{"title":"Security Transmission Scheme of NOMA Systems With an Untrusted Near User","authors":"Enyu Li;Rongyu Wang;Wen Yang;Afei Dai;Yue Zhang","doi":"10.1109/TVT.2024.3466126","DOIUrl":null,"url":null,"abstract":"Aiming at the serious threat of untrusted users to the system security in the non-orthogonal multiple access (NOMA) downlink system, where an untrusted near user assists a far user to receive data, a cooperative transmission scheme is proposed to improve the physical layer security (PLS) for our presented wiretap NOMA system model. The cooperative transmission scheme is implemented in two communication phases. In the first phase, the reverse power allocation method is used, in which the higher power is allocated to the data transmitted to the near user, and the far user is introduced as a cooperative jammer to send the artificial noise (AN), so as to improve the security when the base station sends data. Considering the situation that the near user decodes its data, two information forwarding processes are designed in the second phase. If the near user can decode its data, it will employ the amplify-and-forward (AF) protocol to forward the remaining signal after removing its own data. Otherwise, two relay selection (RS) strategies are explored to improve reliability of the considered system. In this case, the selected relay adopts the physical-layer network coding (PNC) technique, and the AN sent by the far user is regarded as the key to participating in the bit-level exclusive-or (XOR) operation, which ensures the absolute security of the data transmitted to the far user. The exact closed-form expressions of the outage probability (OP) and intercept probability (IP) are derived respectively, and the approximate results are also given under high signal-to-noise ratio (SNR). Furthermore, the influence of relevant system parameters is discussed concretely. The numerical simulation results indicate that substantial performance gain is achieved over orthogonal multiple access (OMA) and other schemes, and the two RS strategies involved in this paper have the same reliability.","PeriodicalId":13421,"journal":{"name":"IEEE Transactions on Vehicular Technology","volume":"74 1","pages":"599-610"},"PeriodicalIF":7.1000,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Vehicular Technology","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10689253/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Aiming at the serious threat of untrusted users to the system security in the non-orthogonal multiple access (NOMA) downlink system, where an untrusted near user assists a far user to receive data, a cooperative transmission scheme is proposed to improve the physical layer security (PLS) for our presented wiretap NOMA system model. The cooperative transmission scheme is implemented in two communication phases. In the first phase, the reverse power allocation method is used, in which the higher power is allocated to the data transmitted to the near user, and the far user is introduced as a cooperative jammer to send the artificial noise (AN), so as to improve the security when the base station sends data. Considering the situation that the near user decodes its data, two information forwarding processes are designed in the second phase. If the near user can decode its data, it will employ the amplify-and-forward (AF) protocol to forward the remaining signal after removing its own data. Otherwise, two relay selection (RS) strategies are explored to improve reliability of the considered system. In this case, the selected relay adopts the physical-layer network coding (PNC) technique, and the AN sent by the far user is regarded as the key to participating in the bit-level exclusive-or (XOR) operation, which ensures the absolute security of the data transmitted to the far user. The exact closed-form expressions of the outage probability (OP) and intercept probability (IP) are derived respectively, and the approximate results are also given under high signal-to-noise ratio (SNR). Furthermore, the influence of relevant system parameters is discussed concretely. The numerical simulation results indicate that substantial performance gain is achieved over orthogonal multiple access (OMA) and other schemes, and the two RS strategies involved in this paper have the same reliability.
期刊介绍:
The scope of the Transactions is threefold (which was approved by the IEEE Periodicals Committee in 1967) and is published on the journal website as follows: Communications: The use of mobile radio on land, sea, and air, including cellular radio, two-way radio, and one-way radio, with applications to dispatch and control vehicles, mobile radiotelephone, radio paging, and status monitoring and reporting. Related areas include spectrum usage, component radio equipment such as cavities and antennas, compute control for radio systems, digital modulation and transmission techniques, mobile radio circuit design, radio propagation for vehicular communications, effects of ignition noise and radio frequency interference, and consideration of the vehicle as part of the radio operating environment. Transportation Systems: The use of electronic technology for the control of ground transportation systems including, but not limited to, traffic aid systems; traffic control systems; automatic vehicle identification, location, and monitoring systems; automated transport systems, with single and multiple vehicle control; and moving walkways or people-movers. Vehicular Electronics: The use of electronic or electrical components and systems for control, propulsion, or auxiliary functions, including but not limited to, electronic controls for engineer, drive train, convenience, safety, and other vehicle systems; sensors, actuators, and microprocessors for onboard use; electronic fuel control systems; vehicle electrical components and systems collision avoidance systems; electromagnetic compatibility in the vehicle environment; and electric vehicles and controls.