Evaluating the Performance of Cooperative NOMA with Energy Harvesting Under Physical Layer Security

Wireless Personal Communications - Tập 108 - Trang 1037-1054 - 2019
Thi Anh Le1, Hyung Yun Kong1
1University of Ulsan, Ulsan, Republic of Korea

Tóm tắt

In this paper, we consider a non-orthogonal multiple access system with imperfect successive interference cancellation and physical layer security where the source node communicates with Users via an energy harvesting relay node. This node uses a power-switching architecture to harvest energy from the sources signals and applies an amplify-and-forward protocol to forward signals. Moreover, the transmit jamming or artificial noise is generated by source node to enhance the security of system in the case an eavesdropper tries to overhear the confidential information from the source. To evaluate the secrecy performance of the proposed system, the asymptotic secrecy outage probability over the Rayleigh fading channel is studied. These results are compared with the secrecy performance of the orthogonal multiple access system and the system without the help of relay. Monte-Carlo results are presented to verify the theoretical results.

Tài liệu tham khảo

Saito, Y., et al. (2013). Non-orthogonal multiple access (NOMA)for cellular future radio access, In Proceedings IEEE vehicular technology conference, Dresden, Germany, pp. 1–5. Saito, Y., Benjebbour, A., Kishiyama, Y., & Nakamura, T. (2013). Systemlevel performance evaluation of downlink non-orthogonal multipleaccess (NOMA), In Proceedings of IEEE Annual Symposium PIMRC, London, U.K., pp. 611–615. Ding, Z., Peng, M., & Poor, H. V. (2015). Cooperative non-orthogonal multiple access in 5G systems. IEEE Communications Letters, 19(8), 1462–1465. Kim, J.-B., & Lee, I.-H. (2015). Non-orthogonal multiple access in coordinated direct and relay transmission. IEEE Communications Letters, 19(10), 1686–1689. Kader, M. F., Shahab, M. B., & Shin, S. Y. (2017). Exploiting non-orthogonal multiple access in cooperative relay sharing. IEEE Communication Letters, 21, 1159–1162. Raghunathan, V., Ganeriwal, S., & Srivastava, M. (2006). Emerging techniques for long lived wireless sensor networks. Communications Magazine, IEEe, 44(4), 108–114. Paradiso, J., & Starner, T. (2005). Energy scavenging for mobile and wireless electronics. Pervasive Computing, IEEE, 4(1), 18–27. Varshney, L. (2008). Transporting information and energy simultaneously, in Information Theory. In IEEE International Symposium on ISIT 2008, pp. 1612–1616. Grover, P., & Sahai, A. (2010). Shannon meets Tesla: wireless information and power transfer. In Proceedingson IEEE ISIT. Zhou, X., Zhang, R., & Ho, C. K.(2012). Wireless information and power transfer: Architecture design and rate-energy tradeoff. Ali, A. (2013). Nasir and Salman Durrani, relaying protocols for wireless energy harvesting and information processing. IEEE Transactions on Wireless Communications, 12(7), 3622–3636. Liu, Y., Ding, Z., Elkashlan, M., & Poor, H. V. (2015). Cooperative non-orthogonal multiple access in 5G systems with SWIPT, In The 23rd EUSIPCO. Han, W., Ge, J., & Men, J. (2016). Performance analysis for NOMA energy harvesting relaying networks with transmit antenna selection and maximal-ratio combining over Nakagami-m fading. IET Communications, 10(18), 2687–2693. Guo, W., & Wang, Y. (2017). Cooperative non-orthogonal multiple access with energy harvesting. Information, 8, 111. https://doi.org/10.3390/info8030111. Wyner, A. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387. Ding, Z., Xu, M., Lu, J., & Liu, F. (2012). Improving wireless security for bidirectional communication scenarios. IEEE Transactions on Vehicular Technology, 61, 2842–2848. Dong, L., Han, Z., Petropulu, A., & Poor, H. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888. Wang, H.M., Yin, Q., & Xia, X.G. (2011) Improving the physical-layer security of wireless two-way relaying via analog network coding. In Global telecommunication conference (GLOBECOM 2011), 2011, IEEE Chen, J., Song, L., Han, Z., & Jiao, B. (2011). Joint relay and jammer selection for secure decode-and-forward two-way relay communications. In Global telecommunication conference (GLOBECOM 2011), Houston, Texas, USA. Kim, T.T., & Poor, H. Vincent. (2009). Secure relaying: can publicly transferred keys increase degrees of freedom? In 47th annual allerton conference, Monticello, IL, pp. 1076–1081. Chang, S., Li, J., Xiaomei, F., & Zhang, L. (2017). Energy harvesting for physical layer security in cooperative networks based on compressed sensing. Entropy, 19, 462. https://doi.org/10.3390/e19090462. Qin, Z., Liu, Y., Ding, Z., Gao, Y., & Elkashlan, M. (2016). Physical layer security for 5G non-orthogonal multiple access in large-scale networks, In IEEE ICC. Gradshteyn, I. S., & Ryzhik, I. M. (2014). Table of intergrals, series, and products (8th ed.). Cambridge: Academic Press.