arXiv:1811.03220v2 [cs.IT] 1 Sep 2019 NM)ntokoe Nakagami- over network multipl non-orthogonal (NOMA) assisted multiple-relay a of mance omncto ytm,rlyslcinshm,sceyou secrecy scheme, selection probability relay systems, communication oe loainotistesm D sTMRC. as dynamic SDO with same scheme power the OSRS fixed obtains with the allocation schemes and power RS SDO the zero all obtain scheme compared that allocation and performance proposed scheme secrecy TMRC our the the i that enhance the systems significantly demonstrate Furthermore, schemes NOMA can results cooperative the allocations. The of all power (SDO) obtained. for order dynamic diversity SOP clo and secrecy the asymptotic derive fixed the also ODRS with we for insights, and expressions validated more and TSRS, form get derived To are OSRS, simulations. scheme TMRC proposed via the with the along ou of schemes security for the (SOP) requirement for secre expressions probability secrecy closed-form the different the and users, between NOMA users correlation wit two users of the decod NOMA capacity the Considering successfully to that power. signals relay forward equal source the the all from combin which signals relays in multiple scheme traditional with (TMRC) performan systems outage analyze NOMA secrecy the the are examine of performance also we outage benchmark, secrecy selec a As the sche relay and (ODRS) selection single proposed relay are dual two-step optimal and scheme, scheme, (TSRS) (OSRS) NOMA by transmit power-domain selection opti relays i.e., via relay schemes, relay (RS) users decode-and-forward selection selected two relay all Three the the technology. to to Then signal users strategy. superposition two mapping des super the message the to broadcasts station of station base base the signal the slot, first from the signals At tion. transmit to utilized are rba(-al [email protected] slim.alouini 23955 [email protected]; Thuwal (KAUST), (e-mail: Technology Arabia and Science of University emi:[email protected]). Universit(e-mail: Southwest Processing, Information Intelligent hn emi:lijcuteuc;[email protected]) [email protected]; Cho Te Telecommunications, (e-mail: Communications and China Posts Mobile of of University Lab Chongqing Key Chongqing & Engineering eso h dcto iityo hn,CogigUniversi Chongqing China, of (e-mail:[email protected]). Ministry China. Education 400044, the of tems imran.ansari@gla (e-mail: Kingdom United 8QQ, G12 Glasgow th with deal to technologies promising most the of one as ered Works Related and Background A. .H akadM-.Aoiiaewt ES iiin igAb King Division, CEMSE with are Alouini M.-S. and Park K.-H. .Pni ihCogigKyLbrtr fNnierCircuit Nonlinear of Laboratory Key Chongqing with is Pan G. .Goi ihteKyLbrtr fOteetoi Technolo of Optoelectronic University of Laboratory Engineering, Key the of with School is Guo the Y. with is Ansari S. I. Inform and Communication of School with are Yang Z. and Lei H. received. Manuscript Abstract ne Terms Index o-rhgnlmlil ces(OA a enconsid- been has (NOMA) access multiple Non-orthogonal erc uaeAayi o oprtv NOMA Cooperative for Analysis Outage Secrecy Ti ae osdr h erc uaeperfor- outage secrecy the considers paper —This Nnotooa utpeacs,cooperative access, multiple —Non-orthogonal ytm ihRlySlcinScheme Selection Relay with Systems .I I. NTRODUCTION ogin e,Zxa ag iHn ak ma hfiu Ans Shafique Imran Park, Ki-Hong Yang, Zixuan Lei, Hongjiang oga u,GoegPn n oae-lmAlouini Mohamed-Slim and Pan, Gaofeng Guo, Yongcai m aigcanl.Toslots Two channels. fading ,Cogig400715, Chongqing y, @kaust.edu.sa). . gig400065, ngqing y Chongqing ty, sgow.ac.uk). 60,Saudi -6900, yadSys- and gy a single mal chnology, position Glasgow, access e dullah and s tina- ation tage tage sed- tion two me, ing cy ce to d. h e e s s s eevdsgas n hndcdstesgasfritself. for th signals from the it decodes cancels then user, and weaker signals, the firstly to systems received NOMA sent in signal user the stronger decodes the node, source tran the signal and by superposition bandwidth ultra-connectivity, the high receiving fairness, After as flexibility. user NOMA such merits, better schemes, superior efficiency, access obtain Compared multiple can [1]-[9]. systems orthogonal network mobile traditional i (5G) to fairness generation user enhance fifth and the resources bandwidth of shortage srly oipoetepromneo hs ekrusers Ding utilized weaker [11]. those be [10], of conditions can performance channel the users poor in the improve with stronger users to for the relays messages stronger as therefore the the decode users, Since firstly weaker destinations. always the systems also NOMA technology at but diversity utilized coverage when network’s performance is the system extends the only enhances not that nique ln ihisegdcsmrt n Pwr netgtdin investigated were OP and sum-rate [15]. ergodic systems its power NOMA novel with relaying a along dual-hop Moreover, for [14]. scheme of [13], (PA) bound [12], allocation lower in and derived exact and were the systems OP multiple for NOMA expressions cooperative with closed-form the example, the relay in For utilized (AF) was nodes. antennas amplify-and-forward relay dedicated dedicated cooperat a with the derived on systems were focused throughput literatures NOMA many system Recently, closed-form and [11]. the OP in and the proposed for was expressions protocol a pow user Furthermore, NOMA and [10]. transfer on information in wireless based simultaneous complexity cooperative approach cooperativ system new an reduce of to proposed order pairing and diversity systems, (OP), NOMA probability outage the bandadterslssoe htF easoutperform relays FD that Liu weaker showed was relays. OP (HD) the results for half-duplex to expression the closed-form signals and The forward [18]. obtained to and [17] utilized in in working was user user mode stronger FD the the better example, and For efficiency [16]. spectral higher performance obtain to systems NOMA ekruesi 1] 2] h efrac fF cooperativ FD of the performance of The performance [20]. dedi- [19], the the The in improve users become to scenarios. weaker utilized will many was relay in users FD systems weaker cated NOMA the interfer of as of bottleneck user b performance stronger signals the its the decodes then for user signals allocatio weaker treating the power directly Since optimal [18]. the in for policies obtaining expression thereby systems closed-form NOMA the cooperative FD and HD for oprtv omncto sapriual trciete attractive particularly a is communication Cooperative uldpe F)rlyas a enuiie ncooperativ in utilized been has also relay (FD) Full-duplex tal. et ari nlzdteP problems PA the analyzed tal. et analyzed smitted ence, high ch- ive er n y n e e e e 1 2
NOMA systems over Nakagami-m channels was investigated The secrecy performance of a NOMA system with multiple in [19] and the analytical expressions for OP and ergodic eavesdroppers was investigated while zero-forcing and mini- rate were derived. In [20], a sharing FD relay was utilized mum mean-square error decoding schemes were utilized on in NOMA systems with two source-destination pairs and the the legitimate destinations in [39]. A new joint subcarrier ergodic rate, OP, and outage capacity were investigated while (SC) assignment and PA scheme was proposed to improve both perfect and imperfect self-interference cancellation (SIC) the security of the two-way relay NOMA systems in [40]. schemes were considered, respectively. The secrecy performance of a cooperative NOMA system Relay selection (RS) technique is an effective scheme in with a dedicated AF/DF relay was investigated and the closed- making full use of space diversity with low implementation form expressions for the SOP were obtained in [41]. In some complexity and it can straightforwardly improve the spectral scenarios, the relay in cooperative NOMA systems is untrusted efficiency of cooperative systems [21], [22]. Considering the and curious to decode the users’ messages. Two new HD quality of service (QoS) requirements for the two users are nonorthogonal AF schemes were proposed for cooperative different, a two-stage single-relay-selection strategy and dual- NOMA systems with an untrusted relay and the secrecy relay-selection with fixed power allocation (FPA) was studied rate maximization-based PA scheme was discussed in [42]. in [23] and [24], respectively, in order to obtain the OP. The Arafa et al. proposed two new relaying schemes to resist the results showed that the two-stage strategy achieves a better OP untrusted relay and the secrecy performance of cooperative and diversity gain. Combining DF and AF relaying, Yang et al. NOMA systems with new relaying schemes was analyzed and extended the two-stage RS scheme with dynamic power allo- compared in [43]. Feng et al. proposed an artificial-noise (AN) cation (DPA) and derived the exact and asymptotic analytical aided scheme to build up secure cooperative NOMA systems expressions for OP in [25]. In [26], considering whether the with a FD relay and the closed-form expression for the SOP relay can correctly decode two users’ messages, two optimal was derived in [44]. The secrecy performance of cooperative RS schemes were proposed for cooperative NOMA systems NOMA systems in which the stronger user behaves as a FD with FPA and DPA at the relays, respectively. Yue et al., in relay was investigated in [45] and the SOP was analyzed with [27], studied the performance of cooperative NOMA systems an assumption of the imperfect SIC. The security-reliability with two RS schemes in which the relay operates in either tradeoff for both cooperative and non-cooperative NOMA FD or HD mode. Modeling the spatial topology of relays with schemes was analyzed and analytical expressions for SOP homogeneous poisson point process (PPP), the performance of were derived in [46]. cooperative NOMA systems with two-stage RS scheme was analyzed in [28] and a closed-form approximation for the OP B. Contributions was obtained. To deal with the security issues followed by the explosive In many works, such as [32], [34], [41], the worst-case increase in cellular data, physical layer security (PLS) is scenario was considered, in which it is assumed that the emerging as one of the most promising ways to ensure eavesdroppers have powerful detection capabilities and they secure communication basing on the time varying nature of can extract the message from the signals transmitted from the wireless channels [29], [30]. A new optimal PA strategy the resource. Under this assumption, one can realize that the was proposed to maximize the secrecy sum rate of NOMA secrecy capacity of both/all the users in NOMA systems are systems and the results confirmed that a significant secrecy not independent [34]. The major contributions of this paper performance for NOMA systems was obtained in [31]. In are as follows, [32], the security performance of a NOMA-based large-scale 1) In this work, we analyze a cooperative NOMA system network is considered, where both the NOMA users and with multiple relays and an eavesdropper employing eavesdroppers were modeled by homogeneous PPPs. In [33], RS schemes to enhance the secrecy performance. Three we investigated the secrecy outage performance of a multiple- RS (OSRS, TSRS, and ODRS) schemes are proposed. input single-output (MISO) NOMA systems with transmit For the purpose of comparison, we also investigate antenna selection (TAS) schemes and the closed-form ex- the secrecy performance of the NOMA systems with pressions for secrecy outage probability (SOP) were derived. traditional multiple relays combining (TMRC) scheme The results demonstrated that the proposed DPA scheme can in which all the relays that successfully decode signals achieve non-zero secrecy diversity order (SDO) for all the from the source forward signals to the NOMA users TAS schemes. The secrecy outage performance of multiple- with equal power. Considering the correlation between input multiple-output (MIMO) NOMA systems with multiple the secrecy capacity of two users, the closed-form ex- legitimate and illegitimate receivers was studied in [34] and pressions for the SOP under different RS schemes are the closed-form expressions for SOP were subsequently ob- derived and validated via simulations. tained. Feng et al. proposed in [35] a new PA to maximize 2) Different secrecy QoS is considered in our work, i.e., the secrecy rate of the stronger user while guaranteeing the different secrecy threshold rates are requested for the non-secure transmission rate requirement to the weaker user, two NOMA users. Although the weaker user cannot but the secrecy performance of the weaker user was not perform SIC, either the stronger or the weaker user will considered. Secrecy beamforming schemes were proposed for be the bottleneck of the cooperative NOMA system. MISO-NOMA systems, cognitive MISO-NOMA systems, and Our results demonstrate that this depends on the power MIMO-NOMA systems in [36], [37], and [38], respectively. allocation parameters and secrecy rate thresholds. 3
where ~ ∈ {S, Rk} signifies the transmitter, λ¯ ∈ R1 U1 {Rk,U1,U2, E} denotes the receiver, Γ (·) is Gamma function, Rk ~ ~ GU as defined by (8.310.1) of [47], mλ¯ and Ωλ¯ are the fading S parameters and average channel power gains, respectively. G Rk GU Rk R S k U2 To make analysis simple, it is assumed that the links of the
Rk GE first hop are independent and identically distributed (i.i.d.), which means mS m , S . The same assumption Rk = R ΩRk =ΩR R K E is made to the links between Rk and each receiver in the second hop, which means mRk mRk m , Rk , U1 = U2 = U ΩU1 = Ω1 Rk , mRk m , and Rk . ΩU2 =Ω2 E = E ΩE =ΩE Fig. 1. System model demonstrating a cooperative NOMA system with one Two time slots are assumed to utilize to the communication resource (S), multiple relays (Rk, k = 1, ··· ,K), two legitimate user (U1 and U2), and an illegitimate eavesdropper (E). between S and the NOMA users. In the first time slot, S broadcasts the superposition signal to all relays by message mapping strategy, which is utilized and proved optimal to 3) To obtain more insights, we also derive the closed-form achieve the minimal common OP in [26]. During the second expressions for the asymptotic SOP under different RS time slot, a relay is selected using the RS scheme proposed schemes with FPA and DPA. Furthermore, the SDO below to send superposition signal to the two NOMA users. of cooperative NOMA systems are derived. The results We assume all the relays are close enough such that the relative demonstrate that all the RS schemes with FPA obtain distance between the two users and the relay is determined. zero SDO and the OSRS scheme achieves the same SDO To make the representation clear and simple, we use as TMRC scheme. GRk = Gk. It is also assumed that U has a better channel Ui i 1 4) Differing from [32], [34], [41], wherein it has been k k condition than U2 G1 > G2 , which is adopted in many assumed that the secrecy capacity for the stronger and NOMA studies, e.g., [5], [16], [17], [18], [26], [33]. Then the weaker users is independent, correlation between the signal-to-interference-noise ratio (SINR) of the NOMA users secrecy capacity of the two users and different secrecy can be written as requirement for the two users is considered in this work, γk = α ρGk, (3) which is more practical. 1 1 1 α ρGk C. Organization γk = 2 2 , (4) 2 α ρGk This paper is organized as follows, in Section II, the system 1 2 +1 model and RS schemes are introduced. In Section III, we ana- where αi (i =1, 2) represents the power allocation coeffi- lyze the security outage performance of the proposed system. cients at the kth relay, α1 + α2 =1, α1 > α2, and ρ signifies The asymptotic SOP for cooperative NOMA systems with the transmit signal to noise ratio (SNR). FPA and DPA are derived in Sections IV and V, respectively. Numerical and simulation results are presented in Section VI III. SECRECY OUTAGE PROBABILITY ANALYSIS to demonstrate the security performance of the system. Finally, The set of relays that can correctly decode mixed signals Section VII concludes the paper. from S can be expressed as
II. SYSTEM MODEL ∆ 1 S th th Φ = k :1 ≤ k ≤ K, log 1+ ρSG ≥ R + R , As shown in Fig. 1, we consider a cooperative downlink 2 2 Rk 1 2 NOMA system that consists of a base station (S), K (K ≥ 1) (5) where the factor 1 arises from the fact that two slots are DF HD relays (Rk, k = 1, ··· ,K), and two users (U1 and 2 required to complete the data transmission, ρS denotes the U2). An eavesdropper (E) wants to wiretap the information th through decoding the received signals. It is assumed that all transmit SNR at S, and Ri (i =1, 2) is the data rate nodes are equipped with a single antenna and the direct link threshold for Ui. Thus the SOP of cooperative NOMA systems between S and both users are unavailable due to deep fading. can be written as K The communication links between S and all the receivers (U1, U2, and E) are relayed by Rk. Pout = Pr (|Φ| = n) PΦn , (6) n=0 The probability density function (PDF) and the cumulative X distribution function (CDF) of the channel power gains of link where PΦn denotes the SOP under the condition that there between the source node ~ and the destination node λ¯ can be are n relays that correctly decode the mixed signals. One can expressed by easily have PΦ0 =1.
~ ~ It is assumed that all the links between the source and the m mλ¯ −1 ~ k − λ¯ x k Ω~ mλ¯ x relays are i.i.d., so we have FG~ (x)=1 − e λ¯ ~ , (1) λ¯ Ω k! k=0 λ¯ n S n S K−n X Pr {|Φ| = n} = CK Pr GRk ≥ η Pr GRk < η ~ ~ ~ m m m −1 ~ λ¯ λ¯ n n K−n x λ¯ m − ~ x λ¯ Ω = CK χ (1− χ) , fG~ (x)= ~ ~ e λ¯ , (2) λ¯ Γ m Ω (7) λ¯ λ¯ 4
TMRC s TMRC TMRC TMRC Pr Cs,2 > R1 = Pr ρ1G2 1 − θ2α1 − θ2α1α2ρ1GE >θ2 − 1+ θ2α2ρ1GE ∆ (13) =Λ = Pr Λ > 0, GTMRC| >δ GTMRC{z } 2 2 E TMRC TMRC TMRC = Pr GE