1. Introduction
The Internet of Things (IoT) is widely used in smart cities, transportation, automobiles, manufacturing, agriculture, healthcare, wearable devices, etc. As the use of communication equipment grows exponentially, the huge connection demand poses severe challenges to the limited communication resource utilization of 5G mobile networks [
1,
2]. Nonorthogonal multiple access (NOMA) has been considered as a potential technology for improving spectral efficiency and meeting capacity gain [
3]. The core idea of power domain NOMA is to exploit superposition coding and successive interference cancellation (SIC) to detect the desired signals and maintain mutual interference between users within a controllable range through reasonable control of power [
4]. At the same time, cooperative communication is an effective method to expand the transmission coverage of wireless networks and improve spectral efficiency [
5,
6]. Reference [
7] for the first time integrated cooperative communication with NOMA technology, which can further improve system efficiency in terms of capacity and reliability. Since then, many researchers have studied the cooperative NOMA (Co-NOMA) system to improve the spectrum usage efficiency under the current situation of increasingly valuable spectrum resources [
8,
9,
10,
11,
12,
13,
14,
15,
16].
In addition to the transmission with high throughput, different security threats are another important restriction on further IoT applications. Besides the information leakage caused by the open electromagnetic environment, NOMA users can multiplex simultaneously within a single resource block, which also makes wireless communication more vulnerable to security and privacy threats. Compared with the traditional upper-layer security technology, physical layer security (PLS) does not need to consume a lot of communication resources or infrastructure to share encryption technology between legitimate users, which is more suitable against wiretapping attacks in IoT networks [
17]. Therefore, various PLS technology adopted by the NOMA system, such as relay-aided diversity and cooperative jamming, has gradually attracted widespread attention from academia and is regarded as a research hotspot to achieve massive connectivity and secure transmission [
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25].
1.1. Related Work
In Co-NOMA systems, either relay nodes deployed in a dedicated manner [
7,
8,
9] or strong user relays [
10,
11,
12,
13,
14] with good channel conditions can be exploited to convey information-bearing signals. In [
7], the amplify-and-forward (AF) relaying ability was exploited instead of utilizing the decode-and-forward (DF) relaying technique. The authors of [
8] proposed an adaptive uplink and downlink cooperative jamming scheme in the scenario of untrusted relays for security enhancement. Compared with relay-assisted Co-NOMA, user-assisted Co-NOMA saves the infrastructure cost of dedicated relays and provides better use of spatial diversity, making it an attractive solution for cooperation in multi-user NOMA systems. An on/off mechanism was proposed in [
11,
12] based on whether the cooperative relay link is necessary. In [
11], the on/off relay decision was made in terms of the quality of service (QoS) requirement of the cell-edge user. In [
12], the intra-cell user forwards the signals of the cell-edge user after SIC only when the signal-to-interference-and-noise ratio (SINR) is greater than a predetermined threshold value. The authors of [
13] proposed a dynamic DF-based Co-NOMA scheme with user pairing strategies for spatially random users, which does not consume additional time slots and avoids self-interference in the full duplex (FD) mode. In [
14], space–time block code-aided Co-NOMA was exploited to reduce the number of SIC executed, and the performance was evaluated against practical challenges, such as imperfect timing synchronization and imperfect channel state information.
Due to the openness of the transmission medium in the wireless communication network, it is necessary to investigate the security issues in IoT. Relay selection (RS) can be exploited as a promising scheme to enhance PLS performance in the multi-relay wiretap Co-NOMA systems. In [
15], a novel priority-based buffer-assisted RS scheme was adopted to seamlessly combine the orthogonal multiple access transmission and NOMA, which significantly improved the data throughput in regions with both high and low signal-to-noise ratios (SNRs). Three RS schemes—optimal dual RS scheme, two-step single RS scheme, and optimal single RS scheme—were proposed, and the secrecy outage performance was analyzed in [
16]. The authors of [
18] proposed DF/AF-based optimal RS to improve reliability and security in Co-NOMA networks in the presence of untrusted users. In [
19], a cognitive collaboration method based on the combination of legitimate links and eavesdropping links was proposed in Co-NOMA cognitive wireless networks. It was also concluded in [
16,
19] that increasing the transmit power and the number of relays could further improve the security. A new cooperative relaying scheme based on a partial NOMA system was proposed in [
20]. In order to further improve the PLS of the proposed system, four cooperative schemes were designed in the consideration of the power allocations, channel conditions, decoding principles, imperfect SIC and eavesdropper (Eve) locations.
Adopting artificial noise (AN) or jamming signals to degrade Eve’s channel is also a popular PLS technique. For better overall system performance when using AN technology, two RS schemes—optimal relay–receiver pair selection and suboptimal RS—were combined in [
21]. In the multi-antenna Co-NOMA-based IoT network [
22], AN is generated from both the base station (BS) and the strong IoT node for achieving secure transmission of the system. Compared with half-duplex (HD), FD technology presents an opportunity to enable nodes to complete simultaneous receiving and transmitting on the given frequency band and double or even triple the data rate of the system, which not only improves spectral efficiency but also enhances PLS performance. Reference [
23] introduced a novel communication scheme that combined NOMA, beamforming, simultaneous wireless information and power transfer, and FD techniques to achieve a higher sum rate in the downlink commutation system. Additionally, three different cases of self-interference (SI) signal in FD mode were adopted to investigate the impact of SI cancellation on system secure performance. In [
24], one source established communication directly with a multi-antenna near-user, while the source used multiple FD relays to communicate with the distant user in the case of passive Eves. To solve this wiretapping problem, a new FD-based two-stage AN scheme was proposed, where AN is not only an interference signal to prevent eavesdropping but also acts as a secret key to enhance the confidentiality of the distant user. The authors of [
25] carried out the secrecy outage performance and secrecy diversity order analysis in large-scale NOMA with the aid of FD and AN.
As mentioned above, we find that (1) Co-NOMA technology assisted by FD can improve the spectral efficiency and system throughput; (2) based on the broadcast nature of wireless transmission, the above Co-NOMA system is vulnerable to be wiretapped from different Eve, and there is still a paucity of contributions on enhancing PLS performance in the Co-NOMA network; and (3) all of the above works focused on the system models over the Rayleigh fading channels. Additionally, there is a lack of performance evaluation metrics, i.e., considering outage probability (OP) and intercept probability (IP) in terms of the Co-NOMA system. Furthermore, to the best of our knowledge, there is little research on PLS under wiretap Co-NOMA network over the Nakagami-m fading channel. Motivated by that mentioned above, it is of great importance to investigate the security issues of a Co-NOMA network and design an efficient PLS enhancement scheme.
1.2. Contributions and Article Structure
In this article, we specifically consider the scenario of a downlink Co-NOMA system in the presence of a passive Eve, where a BS communicates directly with two NOMA users. We consider a more broadly representative wireless channel model with the app cation value: the Nakagami-
m fading channel, which can better describe channel fading under actual conditions. In such a system, the weak user may not be able to successfully decode the confidential information transmitted from the BS. Different from the HD mode exploited in [
19,
22], we employ the user relay aided by FD mode to further improve spectral efficiency. Therefore, based on the concept of Co-NOMA, the strong user decodes the information signal of the weak user after performing SIC successfully, and then re-encodes and retransmits the decoded information to the weak user. Moreover, we further achieve secure communication with legitimate users by exploiting the power-splitting technique. At the strong user, some of the power is allocated to the transmission of the information signal, and the rest is allocated to the generation of AN. The authors in [
25] assumed that AN is known to all legitimate users and remains unknown to Eve. In our article, AN is only known to the strong user, while unknown to the weak user and Eve, providing a lower bound of performance.
The key contributions of this article are summarized as follows:
We exploit both FD and AN techniques to improve the PLS performance of the Co-NOMA system, where the BS communicates directly with the strong user, while the weak user receives signals from both the BS and the strong user. In addition, the impact of the residual self-interference of FD on the system is also taken into account.
The closed-form expressions for the exact OP (reliability) and IP (security) are derived to demonstrate the security–reliability trade-off (SRT) of the proposed AN-aided Co-NOMA scheme. In order to further investigate the superiority of the proposed scheme, the SRT performance of Co-NOMA without AN and non-cooperative NOMA (Nco-NOMA) schemes are also compared.
We conduct extensive numerical simulations to verify the derivations in different system settings. It shows that Co-NOMA with AN can offer better SRT performance on the weak user over benchmark methods in the low SNR region, while not degrading the performance of the strong user under the condition that the co-channel interference can be sufficiently suppressed. Furthermore, optimal performance can be achieved by adjusting the power-sharing coefficients between the BS and the strong user as well as the ratio between the AN bearing and information bearing at the strong user.
The rest of this article is organized as follows. In
Section 2, we present the system model and propose the AN scheme.
Section 3 analyzes the SRT performance of the proposed AN-aided Co-NOMA scheme and builds the comparison with two other schemes. Numerical results are articulated in detail to validate the derived theoretical results in
Section 4. Finally,
Section 5 draws conclusions and suggests future works.
2. System Model
The considered AN-aided FD Co-NOMA system is illustrated in
Figure 1, which consists of one BS, two legitimate users and a passive Eve. With the purpose of further improving the SRT performance of the weak user
, the strong user
acts as a user relay, employing the decode-and-forward (DF) strategy. Therefore, two antennas are equipped at
, where one antenna receives signals from the BS and the other antenna forwards successfully decoded
to
. In addition, since HD technology requires additional time slot forwarding information,
works in the FD mode to send
and AN to
while receiving signals from the BS at the same time. The BS and
only need to send and receive messages, respectively, and thus, only a single antenna is equipped and works in HD mode.
At the beginning of each time slot, the BS and
are respectively equipped with
and
power levels, which satisfy
, and
P is the total power of the system. We assume that a complex channel estimation algorithm is used with enough training information to obtain full channel state information (CSI) at the receivers. The estimation errors caused by imperfect CSI [
26] can be left for future investigations. Based on the broadcast nature of wireless channels, Eve is able to intercept messages from the BS and the user relay. All channels are assumed to remain constant in one fading block but change independently between different fading blocks. Specifically, the channels coefficients from BS to
,
and Eve,
to
and Eve are represented by
, respectively. It is assumed that all of the above channels undergo independent block Nakagami-
m fading. Without loss of generality, the zero mean additive white Gaussian noise (AWGN) at
and Eve is denoted by
and
, with variances
and
, respectively.
2.1. Co-NOMA with AN
Referring to [
10,
27], the total number of time slots is
n, and we assume that
n is large enough, i.e.,
. A communication slot is defined as a time block during which the transmission of the message from the BS to two NOMA users is completed. We assume that the time slot boundaries are fully synchronized across all users. During the
t-th time slot, the BS broadcasts superimpose signal
to
and
, where
is a normalized signal with unit power received by
. According to the fundamental principle of NOMA, more power is distributed to the user with poor channels to maintain better fairness and QoS. Thus, we define
as the power allocation coefficient, which satisfies
and
. With the purpose of further enhancing the SRT performance of
,
forwards the re-encoded weak user signal
with power
, where
is the information-bearing ratio. At the same time, the remaining power
is exploited to generate AN
to confuse Eve. When
, it turns into the scenario of Co-NOMA without AN, where
forwards the signal of
with full power
. Similar to [
28],
is a normalized signal with unit power generated by a pseudo-random sequences generator. Throughout this article, a pessimistic assumption is made that AN is only known to
to provide the lower bounds of performance, which will degrade the channels of the eavesdropping link as well as the relay link. Due to computational limitations and practical non-ideality,
is unable to completely eliminate residual loop self-interference (LI) when working in FD mode [
27]. Therefore,
receives the superimposed mixed signal and LI signal simultaneously. The LI cancellation coefficient is defined as
, and
corresponds to the cancellation level for the LI signal. Thus, the received signals at
can be expressed as
where
is the processing delay at
, which satisfies the relation
. Referring [
29] chapter 6.2, based on the principle of the downlink NOMA system, the BS sends separate (i.e., independent) information to multiple receivers (the users). Therefore, the noncorrelation between signals
and
is assumed in the following parts.
Based on the SIC technique [
3],
first decodes the signal of
by treating
as interference. After reconstructing and subtracting the extracted signal
from the superimposed mixed signals and then decoding its own signal
, it is assumed that perfect SIC is performed at at
, and thus the received SINR at
to decode
and
are respectively given by
where
,
.
forwards the signal of
to
after successfully extracting the signal. Therefore, the received signal from the direct link and the relay link at
can be respectively represented by
To simplify the calculation, it is assumed that
.
is assigned more power, which can decode its own signal by treating the signal of
as noise. Due to the existence of residue interference between the direct link and relay link, the received SINR at
to decode
corresponding to the direct link and the relay link can be respectively written as
where
denotes the impact levels of residue interference.
As described in [
30,
31], the transmitted signals of the direct link from the BS and the relay link from
exist in a temporal separation. Referring to [
30,
32], we assume that the signals from
and the BS can be fully distinguished by
to obtain theoretical results for the actual NOMA system. This assumption is consistent with the ideal operation of rake receivers widely used in wireless systems, as well as a theoretical method called linear relay introduced in [
33]. Here, we provide the upper bounds of (6) and (7) in the following sections. Then, (6) and (7) can be respectively rewritten as
applies the selection combining (SC) technique to achieve enhanced performance while choosing the signal corresponding to the largest SINR as the output signal. Therefore, the output SINR after SC at
is given as
Similar to
, the received signal for the direct link and the relay link at Eve can be represented by
Similar to [
19], we consider the case with a weaker intercepting ability of Eve in the NOMA network. Specifically, Eve cannot unambiguously distinguish between multi-user data streams due to the inter-user interference caused by NOMA technology. Therefore, Eve will be interfered by
(or
) when it tries to decode
(or
) since Eve can only wiretap the signal of
from the BS, while wiretapping the signal of
from both the BS and
. We assume that
to simplify the analysis. Therefore, the wiretapped SINR at Eve for decoding
and
is given by
where
,
. Under the constraints of low complexity, Eve applies SC to pick up the signal corresponding to the largest SINR as the effective signal. Therefore, the received SINR at Eve for decoding
can be defined as
2.2. Nco-NOMA
In the Nco-NOMA system, only two NOMA users can obtain information from the BS.Therefore, the received signal at
and Eve can be expressed as
where
is the channel gain from the BS to
. Therefore, the received SINR at
to decode
can be given by
Therefore, the wiretapped SINR of
can be written as
4. Numerical Results
Monte Carlo simulations are provided in this section to validate the accuracy of the numerical results under different settings. Referring to [
25,
39] and without loss of generality, we set
,
,
,
,
dB,
,
,
,
,
,
,
, unless otherwise stated.
Figure 2 investigates the SRT of
under different parameters. The simulation values are the same as the corresponding analytical curves, which confirms the accuracy of the theoretical derivations. Since Eve can only eavesdrop on the signal of
from the BS, adding the relay link will have no effect on IP. Therefore, we mainly evaluate the outage performance of
. As can be seen from
Figure 2a, the trend of OP in the scenario of Co-NOMA with AN and Nco-NOMA is consistent with the increasing of
. As illustrated in
Section 2, the effective SINR at
decoding
and
is in direct proportion
, which affirms that the OP should decrease with the increasing
. At high SNR region, the effective SINR at
for Nco-NOMA continues to increase with the increasing of
, while approaching constants in Co-NOMA with AN. As a result, the performance of the
under the Nco-NOMA system continues to increase, while tending to be fixed under Co-NOMA with AN. Compared with Nco-NOMA, in the case of Co-NOMA with AN, the residual self-interference of
brings about the decrease in efficient SINR, which increases the OP of
. With the values of LI decreasing, the performance gap between Co-NOMA with AN and Nco-NOMA diminishes gradually. Therefore, when the LI is suppressed to be sufficiently small, the performance penalty of
caused by FD can be ignored.
Figure 2b plots the OP of
versus the increasing power allocation factor
in the case of Co-NOMA with AN. The increase in
has an opposite effect on the effective SINR at
decoding
and
. At the lower region of
, the OP of
is mainly dominated by
, which results in a downward trend of OP. However, at a higher region of
, the OP of
is mainly dominated by
, which brings about the increasing of OP. Consequently, based on the nonconvex nature of OP, there exists an optimal power allocation to achieve the optimal outage performance of
. In addition, it is obvious that the increasing residual self-interference has a significant effect on the outage performance due to the FD operation of
.
Figure 2c depicts the OP of
versus
and
. One can observe that as
increases, the OP of
declines gradually and eventually reaches saturation. As
decreases, the residual self-interference becomes weaker, which brings about the improvement of OP performance. Moreover, at the lower value of
, the transmission power of
becomes stronger, and thus the change of
has a greater influence on OP. In
Figure 2d, as the Nakagami-fade parameter
increases, the channels between the BS to Eve and
to Eve become stable, while performance improvements are more pronounced in areas with high transmit power. Furthermore, it is obvious that the IP of
increases with the increasing of the given secrecy rate threshold
.
Figure 3 presents the SRT of
versus with
and
for different values under three scenarios, respectively. The simulation values are consistent with the theoretical values, which validates the correctness of the theoretical derivations. In
Figure 3a, it is obviously observed that compared with Nco-NOMA, the outage performance of
is significantly improved with the assistance of the user relay, and thus Co-NOMA with AN and Co-NOMA schemes outperform those of the Nco-NOMA scheme. Furthermore, due to the decrease in the information-bearing ratio, the outage performance of Co-NOMA with AN is slightly inferior to Co-NOMA. In the case of Co-NOMA, Eve applies SC to eavesdrop
from both the BS and
. At the same time, the effective SINR to decode
at Eve becomes larger with the increasing of
. Therefore, compared to Co-NOMA, Co-NOMA with AN can notably improve security. As
increases, the effective SINR to decode
at
or Eve continues to increase. Therefore, the strength of signal
for three scenarios is enhanced simultaneously, and thus brings about the decrease in OP with the increase in
, while their corresponding IP increases. This result indicates that there exists a trade-off between reliability (OP) and security (IP) in the case of three scenarios. Therefore, SRT is analyzed in the following
Figure 3b. It can be observed that when
is less than 7 dB, the SRT of Co-NOMA is optimal. This is because the aid of the relay link greatly reduces the OP. With the increase in
, the security is sacrificed at the same time, which is necessary to exploit AN to improve security. When
is greater than 11 dB, the case of Co-NOMA with AN is slightly inferior to Nco-NOMA due to the increase in the interference of AN. Therefore, the proposed scheme has great advantages in the low SNR region. When
is 10, compared with Nco-NOMA and Co-NOMA, the SRP of Co-NOMA with AN is improved by 34% and is 2.22 times better, respectively.
Figure 3c,d evaluate the influence of various parameters on the performance of
under the scenario of Co-NOMA with AN. Since the FD residual interference of
will only affect OP of
,
Figure 3c presents OP versus power distribution coefficient
with different residual interference values. One observation is that the performance of
improves with the increase in
. This can be attributed to the fact that the power allocated to
becomes larger, resulting in the increase in effective SINR to decode
at
. Another observation is that the residual self-interference at
has little effect on the performance of
.
Figure 3d describes the SRT versus
and
. For the same
, the trend of SRT with
is consistent with
Figure 3b. In the region of low SNR, SRT increases as
increases and eventually stabilizes. In the region of high SNR, SRT first increases then decreases with
, and finally tends to stabilize. This is because as
increases, the OP of
decreases, while the IP increases. For the low value of SNR, SRT is mainly determined by the OP, while for the high value of SNR, SRT is mainly determined by the IP.
In order to further illustrate the extent to which OP and IP are influenced by the information-bearing ratio and transmission power of the BS,
Figure 4 plots the OP and IP of
in the case of Co-NOMA with AN.
Figure 4a shows the OP of
versus
and
; one can observe that as
increases, the residual interference of
becomes weaker, which brings about the improvement in outage performance. Moreover, at the higher value of
, as
increases, the OP of
is significantly improved and eventually reaches saturation with the assistance of the relay link. At the lower value of
, the outage performance initially improves gradually with the increasing
. As
continues to increase, the residual interference of
becomes stronger, resulting in a slight decrease in outage performance.
Figure 4b presents the IP of
versus
and
. The IP of
increases with the increasing value of
, which is consistent with that in
Figure 3a. When
is larger,
allocates more power to broadcast the signal of
, Eve eavesdrops on
by selecting the larger SINR from the BS and
as an effective SINR. While
is smaller, Eve primarily relies on the BS to decode the signal of
by utilizing SC, and thus, along with
increasing, IP increases. In addition, the change of
has a greater impact on the IP at the low value of
.