,
where ζ 0 , 1 is the residual SI coefficient due to imperfect self-interference cancellation.
We assume that there is a worst-case eavesdropping at E, and E has decoded x 2 before starting to decode x 1 . Thus, the received SINRs at E can be expressed as
γ s e x 2 = α 2 ρ s h s e 2 α 1 ρ s h s e 2 + ρ 1 , r h r e 2 + 1 ,
γ s e x 1 = α 1 ρ s h s e 2 ρ 1 , r h r e 2 + 1 .
In the second phase, the relay harvests energy from the source and transmits signals to the two users by using the DF protocol. Thus, the signals received at the relay, and two users can be expressed as
y 2 , r = β P s h s r x e + P 2 , r h r r v + n r ,
y u 1 = P 2 , r h r u 1 x r + n u 1 ,
y u 2 = P 2 , r h r u 2 x r + n u 2 ,
where x e is the energy symbol, which can be viewed as a kind of friendly information from the source [16], v is the residual SI symbol of R, P 2 , r is the transmit power of R in the second phase and x r is the superposed signal emitted by R.
The harvested energy at R in the second phase can be written as
E 2 , r = T 2 η α 1 β P s h s r 2 + α 2 β P s h s r 2 + P 2 , r h r r 2 .
The transmission power P 2 , r can be written as
P 2 , r = η β P s h s r 2 1 η h r r 2 .
In this phase, U 1 first decodes x 2 and subtracts it by SIC for decoding x 1 . The corresponding SINR of U 1 for decoding x 1 and x 2 are given by
γ r u 1 x 2 = α 2 ρ 2 , r h r u 1 2 α 1 ρ 2 , r h r u 1 2 + 1 ,
γ r u 1 x 1 = α 1 ρ 2 , r h r u 1 2 .
U 2 treats x 1 as the interference and decodes x 2 by using the following SINR
γ r u 2 x 2 = α 2 ρ 2 , r h r u 2 2 .

3. Performance Analysis

In this section, we evaluate the secrecy performance based on the ESSR metric and study the ESSR of the proposed AN-aided secrecy enhancing scheme. As mentioned in [17], it is important to study ESSR when the target data rate is adjusted according to the user’s channel conditions. The achievable rate at U 1 is obtained as
C s u 1 x 1 = 1 2 min log 2 1 + γ s r x 1 , log 2 ( 1 + γ r u 1 x 1 ) .
The achievable rate at U 2 is given by
C s u 2 x 2 = 1 2 min log 2 1 + γ s r x 2 , log 2 1 + γ r u 2 x 2 , log 2 1 + γ r u 1 x 2 .
The eavesdropping rate at E for x 1 and x 2 are
C e x 1 = 1 2 log 2 1 + γ s e x 1 ,
C e x 2 = 1 2 log 2 1 + γ s e x 2 .
Since the eavesdropper E only wiretaps the signals from the source, the secrecy sum rate of the cooperative NOMA transmission can be mathematically formulated as
C s s r = C s r x 1 C e x 1 + + C s r x 2 C e x 2 + ,
where Y + = max 0 , Y .
ESSR is adopted as a performance metric. Based on (18), the lower bound of ESSR for cooperative NOMA transmission can be obtained by using Jensen’s inequality, which can be written as
E C s s r C s s r , l b = Δ E C s r x 1 E C e x 1 + + E C s r x 2 E C e x 2 + .
Defining Z 1 = γ s r x 1 , we can obtain its cumulative distribution function (CDF) as
F Z 1 z 1 = Pr γ s r x 1 < z 1 = 1 e z 1 ( ζ ρ 1 , r + 1 ) 1 β α 1 ρ s ε s r .
Based on (24), E C s r x 1 can be calculated by
E C s r x 1 = 0 1 F Z 1 z 1 2 1 + z 1 d z 1 = 1 2 0 e z 1 ( ζ ρ 1 , r + 1 ) 1 β α 1 ρ s ε s r 1 + z 1 d z 1 = π 2 N n = 1 N 1 z n 2 2 1 + z n e z n ( ζ ρ 1 , r + 1 ) 1 β α 1 ρ s ε s r ,
where z n = cos 2 n 1 2 N π .
The ESSR of wiretaping x 1 at E can be expressed as
E C e x 1 = 1 2 0 0 log 1 + α 1 u s e u r e + 1 f U s e ( u s e ) f U r e ( u r e ) d u s e d u r e = 1 2 ρ s ρ 1 , r ε s e ε r e 0 0 log 1 + α 1 u s e u r e + 1 e u s e ρ s ε s e d u s e e u r e ρ 1 , r ε r e d u r e = 1 2 ρ s ρ 1 , r ε s e ε r e ρ s ε s e e 1 α 1 ρ s ε s e 0 e u r e α 1 ρ s ε s e u r e ρ 1 , r ε r e Ei 1 + u r e α 1 ρ s ε s e d u r e ( a ) π 2 2 N ρ 1 , r ε r e e 1 α 1 ρ s ε s e n = 1 N 1 z n 2 e tan θ n α 1 ρ s ε s e tan θ n ρ 1 , r ε r e Ei 1 + tan θ n α 1 ρ s ε s e sec θ n 2 .
where U s e = ρ s g s e , U r e = ρ r g r e ; step (a) is obtained by changing variable u r e = tan θ ; Ei ( . ) is the exponential integral function defined in ([18], Equation (8.211.1)). The integral part can be obtained by applying the Gauss–Chebyshev integral ([19], Equation (3.324.1)).
Moreover, defining Z 3 = γ s r x 2 , we can obtain its CDF as
F Z 3 z 3 = Pr γ s r x 2 < z 3 = 1 e z 3 ( ζ ρ 1 , r + 1 ) 1 β ρ s α 2 α 1 z 3 ε s r .
Based on (27), we can derive E C s r x 2 as
E C s r x 2 = 0 α 2 α 1 1 F Z 3 z 3 2 1 + z 3 d z 3 = 0 α 2 α 1 e z 3 ( ζ ρ 1 , r + 1 ) 1 β ρ s α 2 α 1 z 3 ε s r 2 1 + z 3 d z 3 = π 2 N n = 1 N α 2 1 z n 2 2 α 1 1 + z n × e z n ( ζ ρ 1 , r + 1 ) 1 β ρ s α 2 α 1 z n ε s r .
The ESSR of wiretaping x 2 at E can be expressed as
E C e x 2 = 1 2 1 ρ s ρ 1 , r ε s e ε r e 0 0 log 1 + u s e u r e + 1 1 + α 1 u s e 1 + u r e e u s e ρ s ε s e e u r e ρ 1 , r ε r e d u s e d u r e = 1 2 ρ s ρ 1 , r ε s e ε r e 0 e u r e ρ 1 , r ε r e d u r e 0 log 1 + u s e u r e + 1 e u s e ρ s ε s e d u s e 0 e u r e ρ 1 , r ε r e d u r e 0 log 1 + α 1 u s e u r e + 1 e u s e ρ s ε s e d u s e = E C e x 1 | α 1 = 1 E C e x 1 .
Substituting (25), (26), (28) and (29) into (23), the closed-form expression of ESSR can be derived as
C s s r , l b = Δ π 2 N n = 1 N 1 z n 2 2 1 + z n e z n ( ζ ρ 1 , r + 1 ) 1 β α 1 ρ s ε s r π 2 2 N ρ 1 , r ε r e e 1 α 1 ρ s ε s e n = 1 N 1 z n 2 e tan θ n α 1 ρ s ε s e tan θ n ρ 1 , r ε r e Ei 1 + tan θ n α 1 ρ s ε s e sec θ n 2 + + π 2 N n = 1 N α 2 1 z n 2 2 α 1 1 + z n e z n 1 β ρ s α 2 α 1 z n ε s r E C e x 2 + .
The procedures of the proposed AN-aided secure transmission scheme are summarized as follows. In the first phase, the source transmits the superposed signal to the relay, which adopts a power splitting architecture for energy harvesting and information decoding. At the same time, the FD relay emits AN to the eavesdropper, and the two users keep silent. We assume that there is a worst-case eavesdropping at E, and E has decoded x 2 before starting to decode x 1 . In the second phase, the source only transmits the energy symbol to the relay, and the relay employs DF protocol to forward the signal to the two NOMA users while conducting energy harvesting from the source. We evaluate the secrecy performance based on the ESSR metric and focus on the ESSR of the proposed AN-aided secrecy enhancing scheme. In particular, the lower bound of ESSR for cooperative NOMA transmission is calculated by using Jensen’s inequality, as shown in (23). Then, according to (24) and (27), E C s r x 1 and E C s r x 2 can be obtained, respectively. Furthermore, E C e x 1 and E C e x 2 can be calculated based on (26) and (29), respectively. Finally, substituting E C s r x 1 , E C s r x 2 , E C e x 1 , and E C e x 2 into (23), the lower bound of ESSR of the proposed AN-aided secure transmission scheme can be derived.

4. Simulations

In this section, we provide the numerical results of the proposed AN-aided secure transmission scheme to verify the correctness of the theoretical analysis in the previous section. Unless otherwise specified, the system parameters in the simulation are set as follows. The power allocation factors for the cooperative NOMA transmission are α 1 = 0.4 and α 2 = 0.6 , respectively. The transmit power of the base station is P s = 10 dBm , the noise power is σ i 2 = 40 dBm , η = 0.6 , and the Gauss–Chebyshev quadrature approximation is chosen as N = 20 . Moreover, the average channel gain is set to ε i = 1 i s r , r u 1 , r u 2 , s e , r e .
To provide a comparative analysis of the proposed scheme, a benchmark scheme is considered in the simulation. The benchmark scheme is the conventional FD cooperative NOMA transmission scheme without AN. Following the same analytical method of the proposed scheme, the lower bound of ESSR of the benchmark scheme can be derived as
C s s r , l b F D = Δ π 2 N n = 1 N 1 z n 2 2 1 + z n e z n ( ζ ρ r + 1 ) 1 β α 1 ρ s ε s r e z n 1 β α 1 ρ s ε s r 1 2 e 1 α 1 ρ s ε s e Ei 1 α 1 ρ s ε s e + + π 2 N n = 1 N α 1 1 z n 2 2 α 1 + α 2 1 + z n e 1 + z n ( ζ ρ r + 1 ) 1 β ρ s ε s r α 1 1 z n e 1 + z n ρ s ε r u 1 α 1 1 z n e 1 + z n 2 α 1 ρ s ε r u 2 π 2 N n = 1 N α 1 1 z n 2 2 α 1 + α 2 1 + z n e 1 + z n α 1 ρ s ε s e 1 z n + .
From the derived theoretical formula, we can find that the eavesdropping rate of the conventional FD cooperative NOMA scheme without AN is much higher than that of our proposed scheme because there is no AN for disturbing the eavesdropper. For the proposed scheme, all of the power harvested by the relay in the first phase is exploited to generate a jamming signal, which significantly degrades the wiretapping capability of the eavesdropper. Therefore, our proposed scheme can achieve higher ESSR.
Figure 2 plots the ESSR versus different power allocation factor β . It can be obtained that for the proposed scheme, the optimal value of ESSR can be observed as β increasing. This is because the increase of β will lead to an improvement in the SI at the relay and enhance the AN emitted by the relay. SI has an inhibiting effect on ESSR, while the increment of AN reduces the eavesdropper’s ability to improve ESSR. It can also be observed that by increasing the transmit power of the source, the ESSR performance of the system will become higher.
Figure 3 plots the theoretical analysis of the lower bound of ESSR and the simulation results versus the varying system transmit power P s . Since the ESSR is affected by the power allocation factor β , the results under different power allocation factors are also provided. It can be seen that the simulation results match well with the approximated expression in (26), which is consistent with the results shown in Figure 2. The results prove the theoretical analysis of ESSR.
Figure 4 depicts the ESSR with different channel gain settings. Since the lower bound of ESSR is affected by the channel gain setting, we have five different channel gain settings. In case 1 and case 2, we have ε s r = 4 and ε r e = 4 , respectively. In case 3, all the channel gains are set to 1. In case 4 and case 5, ε s r = 0.4 and ε r e = 0.4 , respectively.
This is because as ε re increases, the capability of the relay to perform cooperative jamming is enhanced. Therefore, the eavesdropping performance of E is reduced.
Figure 5 plots the ESSR versus the U 1 ’s power allocation factor α 1 . The ESSR of the system will improve as the U 1 ’s power allocation factor decreases. The results show that there is a boost to ESSR when more power is allocated to the weak user.
Figure 6 compares the ESSR of the proposed scheme with the conventional FD cooperative NOMA scheme without AN. It can be observed from the figure that our proposed scheme achieves higher ESSR than that of the conventional scheme over the whole range of the transmit power P s , which indicates that the AN-aided transmission strategy employed at the FD relay can significantly improve the secrecy rate. Therefore, considering the worst-case assumption of the strong detection capability at the eavesdropper, AN is necessary for enhancing the secrecy rate performance of the source node in the wireless-powered, FD-relay-aided cooperative NOMA system.

5. Conclusions

This paper investigates the design of secrecy enhancing transmission strategy in cooperative NOMA systems with wireless-powered FD relaying. An AN-aided secure transmission scheme based on FD relaying is proposed to improve the secrecy performance of the system. From this work, the positive lower bound of ESSR is achieved, indicating that the perfect secrecy performance can be guaranteed, and a higher ESSR is obtained, compared to the conventional cooperative NOMA scheme. In modern wireless networks, our work can be applied to prevent the leakage of confidential information against eavesdroppers with strong eavesdropping capability, which attracts a lot of attention from both academia and industry. In the future, our aim is to extend this work to the multi-relay scenario, where the optimal relay is selected to forward the information signal, and the remaining relays can transmit AN to the eavesdropper.

Author Contributions

Conceptualization, Y.R. and M.M.; methodology, Y.R. and Y.T.; investigation, Y.R. and Y.T.; writing—original draft preparation, Y.T.; writing—review and editing, Y.R. and X.Z.; supervision, X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

The financial support of the National Natural Science Foundation of China (NSFC) (Grant No. 61801382 and 62071377) and the Natural Science Foundation of Shaanxi Province (Grant No. 2020JQ-849 and 2021JQ-705) is gratefully acknowledged.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zeng, Y.; Zhang, R. Full-duplex wireless-powered relay with self-energy recycling. IEEE Wirel. Commun. Lett. 2015, 4, 201–204. [Google Scholar] [CrossRef] [Green Version]
  2. Ding, Z.; Fan, P.; Poor, H.V. On the coexistence between full-duplex and NOMA. IEEE Wirel. Commun. Lett. 2018, 7, 692–695. [Google Scholar] [CrossRef]
  3. Rauniyar, A.; Engelstad, P.E.; Osterbo, O.N. Performance Analysis of RF Energy Harvesting and Information Transmission Based on NOMA with Interfering Signal for IoT Relay Systems. IEEE Sens. J. 2019, 19, 7668–7682. [Google Scholar] [CrossRef] [Green Version]
  4. Yang, S.; Ren, Y.; Lu, G.; Wang, J. Optimal resource allocation for full-duplex wireless-powered relaying with self-energy recycling. In Proceedings of the 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi’an, China, 23–25 October 2019; pp. 1–6. [Google Scholar]
  5. Liu, Y.; Ding, Z.; Elkashlan, M.; Poor, H.V. Cooperative Non-orthogonal Multiple Access with Simultaneous Wireless Information and Power Transfer. IEEE J. Sel. Areas Commun. 2016, 34, 938–953. [Google Scholar] [CrossRef] [Green Version]
  6. Do, N.T.; Da Costa, D.B.; Duong, T.Q.; An, B. A BNBF User Selection Scheme for NOMA-Based Cooperative Relaying Systems With SWIPT. IEEE Commun. Lett. 2017, 21, 664–667. [Google Scholar] [CrossRef] [Green Version]
  7. Guo, C.; Zhao, L.; Feng, C.; Ding, Z.; Chen, H.-H. Energy Harvesting Enabled NOMA Systems with Full-Duplex Relaying. IEEE Trans. Veh. Technol. 2019, 68, 7179–7183. [Google Scholar] [CrossRef] [Green Version]
  8. Sun, L.; Du, Q. Physical layer security with its applications in 5G networks: A review. China Commun. 2017, 14, 1–14. [Google Scholar] [CrossRef]
  9. Chen, J.; Yang, L.; Alouini, M.-S. Physical Layer Security for Cooperative NOMA Systems. IEEE Trans. Veh. Technol. 2018, 67, 4645–4649. [Google Scholar] [CrossRef] [Green Version]
  10. Feng, Y.; Yang, Z.; Yan, S. Non-orthogonal multiple access and artificial-noise aided secure transmission in FD relay networks. In Proceedings of the 2017 IEEE Globecom Workshops (GC Wkshps), Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  11. Liu, C.; Zhang, L.; Xiao, M.; Chen, Z.; Li, S. Secrecy performance analysis in downlink NOMA systems with cooperative full-duplex relaying. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  12. Lv, L.; Jiang, H.; Ding, Z.; Yang, L.; Chen, J. Secrecy-Enhancing Design for Cooperative Downlink and Uplink NOMA with an Untrusted Relay. IEEE Trans. Commun. 2020, 68, 1698–1715. [Google Scholar] [CrossRef]
  13. Lei, H.; Yang, Z.; Park, K.-H.; Ansari, I.S.; Guo, Y.; Pan, G.; Alouini, M.-S. Secrecy Outage Analysis for Cooperative NOMA Systems with Relay Selection Schemes. IEEE Trans. Commun. 2019, 67, 6282–6298. [Google Scholar] [CrossRef] [Green Version]
  14. Salem, A.; Musavian, L.; Jorswieck, E.A.; Aissa, S. Secrecy Outage Probability of Energy-Harvesting Cooperative NOMA Transmissions With Relay Selection. IEEE Trans. Green Commun. Netw. 2020, 4, 1130–1148. [Google Scholar] [CrossRef]
  15. Guo, C.; Zhao, L.; Feng, C.; Ding, Z.; Wang, H.-M. Secrecy Performance of NOMA Systems With Energy Harvesting and Full-Duplex Relaying. IEEE Trans. Veh. Technol. 2020, 69, 12301–12305. [Google Scholar] [CrossRef]
  16. Yang, S.; Ren, Y.; Lu, G. Optimal power allocation for wireless-powered full-duplex cooperative NOMA system with partial CSI. In Proceedings of the 2020 IEEE Globecom Workshops (GC Wkshps), Taipei, Taiwan, 7–11 December 2020; pp. 1–5. [Google Scholar]
  17. Ding, Z.; Yang, Z.; Fan, P.; Poor, H.V. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users. IEEE Signal Process. Lett. 2014, 21, 1501–1505. [Google Scholar] [CrossRef] [Green Version]
  18. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 7th ed.; Academic: New York, NY, USA, 2007. [Google Scholar]
  19. Abramowitz, M.; Stegun, I. Handbook of Mathematical Functions with Formulas, Graphs, Mathematical Tables; Dover: New York, NY, USA, 1972. [Google Scholar]
Figure 1. Cooperative NOMA system with wireless-powered FD relay.
Figure 1. Cooperative NOMA system with wireless-powered FD relay.
Information 12 00279 g001
Figure 2. ESSR versus power allocation ratio β .
Figure 2. ESSR versus power allocation ratio β .
Information 12 00279 g002
Figure 3. ESSR versus the whole transmit power P s .
Figure 3. ESSR versus the whole transmit power P s .
Information 12 00279 g003
Figure 4. ESSR versus the whole transmit power P s with different channel gains.
Figure 4. ESSR versus the whole transmit power P s with different channel gains.
Information 12 00279 g004
Figure 5. ESSR versus the whole transmit power P s with different U 1 ’s power allocation ratios α 1 .
Figure 5. ESSR versus the whole transmit power P s with different U 1 ’s power allocation ratios α 1 .
Information 12 00279 g005
Figure 6. ESSR versus the whole transmit power P s with different schemes.
Figure 6. ESSR versus the whole transmit power P s with different schemes.
Information 12 00279 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ren, Y.; Tan, Y.; Makhanbet, M.; Zhang, X. Improving Physical Layer Security of Cooperative NOMA System with Wireless-Powered Full-Duplex Relaying. Information 2021, 12, 279. https://doi.org/10.3390/info12070279

AMA Style

Ren Y, Tan Y, Makhanbet M, Zhang X. Improving Physical Layer Security of Cooperative NOMA System with Wireless-Powered Full-Duplex Relaying. Information. 2021; 12(7):279. https://doi.org/10.3390/info12070279

Chicago/Turabian Style

Ren, Yuan, Yixuan Tan, Meruyert Makhanbet, and Xuewei Zhang. 2021. "Improving Physical Layer Security of Cooperative NOMA System with Wireless-Powered Full-Duplex Relaying" Information 12, no. 7: 279. https://doi.org/10.3390/info12070279

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop