TY - JOUR
T1 - Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay
AU - Lv, Lu
AU - Jiang, Hai
AU - Ding, Zhiguo
AU - Yang, Long
AU - Chen, Jian
N1 - Funding Information:
This work was supported in part by the National Natural Science Foundation of China under Grants 61901313, 61971320, 61771366, and 61601347, in part by the Postdoctoral Innovative Talents Support Program 2019 from the Office of China Postdoctoral Council, in part by the China Postdoctoral Science Foundation under Grant 2019M650258, in part by the open research fund of National Mobile Communications Research Laboratory, Southeast University, under Grant 2020D07, in part by the Natural Sciences and Engineering Research Council of Canada under Grant RGPIN-2018-06307, in part by the UK Engineering and Physical Science Research Council under Grant EP/P009719/2, and in part by H2020- MSCA-RISE-2015 under Grant 690750. This article was presented in part at the IEEE ICC 2019 [1].
Funding Information:
Manuscript received June 26, 2019; revised October 21, 2019; accepted December 6, 2019. Date of publication December 17, 2019; date of current version March 18, 2020. This work was supported in part by the National Natural Science Foundation of China under Grants 61901313, 61971320, 61771366, and 61601347, in part by the Postdoctoral Innovative Talents Support Program 2019 from the Office of China Postdoctoral Council, in part by the China Postdoctoral Science Foundation under Grant 2019M650258, in part by the open research fund of National Mobile Communications Research Laboratory, Southeast University, under Grant 2020D07, in part by the Natural Sciences and Engineering Research Council of Canada under Grant RGPIN-2018-06307, in part by the UK Engineering and Physical Science Research Council under Grant EP/P009719/2, and in part by H2020-MSCA-RISE-2015 under Grant 690750. This article was presented in part at the IEEE ICC 2019 [1]. The associated editor coordinating the review of this article and approving it for publication was E. Basar. (Corresponding author: Jian Chen.) L. Lv is with the State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China, and also with the National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China (e-mail: [email protected]).
Publisher Copyright:
© 1972-2012 IEEE.
PY - 2020/3
Y1 - 2020/3
N2 - We investigate a secrecy-enhancing design for cooperative downlink and uplink non-orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the NOMA principle to have downlink and uplink transmissions with a near user and a far user, and the communications between the source and the far user are aided by an untrusted relay. To minimize information leakage at the untrusted relay and achieve secure NOMA communications, adaptive downlink and uplink cooperative jamming schemes are proposed, where the far user in downlink and the near user in uplink adaptively emit a jamming signal to the untrusted relay to impair its eavesdropping capability. Both downlink and uplink jamming power are optimized to fully exploit the benefits of the proposed schemes for security enhancement. Then, for each scheme, we quantify the secrecy performance by deriving the ergodic secrecy sum rate lower bound and its scaling law. Finally, computer simulation is used to demonstrate the effectiveness of the proposed adaptive downlink and uplink cooperative jamming schemes and verify the accuracy of the derived analytical results.
AB - We investigate a secrecy-enhancing design for cooperative downlink and uplink non-orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the NOMA principle to have downlink and uplink transmissions with a near user and a far user, and the communications between the source and the far user are aided by an untrusted relay. To minimize information leakage at the untrusted relay and achieve secure NOMA communications, adaptive downlink and uplink cooperative jamming schemes are proposed, where the far user in downlink and the near user in uplink adaptively emit a jamming signal to the untrusted relay to impair its eavesdropping capability. Both downlink and uplink jamming power are optimized to fully exploit the benefits of the proposed schemes for security enhancement. Then, for each scheme, we quantify the secrecy performance by deriving the ergodic secrecy sum rate lower bound and its scaling law. Finally, computer simulation is used to demonstrate the effectiveness of the proposed adaptive downlink and uplink cooperative jamming schemes and verify the accuracy of the derived analytical results.
KW - cooperative jamming
KW - Non-orthogonal multiple access
KW - physical layer security
KW - secrecy sum rate
KW - untrusted relay
UR - http://www.scopus.com/inward/record.url?scp=85076839325&partnerID=8YFLogxK
U2 - 10.1109/TCOMM.2019.2960345
DO - 10.1109/TCOMM.2019.2960345
M3 - Article
AN - SCOPUS:85076839325
SN - 0090-6778
VL - 68
SP - 1698
EP - 1715
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 3
M1 - 8935394
ER -