Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach

被引:76
|
作者
Lv, Lu [1 ,2 ]
Zhou, Fuhui [1 ,3 ]
Chen, Jian [1 ]
Al-Dhahir, Naofal [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
[2] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
[3] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Jiangxi, Peoples R China
[4] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Physical layer security; non-orthogonal multiple access; cooperative jamming; untrusted relay; ergodic secrecy sum rate; NONORTHOGONAL MULTIPLE-ACCESS; OPTIMAL POWER ALLOCATION; ARTIFICIAL-NOISE; TRANSMISSION; PERFORMANCE; SYSTEMS; DESIGN; SCHEME;
D O I
10.1109/TIFS.2019.2912337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a novel non-orthogonal multiple access (NOMA)-inspired jamming and relaying scheme to enhance the physical layer security of untrusted relay networks. Particularly, during the first phase, with the application of the downlink NOMA principle, the source sends a superimposed version of a desired signal and a jamming signal, where the jamming signal is designed to deliberately confuse the untrusted relay by exploiting the beamforming design and adapting the transmission rate at the source. During the second phase, relying on the uplink NOMA principle, the untrusted relay forwards its received signals and, simultaneously, the source transmits a new desired signal that cannot be wiretapped by the untrusted relay to maximize the secrecy sum rate. Scenarios of single-antenna and multiple-antenna relaying are considered, and the impact of different antenna configurations at the source and the untrusted relay on the secrecy performance is investigated. Analytical expressions of an ergodic secrecy sum rate (ESSR) lower bound and an asymptotic ESSR scaling law are derived to evaluate the secrecy performance of the proposed NOMA-inspired jamming and relaying scheme. Computer simulations are presented to validate the accuracy of the derived analytical results, and demonstrate the significant ESSR improvement of the proposed scheme over the conventional orthogonal multiple access-based relaying schemes.
引用
收藏
页码:3191 / 3205
页数:15
相关论文
共 50 条
  • [21] Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way Relaying
    Ma, Zonghao
    Lu, Yanhui
    Shen, Lingfeng
    Liu, Yili
    Wang, Ning
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 333 - 339
  • [22] Security at Physical Layer in NOMA Relaying Networks With Cooperative Jamming
    Chen, Bingcai
    Li, Rui
    Ning, Qian
    Lin, Kai
    Han, Chaoqi
    Leung, Victor C. M.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (04) : 3883 - 3888
  • [23] Relay Selection for Secure Cooperative Networks with Jamming
    Krikidis, Ioannis
    Thompson, John S.
    McLaughlin, Steve
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (10) : 5003 - 5011
  • [24] Secure NOMA and OMA coordinated transmission schemes in untrusted relay networks
    Lv, Lu
    Li, Zan
    Ding, Haiyang
    Chen, Jian
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (10)
  • [25] Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users
    Cao, Kunrui
    Wang, Buhong
    Ding, Haiyang
    Li, Tengyao
    Gong, Fengkui
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (02) : 1942 - 1955
  • [26] Secure NOMA and OMA coordinated transmission schemes in untrusted relay networks
    Lu Lv
    Zan Li
    Haiyang Ding
    Jian Chen
    [J]. Science China Information Sciences, 2021, 64
  • [27] Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes
    Wang, Wei
    Teh, Kah Chan
    Li, Kwok Hung
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2466 - 2476
  • [28] Secure NOMA and OMA coordinated transmission schemes in untrusted relay networks
    Lu LV
    Zan LI
    Haiyang DING
    Jian CHEN
    [J]. Science China(Information Sciences), 2021, 64 (10) : 266 - 267
  • [29] Relaying via Cooperative Jamming in Covert Wireless Communications
    Shahzad, Khurram
    [J]. 2018 12TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2018,
  • [30] Jamming Strategy and Security Performance Analysis for the Cooperative System with Untrusted Relay
    Zhou, Qian
    Zang, Guozhen
    Gao, Yuanyuan
    Song, Huiying
    [J]. PROCEEDINGS FIRST INTERNATIONAL CONFERENCE ON ELECTRONICS INSTRUMENTATION & INFORMATION SYSTEMS (EIIS 2017), 2017, : 473 - 478