Next Article in Journal
Applications and Technologies of Big Data in the Aerospace Domain
Next Article in Special Issue
Active STARS-Assisted Rate-Splitting Multiple-Access Networks
Previous Article in Journal
On Combining Wavefront and Tile Parallelism with a Novel GPU-Friendly Fast Search
Previous Article in Special Issue
Optimization Design for Sparse Planar Array in Satellite Communications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhancing Physical Layer Security of Cooperative Nonorthogonal Multiple Access Networks via Artificial Noise

1
College of Communications Engineering, Army Engineering University of PLA, Nanjing 210007, China
2
Nanjing LES Information Technology Co., Ltd., Nanjing 210014, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(10), 2224; https://doi.org/10.3390/electronics12102224
Submission received: 10 April 2023 / Revised: 10 May 2023 / Accepted: 11 May 2023 / Published: 13 May 2023

Abstract

:
The massive connectivity requirement and security issues have become major factors restricting the further development of the Internet of Things. Nonorthogonal multiple access (NOMA) can be combined with physical layer security (PLS) to achieve massive connectivity and secure transmission. This article investigates the PLS performance for a downlink communication system over Nakagami-m fading channels, with full-duplex (FD) cooperative NOMA transmission aided by artificial noise (AN). While direct communication is built between the base station and two NOMA users, the strong user is employed as an FD relay as well as the jammer to enhance the PLS of the legitimate transmission in the presence of a passive eavesdropper (Eve). Closed-form analytical expressions in terms of the outage probability of the legitimate users and the intercept probability of Eve are derived to evaluate the security–reliability trade-off (SRT) of the proposed scheme. Monte Carlo simulations are provided to validate the veracity of the theoretic analyses and illustrate that the proposed scheme is superior in terms of SRT to the benchmark schemes in the low SNR region. Furthermore, the results reveal that the SRT performance of the two NOMA users can be enhanced through a proper AN-bearing ratio and power allocation optimization.

1. Introduction

The Internet of Things (IoT) is widely used in smart cities, transportation, automobiles, manufacturing, agriculture, healthcare, wearable devices, etc. As the use of communication equipment grows exponentially, the huge connection demand poses severe challenges to the limited communication resource utilization of 5G mobile networks [1,2]. Nonorthogonal multiple access (NOMA) has been considered as a potential technology for improving spectral efficiency and meeting capacity gain [3]. The core idea of power domain NOMA is to exploit superposition coding and successive interference cancellation (SIC) to detect the desired signals and maintain mutual interference between users within a controllable range through reasonable control of power [4]. At the same time, cooperative communication is an effective method to expand the transmission coverage of wireless networks and improve spectral efficiency [5,6]. Reference [7] for the first time integrated cooperative communication with NOMA technology, which can further improve system efficiency in terms of capacity and reliability. Since then, many researchers have studied the cooperative NOMA (Co-NOMA) system to improve the spectrum usage efficiency under the current situation of increasingly valuable spectrum resources [8,9,10,11,12,13,14,15,16].
In addition to the transmission with high throughput, different security threats are another important restriction on further IoT applications. Besides the information leakage caused by the open electromagnetic environment, NOMA users can multiplex simultaneously within a single resource block, which also makes wireless communication more vulnerable to security and privacy threats. Compared with the traditional upper-layer security technology, physical layer security (PLS) does not need to consume a lot of communication resources or infrastructure to share encryption technology between legitimate users, which is more suitable against wiretapping attacks in IoT networks [17]. Therefore, various PLS technology adopted by the NOMA system, such as relay-aided diversity and cooperative jamming, has gradually attracted widespread attention from academia and is regarded as a research hotspot to achieve massive connectivity and secure transmission [15,16,17,18,19,20,21,22,23,24,25].

1.1. Related Work

In Co-NOMA systems, either relay nodes deployed in a dedicated manner [7,8,9] or strong user relays [10,11,12,13,14] with good channel conditions can be exploited to convey information-bearing signals. In [7], the amplify-and-forward (AF) relaying ability was exploited instead of utilizing the decode-and-forward (DF) relaying technique. The authors of [8] proposed an adaptive uplink and downlink cooperative jamming scheme in the scenario of untrusted relays for security enhancement. Compared with relay-assisted Co-NOMA, user-assisted Co-NOMA saves the infrastructure cost of dedicated relays and provides better use of spatial diversity, making it an attractive solution for cooperation in multi-user NOMA systems. An on/off mechanism was proposed in [11,12] based on whether the cooperative relay link is necessary. In [11], the on/off relay decision was made in terms of the quality of service (QoS) requirement of the cell-edge user. In [12], the intra-cell user forwards the signals of the cell-edge user after SIC only when the signal-to-interference-and-noise ratio (SINR) is greater than a predetermined threshold value. The authors of [13] proposed a dynamic DF-based Co-NOMA scheme with user pairing strategies for spatially random users, which does not consume additional time slots and avoids self-interference in the full duplex (FD) mode. In [14], space–time block code-aided Co-NOMA was exploited to reduce the number of SIC executed, and the performance was evaluated against practical challenges, such as imperfect timing synchronization and imperfect channel state information.
Due to the openness of the transmission medium in the wireless communication network, it is necessary to investigate the security issues in IoT. Relay selection (RS) can be exploited as a promising scheme to enhance PLS performance in the multi-relay wiretap Co-NOMA systems. In [15], a novel priority-based buffer-assisted RS scheme was adopted to seamlessly combine the orthogonal multiple access transmission and NOMA, which significantly improved the data throughput in regions with both high and low signal-to-noise ratios (SNRs). Three RS schemes—optimal dual RS scheme, two-step single RS scheme, and optimal single RS scheme—were proposed, and the secrecy outage performance was analyzed in [16]. The authors of [18] proposed DF/AF-based optimal RS to improve reliability and security in Co-NOMA networks in the presence of untrusted users. In [19], a cognitive collaboration method based on the combination of legitimate links and eavesdropping links was proposed in Co-NOMA cognitive wireless networks. It was also concluded in [16,19] that increasing the transmit power and the number of relays could further improve the security. A new cooperative relaying scheme based on a partial NOMA system was proposed in [20]. In order to further improve the PLS of the proposed system, four cooperative schemes were designed in the consideration of the power allocations, channel conditions, decoding principles, imperfect SIC and eavesdropper (Eve) locations.
Adopting artificial noise (AN) or jamming signals to degrade Eve’s channel is also a popular PLS technique. For better overall system performance when using AN technology, two RS schemes—optimal relay–receiver pair selection and suboptimal RS—were combined in [21]. In the multi-antenna Co-NOMA-based IoT network [22], AN is generated from both the base station (BS) and the strong IoT node for achieving secure transmission of the system. Compared with half-duplex (HD), FD technology presents an opportunity to enable nodes to complete simultaneous receiving and transmitting on the given frequency band and double or even triple the data rate of the system, which not only improves spectral efficiency but also enhances PLS performance. Reference [23] introduced a novel communication scheme that combined NOMA, beamforming, simultaneous wireless information and power transfer, and FD techniques to achieve a higher sum rate in the downlink commutation system. Additionally, three different cases of self-interference (SI) signal in FD mode were adopted to investigate the impact of SI cancellation on system secure performance. In [24], one source established communication directly with a multi-antenna near-user, while the source used multiple FD relays to communicate with the distant user in the case of passive Eves. To solve this wiretapping problem, a new FD-based two-stage AN scheme was proposed, where AN is not only an interference signal to prevent eavesdropping but also acts as a secret key to enhance the confidentiality of the distant user. The authors of [25] carried out the secrecy outage performance and secrecy diversity order analysis in large-scale NOMA with the aid of FD and AN.
As mentioned above, we find that (1) Co-NOMA technology assisted by FD can improve the spectral efficiency and system throughput; (2) based on the broadcast nature of wireless transmission, the above Co-NOMA system is vulnerable to be wiretapped from different Eve, and there is still a paucity of contributions on enhancing PLS performance in the Co-NOMA network; and (3) all of the above works focused on the system models over the Rayleigh fading channels. Additionally, there is a lack of performance evaluation metrics, i.e., considering outage probability (OP) and intercept probability (IP) in terms of the Co-NOMA system. Furthermore, to the best of our knowledge, there is little research on PLS under wiretap Co-NOMA network over the Nakagami-m fading channel. Motivated by that mentioned above, it is of great importance to investigate the security issues of a Co-NOMA network and design an efficient PLS enhancement scheme.

1.2. Contributions and Article Structure

In this article, we specifically consider the scenario of a downlink Co-NOMA system in the presence of a passive Eve, where a BS communicates directly with two NOMA users. We consider a more broadly representative wireless channel model with the app cation value: the Nakagami-m fading channel, which can better describe channel fading under actual conditions. In such a system, the weak user may not be able to successfully decode the confidential information transmitted from the BS. Different from the HD mode exploited in [19,22], we employ the user relay aided by FD mode to further improve spectral efficiency. Therefore, based on the concept of Co-NOMA, the strong user decodes the information signal of the weak user after performing SIC successfully, and then re-encodes and retransmits the decoded information to the weak user. Moreover, we further achieve secure communication with legitimate users by exploiting the power-splitting technique. At the strong user, some of the power is allocated to the transmission of the information signal, and the rest is allocated to the generation of AN. The authors in [25] assumed that AN is known to all legitimate users and remains unknown to Eve. In our article, AN is only known to the strong user, while unknown to the weak user and Eve, providing a lower bound of performance.
The key contributions of this article are summarized as follows:
  • We exploit both FD and AN techniques to improve the PLS performance of the Co-NOMA system, where the BS communicates directly with the strong user, while the weak user receives signals from both the BS and the strong user. In addition, the impact of the residual self-interference of FD on the system is also taken into account.
  • The closed-form expressions for the exact OP (reliability) and IP (security) are derived to demonstrate the security–reliability trade-off (SRT) of the proposed AN-aided Co-NOMA scheme. In order to further investigate the superiority of the proposed scheme, the SRT performance of Co-NOMA without AN and non-cooperative NOMA (Nco-NOMA) schemes are also compared.
  • We conduct extensive numerical simulations to verify the derivations in different system settings. It shows that Co-NOMA with AN can offer better SRT performance on the weak user over benchmark methods in the low SNR region, while not degrading the performance of the strong user under the condition that the co-channel interference can be sufficiently suppressed. Furthermore, optimal performance can be achieved by adjusting the power-sharing coefficients between the BS and the strong user as well as the ratio between the AN bearing and information bearing at the strong user.
The rest of this article is organized as follows. In Section 2, we present the system model and propose the AN scheme. Section 3 analyzes the SRT performance of the proposed AN-aided Co-NOMA scheme and builds the comparison with two other schemes. Numerical results are articulated in detail to validate the derived theoretical results in Section 4. Finally, Section 5 draws conclusions and suggests future works.

2. System Model

The considered AN-aided FD Co-NOMA system is illustrated in Figure 1, which consists of one BS, two legitimate users and a passive Eve. With the purpose of further improving the SRT performance of the weak user U 2 , the strong user U 1 acts as a user relay, employing the decode-and-forward (DF) strategy. Therefore, two antennas are equipped at U 1 , where one antenna receives signals from the BS and the other antenna forwards successfully decoded x 2 to U 2 . In addition, since HD technology requires additional time slot forwarding information, U 1 works in the FD mode to send x 2 and AN to U 2 while receiving signals from the BS at the same time. The BS and U 2 only need to send and receive messages, respectively, and thus, only a single antenna is equipped and works in HD mode.
At the beginning of each time slot, the BS and U 1 are respectively equipped with P s and P 1 power levels, which satisfy P s + P 1 = P , and P is the total power of the system. We assume that a complex channel estimation algorithm is used with enough training information to obtain full channel state information (CSI) at the receivers. The estimation errors caused by imperfect CSI [26] can be left for future investigations. Based on the broadcast nature of wireless channels, Eve is able to intercept messages from the BS and the user relay. All channels are assumed to remain constant in one fading block but change independently between different fading blocks. Specifically, the channels coefficients from BS to U 1 , U 2 and Eve, U 1 to U 2 and Eve are represented by h θ , θ 1 , 2 , s e , r , u 1 e , respectively. It is assumed that all of the above channels undergo independent block Nakagami-m fading. Without loss of generality, the zero mean additive white Gaussian noise (AWGN) at U i , i 1 , 2 and Eve is denoted by n i and n e , with variances N 0 and N e , respectively.

2.1. Co-NOMA with AN

Referring to [10,27], the total number of time slots is n, and we assume that n is large enough, i.e., n . A communication slot is defined as a time block during which the transmission of the message from the BS to two NOMA users is completed. We assume that the time slot boundaries are fully synchronized across all users. During the t-th time slot, the BS broadcasts superimpose signal a 1 P s x 1 + a 2 P s x 2 to U 1 and U 2 , where x i is a normalized signal with unit power received by U i . According to the fundamental principle of NOMA, more power is distributed to the user with poor channels to maintain better fairness and QoS. Thus, we define a i as the power allocation coefficient, which satisfies a 2 > a 1 > 0 and a 1 + a 2 = 1 . With the purpose of further enhancing the SRT performance of U 2 , U 1 forwards the re-encoded weak user signal x 2 with power ξ P 1 , where ξ 0 , 1 is the information-bearing ratio. At the same time, the remaining power 1 ξ P 1 is exploited to generate AN x j to confuse Eve. When ξ = 1 , it turns into the scenario of Co-NOMA without AN, where U 1 forwards the signal of x j with full power P 1 . Similar to [28], x j is a normalized signal with unit power generated by a pseudo-random sequences generator. Throughout this article, a pessimistic assumption is made that AN is only known to U 1 to provide the lower bounds of performance, which will degrade the channels of the eavesdropping link as well as the relay link. Due to computational limitations and practical non-ideality, U 1 is unable to completely eliminate residual loop self-interference (LI) when working in FD mode [27]. Therefore, U 1 receives the superimposed mixed signal and LI signal simultaneously. The LI cancellation coefficient is defined as ϕ , and 0 < ϕ 1 corresponds to the cancellation level for the LI signal. Thus, the received signals at U 1 can be expressed as
y 1 ( t ) = h 1 a 1 P s x 1 ( t ) + a 2 P s x 2 ( t ) + h L I ϕ ξ P 1 x 2 ( t τ ) + ϕ 1 ξ P 1 x j ( t ) + n 1 ( t ) ,
where τ is the processing delay at U 1 , which satisfies the relation t τ . Referring [29] chapter 6.2, based on the principle of the downlink NOMA system, the BS sends separate (i.e., independent) information to multiple receivers (the users). Therefore, the noncorrelation between signals x i and n i is assumed in the following parts.
Based on the SIC technique [3], U 1 first decodes the signal of x 2 by treating x 1 as interference. After reconstructing and subtracting the extracted signal x 2 from the superimposed mixed signals and then decoding its own signal x 1 , it is assumed that perfect SIC is performed at at U 1 , and thus the received SINR at U 1 to decode x 1 and x 2 are respectively given by
γ S , 1 2 = a 2 ρ s h 1 2 a 1 ρ s h 1 2 + ϕ ρ 1 h L I 2 + 1 ,
γ S , 1 1 = a 1 ρ s h 1 2 ϕ ρ 1 h L I 2 + 1 ,
where ρ s = P s N 0 , ρ 1 = P 1 N 0 . U 1 forwards the signal of x 2 to U 2 after successfully extracting the signal. Therefore, the received signal from the direct link and the relay link at U 2 can be respectively represented by
y S , 2 ( t ) = h 2 a 1 P s x 1 ( t ) + a 2 P s x 2 ( t ) + n s , 2 ( t ) ,
y 1 , 2 ( t ) = h r ξ P 1 x 2 ( t τ ) + 1 ξ P 1 x j ( t ) + n 1 , 2 ( t ) .
To simplify the calculation, it is assumed that n s , 2 = n 1 , 2 = n 2 . U 2 is assigned more power, which can decode its own signal by treating the signal of x 1 as noise. Due to the existence of residue interference between the direct link and relay link, the received SINR at U 2 to decode x 2 corresponding to the direct link and the relay link can be respectively written as
γ S , 2 2 = a 2 ρ s h 2 2 a 1 ρ s h 2 2 + κ ρ 1 h r 2 + 1 ,
γ 1 , 2 2 = ξ ρ 1 h r 2 1 ξ ρ 1 h r 2 + κ ρ s h 2 2 + 1 ,
where κ denotes the impact levels of residue interference.
As described in [30,31], the transmitted signals of the direct link from the BS and the relay link from U 1 exist in a temporal separation. Referring to [30,32], we assume that the signals from U 1 and the BS can be fully distinguished by U 2 to obtain theoretical results for the actual NOMA system. This assumption is consistent with the ideal operation of rake receivers widely used in wireless systems, as well as a theoretical method called linear relay introduced in [33]. Here, we provide the upper bounds of (6) and (7) in the following sections. Then, (6) and (7) can be respectively rewritten as
γ S , 2 2 = a 2 ρ s h 2 2 a 1 ρ s h 2 2 + 1 ,
γ 1 , 2 2 = ξ ρ 1 h r 2 1 ξ ρ 1 h r 2 + 1 .
U 2 applies the selection combining (SC) technique to achieve enhanced performance while choosing the signal corresponding to the largest SINR as the output signal. Therefore, the output SINR after SC at U 2 is given as
γ U 2 S C = max min γ S , 1 2 , γ 1 , 2 2 , γ S , 2 2 .
Similar to U 2 , the received signal for the direct link and the relay link at Eve can be represented by
y S , E ( t ) = h s e a 1 P s x 1 ( t ) + a 2 P s x 2 ( t ) + n s , e ( t ) ,
y 1 , E ( t ) = h u 1 e ξ P 1 x 2 ( t τ ) + 1 ξ P 1 x j ( t ) + n 1 , e ( t ) .
Similar to [19], we consider the case with a weaker intercepting ability of Eve in the NOMA network. Specifically, Eve cannot unambiguously distinguish between multi-user data streams due to the inter-user interference caused by NOMA technology. Therefore, Eve will be interfered by x 2 (or x 1 ) when it tries to decode x 1 (or x 2 ) since Eve can only wiretap the signal of x 1 from the BS, while wiretapping the signal of x 2 from both the BS and U 1 . We assume that n s , e = n 1 , e = n e to simplify the analysis. Therefore, the wiretapped SINR at Eve for decoding x 1 and x 2 is given by
γ S , E 1 = a 1 ρ s e h s e 2 a 2 ρ s e h s e 2 + 1 ,
γ S , E 2 = a 2 ρ s e h s e 2 a 1 ρ s e h s e 2 + 1 ,
γ 1 , E 2 = ξ ρ u 1 e h u 1 e 2 ( 1 ξ ) ρ u 1 e h u 1 e 2 + 1 ,
where ρ s e = P s N e , ρ u 1 e = P 1 N e . Under the constraints of low complexity, Eve applies SC to pick up the signal corresponding to the largest SINR as the effective signal. Therefore, the received SINR at Eve for decoding x 2 can be defined as
γ E S C = max γ S , E 2 , γ 1 , E 2 .

2.2. Nco-NOMA

In the Nco-NOMA system, only two NOMA users can obtain information from the BS.Therefore, the received signal at U i and Eve can be expressed as
y i ( t ) = h i a 1 P s x 1 ( t ) + a 2 P s x 2 ( t ) + n i ( t ) ,
y e ( t ) = h s e a 1 P s x 1 ( t ) + a 2 P s x 2 ( t ) + n e ( t ) ,
where h i is the channel gain from the BS to U i . Therefore, the received SINR at U i to decode x i can be given by
γ S , 1 2 = a 2 ρ s h 1 2 a 1 ρ s h 1 2 + 1 ,
γ S , 1 1 = a 1 ρ s h 1 2 ,
γ S , 2 2 = a 2 ρ s h 2 2 a 1 ρ s h 2 2 + 1 .
Therefore, the wiretapped SINR of x i can be written as
γ S , E 1 = a 1 ρ s e h s e 2 a 2 ρ s e h s e 2 + 1 ,
γ S , E 2 = a 2 ρ s e h s e 2 a 1 ρ s e h s e 2 + 1 .

3. Performance Analysis

In this section, through deriving exact closed-form expressions for the outage and intercept probabilities, we evaluate the SRT performance under three scenarios: AN-aided Co-NOMA system, Co-NOMA system and Nco-NOMA system.

3.1. Co-NOMA with AN

3.1.1. Outage Probabilities

According to NOMA principle, the outage events at U 1 can be explained as follows: U 1 cannot decode x 1 or x 2 . The outage events at U 2 can be explained as follows: the received SINR after SC at U 2 in one time slot is less than its target SINR. Based on the above description, the OP of U 1 and U 2 are defined as
P o u t U 1 = 1 P r γ S , 1 2 > γ o 2 , γ S , 1 1 > γ o 1 ,
P o u t U 2 = P r γ U 2 S C < γ o 2 ,
where γ o i = 2 R o i 1 , R o i is the target transmission rate threshold to decode x i . Noting that the channel coefficients h θ follow independent and identically distributed Nakagami-m distribution, h θ 2 therefore obeys gamma distribution. Therefore, similar to [34,35], the probability density function (PDF) and cumulative distribution function of the square of the Nakagami random variable can be written as
f h θ 2 ( x ) = m θ Ω θ m θ x m θ 1 Γ m θ exp x m θ Ω θ ,
F h θ 2 ( x ) = 1 1 Γ m θ Γ m θ , x m θ Ω θ = 1 exp x m θ Ω θ k = 0 m θ 1 x m θ Ω θ k 1 k ! ,
where m θ is the shape parameter of the Nakagami-m distribution, which is the degree of signal fading caused by multipath interference and scattering processes, Ω θ denotes the average power of the multipath scattering component, Γ . , Γ . , . respectively represent the gamma function and incomplete gamma function similar to [36]. Referring to [34], we assume that LI is a variable with Rayleigh distribution h L I , and Ω L I is the corresponding mean power. Therefore, the h L I 2 random variable follows independently exponentially distributed random variables, that is
f h L I 2 x = 1 Ω LI exp x Ω LI .
After some mathematical calculations, the OP of U 1 and U 2 can be presented as follows:
Theorem 1.
The closed-form expression for the OP of U 1 is given by
P o u t U 1 = 1 1 Ω LI exp 1 ϕ ρ 1 Ω LI k = 0 m 1 1 m 1 φ 1 Ω 1 k 1 k ! ϕ ρ 1 k Γ k + 1 , m 1 φ 1 Ω 1 + 1 ϕ ρ 1 Ω LI m 1 φ 1 ϕ ρ 1 Ω 1 + 1 Ω LI k + 1 ,
where φ 1 = max α 1 , β 1 , α 1 = γ o 2 ρ s a 2 a 1 γ o 2 , β 1 = γ o 1 a 1 ρ s . It is easily noted that P o u t U 1 = 1 when γ o 2 a 2 a 1 . Therefore, in the rest of this section, we only investigate the performance on the condition of γ o 2 < a 2 a 1 .
Proof. 
Please refer to Appendix A. □
Theorem 2.
The closed-form expression for OP of U 2 is written as
P o u t U 2 = 1 Q 1 × Q 2 × Q 3 ,
with
Q 1 = 1 Ω LI exp 1 ϕ ρ 1 Ω LI k = 0 m 1 1 m 1 α 1 Ω 1 k 1 k ! ϕ ρ 1 k Γ k + 1 , m 1 α 1 Ω 1 + 1 ϕ ρ 1 Ω LI m 1 α 1 ϕ ρ 1 Ω 1 + 1 Ω LI k + 1 ,
Q 2 = 1 Γ m r Γ m r , m r γ o 2 Ω r ξ ρ 1 1 ξ ρ 1 γ o 2 ,
Q 3 = 1 1 Γ m 2 Γ m 2 , m 2 Ω 2 α 1 .
In the rest of this section, we only analyze the performance on the condition of γ o 2 < ξ 1 ξ ; else, P o u t U 2 = 1 .
Proof. 
Please refer to Appendix B. □

3.1.2. Intercept Probabilities

Eve can wiretap the confidential messages transmitted on legitimate links when the capacity of the eavesdropping channel is greater than the rate difference R o i R s i , where R s i presents the secrecy rate that needs to be encoded by a secrecy encoder [37]. Therefore, the IP of U 1 and U 2 are given by
P int U 1 = P r γ S , E 1 > γ E 1 ,
P int U 2 = P r γ E S C > γ E 2 ,
where γ E i = 2 R o i R s i 1 . Therefore, the closed-form expressions for IP of U 1 and U 2 can be expressed as
P int U 1 = P r h s e 2 > γ E 1 ρ s e a 1 a 2 γ E 1 = 1 Γ m s e Γ m s e , m s e γ E 1 Ω s e ρ s e a 1 a 2 γ E 1 ,
P int U 2 = 1 P r h s e 2 γ E 2 ρ s e a 2 a 1 γ E 2 × P r h u 1 e 2 γ E 2 ρ u 1 e ξ 1 ξ γ E 2 = 1 1 1 Γ m s e Γ m s e , m s e γ E 2 Ω s e ρ s e a 2 a 1 γ E 2 × 1 1 Γ m u 1 e Γ m u 1 e , m u 1 e γ E 2 Ω u 1 e ρ u 1 e ξ 1 ξ γ E 2 .
In the remainder of this section, we only analyze the performance on the condition of γ E 1 < a 1 a 2 , γ E 2 1 + γ E 2 < ξ 1 and γ E 2 < a 2 a 1 , else P i n t U 1 = P i n t U 2 = 0 .

3.2. Nco-NOMA

3.2.1. Outage Probabilities

The OP of U 1 and U 2 can be given by
P o u t U 1 = 1 P r γ S , 1 2 > γ o 2 , γ S , 1 1 > γ o 1 = 1 1 Γ m 1 Γ m 1 , m 1 φ 1 Ω 1 ,
P o u t U 2 = P r γ S , 2 2 < γ o 2 = 1 1 Γ m 2 Γ m 2 , m 2 α 1 Ω 2 .

3.2.2. Intercept Probabilities

The IPs of U 1 and U 2 are expressed by
P int U 1 = P r γ S , E 1 > γ E 1 = 1 Γ m s e Γ m s e , m s e γ E 1 Ω s e ρ s e a 1 a 2 γ E 1 ,
P int U 2 = P r γ S , E 2 > γ E 2 = 1 Γ m s e Γ m s e , m s e γ E 2 Ω s e ρ s e a 2 a 1 γ E 2 .
In addition, in order to better describe the network trade-off performance of security and reliability, SRT is defined as the probability that the transmission of information in the network will neither be interrupted nor intercepted [38]. Therefore, the SRT of U 2 can be written as
S R T U 2 = ( 1 P o u t U 2 ) ( 1 P i n t U 2 ) .
Obviously, the larger the SRT, the better the trade-off performance of the user, while the smaller the SRT, the worse the trade-off performance of the user.

4. Numerical Results

Monte Carlo simulations are provided in this section to validate the accuracy of the numerical results under different settings. Referring to [25,39] and without loss of generality, we set ρ = P N 0 , m 1 = m 2 = m r = 2 , Ω 1 = Ω r = 2 , Ω 2 = 1 , Ω L I = 15 dB, a 1 = 0.4 , R o 1 = R o 2 = 1 , R s 1 = R s 2 = 0.4 , ρ s = ρ 1 = 0.5 ρ , ρ s e = ρ 1 e = 0.1 ρ , ξ = 0.6 , ϕ = 0.1 , unless otherwise stated.
Figure 2 investigates the SRT of U 1 under different parameters. The simulation values are the same as the corresponding analytical curves, which confirms the accuracy of the theoretical derivations. Since Eve can only eavesdrop on the signal of x 1 from the BS, adding the relay link will have no effect on IP. Therefore, we mainly evaluate the outage performance of U 1 . As can be seen from Figure 2a, the trend of OP in the scenario of Co-NOMA with AN and Nco-NOMA is consistent with the increasing of ρ . As illustrated in Section 2, the effective SINR at U 1 decoding x 1 and x 2 is in direct proportion ρ , which affirms that the OP should decrease with the increasing ρ . At high SNR region, the effective SINR at U 1 for Nco-NOMA continues to increase with the increasing of ρ , while approaching constants in Co-NOMA with AN. As a result, the performance of the U 1 under the Nco-NOMA system continues to increase, while tending to be fixed under Co-NOMA with AN. Compared with Nco-NOMA, in the case of Co-NOMA with AN, the residual self-interference of U 1 brings about the decrease in efficient SINR, which increases the OP of U 1 . With the values of LI decreasing, the performance gap between Co-NOMA with AN and Nco-NOMA diminishes gradually. Therefore, when the LI is suppressed to be sufficiently small, the performance penalty of U 1 caused by FD can be ignored.
Figure 2b plots the OP of U 1 versus the increasing power allocation factor a 1 in the case of Co-NOMA with AN. The increase in a 1 has an opposite effect on the effective SINR at U 1 decoding x 1 and x 2 . At the lower region of a 1 , the OP of U 1 is mainly dominated by γ S , 1 1 , which results in a downward trend of OP. However, at a higher region of a 1 , the OP of U 1 is mainly dominated by γ S , 1 2 , which brings about the increasing of OP. Consequently, based on the nonconvex nature of OP, there exists an optimal power allocation to achieve the optimal outage performance of U 1 . In addition, it is obvious that the increasing residual self-interference has a significant effect on the outage performance due to the FD operation of U 1 .
Figure 2c depicts the OP of U 1 versus ρ s and ϕ . One can observe that as ρ s increases, the OP of U 1 declines gradually and eventually reaches saturation. As ϕ decreases, the residual self-interference becomes weaker, which brings about the improvement of OP performance. Moreover, at the lower value of ρ s , the transmission power of U 1 becomes stronger, and thus the change of ϕ has a greater influence on OP. In Figure 2d, as the Nakagami-fade parameter m s e increases, the channels between the BS to Eve and U 1 to Eve become stable, while performance improvements are more pronounced in areas with high transmit power. Furthermore, it is obvious that the IP of U 1 increases with the increasing of the given secrecy rate threshold R s 1 .
Figure 3 presents the SRT of U 2 versus with ρ and a 2 for different values under three scenarios, respectively. The simulation values are consistent with the theoretical values, which validates the correctness of the theoretical derivations. In Figure 3a, it is obviously observed that compared with Nco-NOMA, the outage performance of U 2 is significantly improved with the assistance of the user relay, and thus Co-NOMA with AN and Co-NOMA schemes outperform those of the Nco-NOMA scheme. Furthermore, due to the decrease in the information-bearing ratio, the outage performance of Co-NOMA with AN is slightly inferior to Co-NOMA. In the case of Co-NOMA, Eve applies SC to eavesdrop x 2 from both the BS and U 1 . At the same time, the effective SINR to decode x 2 at Eve becomes larger with the increasing of ξ . Therefore, compared to Co-NOMA, Co-NOMA with AN can notably improve security. As ρ increases, the effective SINR to decode x 2 at U 2 or Eve continues to increase. Therefore, the strength of signal x 2 for three scenarios is enhanced simultaneously, and thus brings about the decrease in OP with the increase in ρ , while their corresponding IP increases. This result indicates that there exists a trade-off between reliability (OP) and security (IP) in the case of three scenarios. Therefore, SRT is analyzed in the following Figure 3b. It can be observed that when ρ is less than 7 dB, the SRT of Co-NOMA is optimal. This is because the aid of the relay link greatly reduces the OP. With the increase in ρ , the security is sacrificed at the same time, which is necessary to exploit AN to improve security. When ρ is greater than 11 dB, the case of Co-NOMA with AN is slightly inferior to Nco-NOMA due to the increase in the interference of AN. Therefore, the proposed scheme has great advantages in the low SNR region. When ρ is 10, compared with Nco-NOMA and Co-NOMA, the SRP of Co-NOMA with AN is improved by 34% and is 2.22 times better, respectively.
Figure 3c,d evaluate the influence of various parameters on the performance of U 2 under the scenario of Co-NOMA with AN. Since the FD residual interference of U 1 will only affect OP of U 2 , Figure 3c presents OP versus power distribution coefficient a 2 with different residual interference values. One observation is that the performance of U 2 improves with the increase in a 2 . This can be attributed to the fact that the power allocated to U 2 becomes larger, resulting in the increase in effective SINR to decode x 2 at U 2 . Another observation is that the residual self-interference at U 1 has little effect on the performance of U 2 . Figure 3d describes the SRT versus a 2 and ρ . For the same a 2 , the trend of SRT with ρ is consistent with Figure 3b. In the region of low SNR, SRT increases as a 2 increases and eventually stabilizes. In the region of high SNR, SRT first increases then decreases with a 2 , and finally tends to stabilize. This is because as a 2 increases, the OP of U 2 decreases, while the IP increases. For the low value of SNR, SRT is mainly determined by the OP, while for the high value of SNR, SRT is mainly determined by the IP.
In order to further illustrate the extent to which OP and IP are influenced by the information-bearing ratio and transmission power of the BS, Figure 4 plots the OP and IP of U 2 in the case of Co-NOMA with AN. Figure 4a shows the OP of U 2 versus ρ s and ξ ; one can observe that as ξ increases, the residual interference of x j becomes weaker, which brings about the improvement in outage performance. Moreover, at the higher value of ξ , as ρ s increases, the OP of U 2 is significantly improved and eventually reaches saturation with the assistance of the relay link. At the lower value of ξ , the outage performance initially improves gradually with the increasing ρ s . As ρ s continues to increase, the residual interference of x j becomes stronger, resulting in a slight decrease in outage performance. Figure 4b presents the IP of U 2 versus ρ and ξ . The IP of U 2 increases with the increasing value of ρ , which is consistent with that in Figure 3a. When ξ is larger, U 1 allocates more power to broadcast the signal of x 2 , Eve eavesdrops on x 2 by selecting the larger SINR from the BS and U 1 as an effective SINR. While ξ is smaller, Eve primarily relies on the BS to decode the signal of x 2 by utilizing SC, and thus, along with ξ increasing, IP increases. In addition, the change of ξ has a greater impact on the IP at the low value of ρ .

5. Conclusions

This article investigated the PLS in a downlink Co-NOMA system. Specifically, the BS transmitted signals to the strong user directly, and to the weak user, with the assistance of the FD user relay in the presence of a passive Eve. FD and AN technologies were combined to improve the SRT performance. Analytical expressions of OP and IP were derived as performance metrics to investigate the SRT performance of the AN-aided Co-NOMA scheme. Additionally, the Co-NOMA scheme and Nco-NOMA scheme were also compared with the proposed scheme. Monte Carlo simulations showed the superiority of the proposed scheme in significantly enhancing the SRT performance of the weak user in the low SNR region, under the premise of minimizing the outage performance loss of the strong user. Additionally, the SRT performance of the two NOMA users can be further enhanced by utilizing the appropriate AN-bearing ratio and power allocation. For future work, the influence caused by imperfect SIC, imperfect CSI and estimation errors should be considered. At the same time, we would extend the considered system to the scenario in active eavesdropping scenarios. Furthermore, the application of multi-antenna technology and combining AN with the beamforming technique are other promising future directions to further strengthen the SRT performance.

Author Contributions

Conceptualization, D.J., Y.G. and G.L.; Methodology, D.J. and Y.G.; Software, D.J.; Validation, D.J., Y.G. and X.B.; Formal analysis, D.J.; Data curation, D.J. and G.L.; Writing—original draft, D.J. and G.L.; Writing—review and editing, Y.G. and N.S.; Visualization, D.J. and G.L.; Supervision, N.S., X.B. and X.W.; Funding acquisition, G.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Jiangsu Province Natural Science Foundation under Grant BK20200580; in part by the National Natural Science Foundation of China under Grant 62101595; and in part by the Nature Science Foundation on Frontier Leading Technology Basic Research Project of Jiangsu under Grant BK20212001.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Substituting (2) and (3) into (24), the outage probability of U 1 is written as
P o u t U 1 = 1 P r h 1 2 > φ 1 h L I 2 ϕ ρ 1 + 1 = 1 0 1 F h 1 2 φ 1 ϕ ρ 1 x + 1 f h L I 2 ( x ) d x ,
Substituting (26) and (27) into (A1), P o u t U 1 can be written as
P o u t U 1 = 1 1 Ω LI exp m 1 φ 1 Ω 1 k = 0 m 1 1 m 1 φ 1 Ω 1 k 1 k ! 0 A 1 x + 1 k exp A 2 x d x ,
where A 1 = ϕ ρ 1 , A 2 = m 1 φ 1 ϕ ρ 1 Ω 1 + 1 Ω LI . According to [36] (Eq. (3.462.12)), 0 ( a x ± b ) m e p x d x can be written as a m e ± p b / a p m + 1 Γ m + 1 , ± p b a in the condition of p > 0 and | arg ( b a ) | < π . Therefore, (A2) can be further calculated as
P o u t U 1 = 1 1 Ω LI exp 1 Ω LI ϕ ρ 1 k = 0 m 1 1 m 1 φ 1 Ω 1 k 1 k ! A 1 k A 2 k + 1 Γ k + 1 , A 2 A 1 .

Appendix B

Similar to the derivation process for P o u t U 1 , Q 1 can be expressed as
Q 1 = P r γ S , 1 2 > γ o 2 = P r h 1 2 > α 1 h L I 2 ϕ ρ 1 + 1 = 1 Ω LI exp 1 Ω LI ϕ ρ 1 k = 0 m 1 1 m 1 α 1 Ω 1 k 1 k ! A 1 k A 3 k + 1 Γ k + 1 , A 3 A 1 ,
where A 3 = m 1 α 1 A 1 Ω 1 + 1 Ω LI .
Q 2 = P r γ 1 , 2 2 > γ o 2 = P r h r 2 > γ o 2 ξ ρ 1 1 ξ ρ 1 γ o 2 = 1 Γ m r Γ m r , m r γ o 2 Ω r ξ ρ 1 1 ξ ρ 1 γ o 2 ,
and
Q 3 = P r γ S , 2 2 < γ o 2 = P r h 2 2 < α 1 = 1 1 Γ m 2 Γ m 2 , m 2 Ω 2 α 1 .

References

  1. Chettri, L.; Bera, R. A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems. IEEE Internet Things J. 2020, 7, 16–32. [Google Scholar] [CrossRef]
  2. Yu, B.; Chen, X.; Cai, Y. Age of Information for the Cellular Internet of Things: Challenges, Key Techniques, and Future Trends. IEEE Commun. Mag. 2022, 60, 20–26. [Google Scholar] [CrossRef]
  3. Liu, Y.; Zhang, S.; Mu, X.; Ding, Z.; Schober, R.; Dhahir, N.; Hossain, E.; Shen, X. Evolution of NOMA Toward Next Generation Multiple Access (NGMA) for 6G. IEEE J. Sel. Areas Commun. 2022, 40, 1037–1071. [Google Scholar] [CrossRef]
  4. Ding, Z.; Lei, X.; Karagiannidis, G.K.; Schober, R.; Yuan, J.; Bhargava, V.K. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends. IEEE J. Sel. Areas Commun. 2017, 35, 2181–2195. [Google Scholar] [CrossRef]
  5. Chen, S.; Zhao, J. The requirements, challenges, and technologies for 5G of terrestrial mobile telecommunication. IEEE Commun. Mag. 2014, 52, 36–43. [Google Scholar] [CrossRef]
  6. Sami, M.; Noordin, N.K.; Khabazian, M.; Hashim, F.; Subramaniam, S. A Survey and Taxonomy on Medium Access Control Strategies for Cooperative Communication in Wireless Networks: Research Issues and Challenges. IEEE Commun. Surv. Tutor. 2016, 18, 2493–2521. [Google Scholar] [CrossRef]
  7. Ding, Z.; Peng, M.; Poor, H.V. Cooperative Non-Orthogonal Multiple Access in 5G Systems. IEEE Commun. Lett. 2015, 19, 1462–1465. [Google Scholar] [CrossRef]
  8. Lv, L.; Jiang, H.; Ding, Z.; Yang, L.; Chen, J. Secrecy-Enhancing Design for Cooperative Downlink and Uplink NOMA With an Untrusted Relay. IEEE Trans. Commun. 2020, 68, 1698–1715. [Google Scholar] [CrossRef]
  9. Jiang, D.; Gao, Y.; Sha, N.; Wang, X.; Li, N. Physical Layer Security of Cooperative NOMA Systems with an Untrusted User. In Proceedings of the 2022 IEEE 22nd International Conference on Communication Technology (ICCT), Nanjing, China, 11–14 November 2022; pp. 1287–1292. [Google Scholar]
  10. Yue, X.; Liu, Y.; Kang, S.; Nallanathan, A.; Ding, Z. Exploiting Full/Half-Duplex User Relaying in NOMA Systems. IEEE Trans. Commun. 2018, 66, 560–575. [Google Scholar] [CrossRef]
  11. Do, T.N.; da Costa, D.B.; Duong, T.Q.; An, B. Improving the Performance of Cell-Edge Users in NOMA Systems Using Cooperative Relaying. IEEE Trans. Commun. 2018, 66, 1883–1901. [Google Scholar] [CrossRef]
  12. Kara, F.; Kaya, H. Threshold-Based Selective Cooperative-NOMA. IEEE Commun. Lett. 2019, 23, 1263–1266. [Google Scholar] [CrossRef]
  13. Zhou, Y.; Wong, V.W.S.; Schober, R. Dynamic Decode-and-Forward Based Cooperative NOMA With Spatially Random Users. IEEE Trans. Wirel. Commun. 2018, 17, 3340–3356. [Google Scholar] [CrossRef]
  14. Akhtar, M.W.; Hassan, S.A.; Saleem, S.; Jung, H. STBC-Aided Cooperative NOMA With Timing Offsets, Imperfect Successive Interference Cancellation, and Imperfect Channel State Information. IEEE Trans. Veh. Technol. 2020, 69, 11712–11727. [Google Scholar] [CrossRef]
  15. Alkhawatrah, M.; Gong, Y.; Chen, G.; Lambotharan, S.; Chambers, J.A. Buffer-Aided Relay Selection for Cooperative NOMA in the Internet of Things. IEEE Internet Things J. 2019, 6, 5722–5731. [Google Scholar] [CrossRef]
  16. Lei, H.; Yang, Z.; Park, K.-H.; Ansari, I.S.; Guo, Y.; Pan, G.; Alouini, M.-S. Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes. IEEE Trans. Commun. 2019, 67, 6282–6298. [Google Scholar] [CrossRef]
  17. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.-K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef]
  18. Cao, K.; Wang, B.; Ding, H.; Li, T.; Gong, F. Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users. IEEE Trans. Veh. Technol. 2020, 69, 1942–1955. [Google Scholar] [CrossRef]
  19. Li, M.; Yuan, H.; Maple, C.; Cheng, W.; Epiphaniou, G. Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks. IEEE Syst. J. 2023, 17, 1045–1055. [Google Scholar] [CrossRef]
  20. Zhuo, B.; Duan, W.; Gu, J.; Gu, X.; Zhang, G.; Ji, Y.; Choi, J.; Wen, M. Partial-NOMA Based Physical Layer Security: Forwarding Design and Secrecy Analysis. IEEE Trans. Intell. Transp. Syst. 2022, 1–14. [Google Scholar] [CrossRef]
  21. Huang, M.; Gong, F.; Zhang, N.; Li, G.; Qian, F. Reliability and Security Performance Analysis of Hybrid Satellite-Terrestrial Multi-Relay Systems With Artificial Noise. IEEE Access 2021, 9, 34708–34721. [Google Scholar] [CrossRef]
  22. Ruby, R.; Pham, Q.-V.; Wu, K.; Heidari, A.A.; Chen, H.; El Halawany, B.M. Enhancing Secrecy Performance of Cooperative NOMA-Based IoT Networks via multi-antenna-Aided Artificial Noise. IEEE Internet Things J. 2022, 9, 5108–5127. [Google Scholar] [CrossRef]
  23. Alsaba, Y.; Leow, C.Y.; Rahim, S.K.A. Full-Duplex Cooperative Non-Orthogonal Multiple Access With Beamforming and Energy Harvesting. IEEE Access 2018, 6, 19726–19738. [Google Scholar] [CrossRef]
  24. Cao, Z.; Ji, X.; Wang, J.; Wang, W.; Cumanan, K.; Ding, Z.; Dobre, O.A. Artificial Noise Aided Secure Communications for Cooperative NOMA Networks. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 946–963. [Google Scholar] [CrossRef]
  25. Gong, C.; Yue, X.; Zhang, Z.; Wang, X.; Dai, X. Enhancing Physical Layer Security With Artificial Noise in Large-Scale NOMA Networks. IEEE Trans. Veh. Technol. 2021, 70, 2349–2361. [Google Scholar] [CrossRef]
  26. Darsena, D.; Gelli, G.; Iudice, I.; Verde, F. Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3255–3269. [Google Scholar] [CrossRef]
  27. Shahzad, K.; Zhou, X.; Yan, S.; Hu, J.; Shu, F.; Li, J. Achieving Covert Wireless Communications Using a Full-Duplex Receiver. IEEE Trans. Wirel. Commun. 2018, 17, 8517–8530. [Google Scholar] [CrossRef]
  28. Zou, Y. Physical-Layer Security for Spectrum Sharing Systems. IEEE Trans. Wirel. Commun. 2017, 16, 1319–1329. [Google Scholar] [CrossRef]
  29. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, UK, September 2004. [Google Scholar]
  30. Osorio, D.P.M.; Olivo, E.E.B.; Alves, H.; Filho, J.C.S.S.; Latva-aho, M. Exploiting the Direct Link in Full-Duplex Amplify-and-Forward Relaying Networks. IEEE Signal Process. Lett. 2015, 22, 1766–1770. [Google Scholar] [CrossRef]
  31. Riihonen, T.; Werner, S.; Wichman, R. Hybrid Full-Duplex/Half-Duplex Relaying with Transmit Power Adaptation. IEEE Trans. Wirel. Commun. 2011, 10, 3074–3085. [Google Scholar] [CrossRef]
  32. Zhang, Z.; Ma, Z.; Xiao, M.; Ding, Z.; Fan, P. Full-Duplex Device-to-Device-Aided Cooperative Nonorthogonal Multiple Access. IEEE Trans. Veh. Technol. 2017, 66, 4467–4471. [Google Scholar]
  33. Gamal, A.E.; Mohseni, M.; Zahedi, S. Bounds on capacity and minimum energy-per-bit for AWGN relay channels. IEEE Trans. Inf. Theory 2006, 52, 1545–1561. [Google Scholar] [CrossRef]
  34. Shankar, P.M. Fading and Shadowing in Wireless Systems; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
  35. Toka, M.; Kucur, O. Performance of antenna selection schemes in dual hop full-duplex decode-and-forward relaying over Nakagami-m fading channels. Aeu-Inter J. Elect Commun. 2018, 86, 92–102. [Google Scholar] [CrossRef]
  36. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products; Academic Press: Cambridge, MA, USA, 2014. [Google Scholar]
  37. Ding, X.; Zou, Y.; Ding, F.; Zhang, D.; Zhang, G. Opportunistic Relaying Against Eavesdropping for Internet-of-Things: A Security-Reliability Tradeoff Perspective. IEEE Internet Things J. 2019, 6, 8727–8738. [Google Scholar] [CrossRef]
  38. Zou, Y.; Champagne, B.; Zhu, W.-P.; Hanzo, L. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems. IEEE Trans. Commun. 2015, 63, 215–228. [Google Scholar] [CrossRef]
  39. Xiang, Z.; Yang, W.; Pan, G.; Cai, Y.; Ding, Z.; Zou, Y. An HARQ Assisted Cognitive NOMA Scheme for Secure Transmission With Imperfect SIC. IEEE Trans. Commun. 2021, 69, 1930–1946. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Electronics 12 02224 g001
Figure 2. The SRT of U 1 . (a) OP versus ρ with different ϕ under different scenarios. (b) OP versus a 1 with different Ω L I , where ρ = 15   dB . (c) OP versus ρ s and ϕ . (d) IP versus ρ with different m s e and R s 1 .
Figure 2. The SRT of U 1 . (a) OP versus ρ with different ϕ under different scenarios. (b) OP versus a 1 with different Ω L I , where ρ = 15   dB . (c) OP versus ρ s and ϕ . (d) IP versus ρ with different m s e and R s 1 .
Electronics 12 02224 g002
Figure 3. The SRT of U 2 , where m s e = m u 1 e = 3 . (a) OP and IP versus ρ under different scenarios. (b) SRTs versus ρ under different scenarios. (c) OP versus a 2 with different Ω L I and ϕ , where ρ = 15 dB. (d) SRT versus ρ and a 2 .
Figure 3. The SRT of U 2 , where m s e = m u 1 e = 3 . (a) OP and IP versus ρ under different scenarios. (b) SRTs versus ρ under different scenarios. (c) OP versus a 2 with different Ω L I and ϕ , where ρ = 15 dB. (d) SRT versus ρ and a 2 .
Electronics 12 02224 g003
Figure 4. The OP and IP of U 2 . (a) OP of U 2 versus ρ s and ξ , where ρ = 15 dB. (b) IP of U 2 versus ρ and ξ .
Figure 4. The OP and IP of U 2 . (a) OP of U 2 versus ρ s and ξ , where ρ = 15 dB. (b) IP of U 2 versus ρ and ξ .
Electronics 12 02224 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jiang, D.; Gao, Y.; Li, G.; Sha, N.; Bian, X.; Wang, X. Enhancing Physical Layer Security of Cooperative Nonorthogonal Multiple Access Networks via Artificial Noise. Electronics 2023, 12, 2224. https://doi.org/10.3390/electronics12102224

AMA Style

Jiang D, Gao Y, Li G, Sha N, Bian X, Wang X. Enhancing Physical Layer Security of Cooperative Nonorthogonal Multiple Access Networks via Artificial Noise. Electronics. 2023; 12(10):2224. https://doi.org/10.3390/electronics12102224

Chicago/Turabian Style

Jiang, Dan, Yuanyuan Gao, Guoxin Li, Nan Sha, Xu Bian, and Xiaoyu Wang. 2023. "Enhancing Physical Layer Security of Cooperative Nonorthogonal Multiple Access Networks via Artificial Noise" Electronics 12, no. 10: 2224. https://doi.org/10.3390/electronics12102224

APA Style

Jiang, D., Gao, Y., Li, G., Sha, N., Bian, X., & Wang, X. (2023). Enhancing Physical Layer Security of Cooperative Nonorthogonal Multiple Access Networks via Artificial Noise. Electronics, 12(10), 2224. https://doi.org/10.3390/electronics12102224

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop