Professional Documents
Culture Documents
Paper 1
Paper 1
net/publication/346372223
CITATIONS READS
3 191
6 authors, including:
Some of the authors of this publication are also working on these related projects:
Heterogeneous Cloud-RAN Deployment Based on Hybrid FSO/mmW Fronthaul Transport Network for 5G Mobile Systems View project
All content following this page was uploaded by Shady M. Ibraheem on 02 December 2020.
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier xxxx/ACCESS.2020.DOI
ABSTRACT The two-way relaying (TWR) technique has been confirmed to achieve higher spectral
efficiency and average sum rate compared with the one-way relaying (OWR) technique in ultra-dense next
generation networks with limited spectal resources. In this paper, an enhanced secrecy cooperative TWR
scheme for cooperative non-orthogonal multiple access (NOMA) networks against untrusted relaying is
highlighted. Specifically, with the application of NOMA principle, a base station (Bs) communicates with
two trusted users, i.e., namely a near and a far users, where the communication with the far user takes place
only via an untrusted relay (UR) employing both TWR and analog network coding (ANC) mechanisms. To
minimize information leakage at the UR, the far user transmits its uplink signal simultaneously with Bs’s
downlink signal to confuse the eavesdropping capability of the UR by increasing inter-user interference
(IUI). To investigate the benefits of the proposed scheme, asymptotic lower bound expressions of the
ergodic secrecy sum rate (ESSR) of uplink/downlink rates and their scaling law are derived to characterize
the secrecy performance. The system parameters have been carefully studied to maitain the desired ESSR
performance where we obtain an optimal value for the uplink power sharing coefficient with an arbitrary
known value of the downlink one. Analytical and simulation results show that the proposed scheme
can achieve scaling gain of 18 ln ρ of positive ESSR over the untrusted OWR scheme with adaptive
uplink/downlink jamming and a significant gain over the other conventional NOMA uplink/downlink
schemes in two time slots of communication.
INDEX TERMS Non-orthogonal multiple access (NOMA), two-way relaying (TWR) techniques, un-
trusted relay (UR), ergodic secrecy sum rate (ESSR) and inter-user interference (IUI).
VOLUME 4, 2016 1
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
the network coverage extension and the reception reliability (untrusted) eavesdropping: in which a legitimate element in
of the users of poor channel conditions by exploiting the the network tries to decode confidential information of the
spatial diversity. Particularly, cooperative NOMA can be other elements. There exist recent works that considered
classified in terms of the elements of the network into: user- the external eavesdropping in NOMA networks. The secrecy
aided and relay-aided cooperative NOMA. In user-aided co- performance and power allocation analysis was investigated
operative NOMA, the users of better channel conditions act in [24-28]. The beamforming design in multiple input single
as a relay to enhance the reception capability of the users of output (MISO) and multiple input multiple output (MIMO)
poorer channel conditions as they previously have to decode NOMA networks to minimize information leakage was in-
the signals intended to the poorer users. There exist several vestigated in [29-35]. Exploiting relay selection and FD
studies concerning this topic [12-16]. In [12] the outage per- relaying techniques to confront external eavesdropping in
formance of user-aided cooperative NOMA was investigated cooperative NOMA networks was proposed in [5, 36-40].
where it was shown to be better than the non-cooperative Secure TWR NOMA based networks were also of a consid-
case. To improve the performance of cell-edge users in a erable interest. In [41, 42] the security issue of NOMA based
cellular NOMA network, the cell-center users can act as TWR networks with artificial noise jamming (AN-jamming)
relays in both half-duplex (HD) and full-duplex (FD) modes were analyzed.
of operation to achieve a diversity gain [13]. Cooperative FD However, the above works considered the external eaves-
NOMA based user-aided relaying was proposed in [5, 14] to dropping in NOMA networks while the impact of internal
further save the resources and improve the spectral efficiency. eavesdropping on the secrecy performance may be more dan-
Employing a user in cooperative relaying may consume its gerous as the network elements that share the same resource
dedicated power and degrade its life time. Thus, energy blocks may distrust each other. In the context of untrusted
harvesting (EH) techniques were exploited in cooperative users, the authors of [43] investigated the case of untrusted
NOMA which termed as simultaneous wireless information far user that can decode confidential information of the near
and power transfer (SWIPT) to compensate the user for the user via SIC where the secrecy outage probability of the near
required power of relaying [15]. A joint power allocation user and the outage probability of the far user were derived.
and splitting factor design was proposed in [16] to enhance The authors of [44] considered the case of multiple relay
the system throughput and user fairness. On the other hand, selection schemes to enhance the secrecy performance of a
relay-aided cooperative NOMA schemes have gained also a cooperative NOMA network of untrusted far user. The se-
considerable attention in practical design of NOMA networks crecy performance of a MISO NOMA system with untrusted
[17-19]. This can be implemented by deploying dedicated re- far user was proposed in [30]. Unlike [30, 43, 44], two joint
lays to increase the diversity. Coordinated direct and relayed beamforming and power allocation schemes were proposed
transmission based cooperative NOMA was proposed in for in [45] for a cooperative NOMA network with both untrusted
both downlink and uplink communications [17, 18]. In [19] near user and external eavesdroppers.
a multi-relay multi-antenna NOMA system was proposed to To enhance the secrecy performance in a HD untrusted
further increase the spectral efficiency. OWR cooperative NOMA network, a novel NOMA-inspired
The above contributions considered only one-way relay- jamming and relaying approach was proposed in [8] where
ing (OWR) or unidirectional communication protocol which the base station sends a superimposed mixture of destination
does not fulfill the dense mode of NOMA network op- and jamming signals and a positive secrecy sum rate can be
eration. Two-way relaying (TWR) permits a simultaneous always guaranteed. In [46, 47] the secrecy performance of
bidirectional communication to further improve the spectral cooperative NOMA networks with untrusted relay (UR) was
efficiency. HD and FD TWR NOMA based networks were studied in which a base station communicates with two users
proposed in [20, 21] where the outage probability, diversity and one random user or the two users or the base station emit
analysis and network throughput were derived and compared an AN-jamming signal to combat the UR. As the emitting
with OWR networks. A joint rate splitting and user grouping of AN-jamming signal may degrade the eavesdropping capa-
protocol for multi-pair TWR NOMA network was proposed bility of the UR, it may cause a simultaneous degradation in
in [22] for better utilization of resources and enhanced the reception quality of the other elements of the network.
throughput. In [23] a joint antenna and relay selection scheme To overcome this issue, a novel secrecy-enhancing design
was proposed to enhance the transmission reliability for mul- for cooperative uplink/downlink NOMA with an UR was
tiple access and time division broadcast relaying strategies in proposed in [48] where the near and far users send an
a TWR NOMA based networks where the optimal transmit adaptive jamming signal of a similar symbol structure. Thus,
power allocation was obtained. enabling legitimate users to cancel out the jamming signal
However, due to the broadcast nature of wireless signals while preventing the UR from eavesdropping.
in a cooperative NOMA network, confidential information in However, in cooperative NOMA networks with multiple
this network is vulnerable to two main types of attack: 1) superimposed signals, the use of internal network interfer-
external eavesdropping: in which an illegitimate attacker that ence can be a sufficient mean to degrade the eavesdropping
is not belonged to the network elements tries to overhear con- capability and enhance the secrecy rate [49]. Thus, impos-
fidential signals and decode them for its own sake, 2) internal ing an intended jamming signal may increase interference
2 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
sources rather than combat eavesdropping which leads to in- • To evaluate the secrecy performance and investigate the
efficient information decoding at receivers, and this motivates benefits of the proposed scheme, an analytical expres-
our work as follows. sion of a lower bound on the uplink/downlink ergodic
secrecy sum rate (ESSR) is derived. We demonstrate
A. MOTIVATIONS AND CONTRIBUTIONS that a positive ESSR can be guaranteed by the proposed
The recent work of cooperative NOMA network with un- scheme with the least utilization of resources to com-
trusted relaying focused on transmitting jamming signals plete an uplink/downlink communication. To gain more
simultaneously along with information signals to confuse insights, an asymptotic scaling law of the ESSR is deter-
eavesdropping against untrusted relaying. However, this may mined at high ρ where ρ is the transmit signal to noise
confuse the legitimate channels themselves and we have the ratio (SNR). It can be clarified that the proposed scheme
following observations: can achieve an uplink/downlink scaling gain of ln ρ
over two time slots of communication. Furthermore, the
• Exploiting inter-user interference (IUI) inherent in co-
simulation results confirm the accuracy of the derived
operative NOMA networks can deteriorate the eaves-
formulas and the superiority of the proposed scheme
dropping capability more than confusing legitimate de-
over the benchmark schemes.
coding of information signal. Therefore, IUI can play
• We obtain an optimal value of the uplink sharing power
the role of cooperative jamming by performing a trade-
coefficient that maximizes the ESSR for an arbitrary
off design between the minimization of IUI at legitimate
constant value of downlink power coefficient to inves-
receivers and the maximization of IUI at the eavesdrop-
tigate the impact of IUI on the eavesdropping capability
pers to enhance the secrecy performance. This can be
of the UR. First, we prove that the ESSR is a unimodal
achieved by hindering SIC at the eavesdropper, partic-
maximal function, then, the optimal value is obtained by
ularly, by mixing a superimposed version of adaptive
carrying out an iterative algorithm based on the golden
jamming and information signals, i.e., making a com-
search method.
posite signal, at the UR. Consequently, the UR cannot be
able to determine the decoding order of the mixed signal
which can significantly degrade its ability to retrieve the B. ORGANIZATION
confidential information signals coherently. The reminder of the paper is organized as follows. In sec-
• Employing TWR in cooperative NOMA networks en- tion II, we present the proposed cooperative TWR NOMA
ables a bidirectional communication which leads to bet- scheme with its design structure and channel modeling. The
ter utilization of the resources and recover the spectral secrecy performance evaluation is investigated in section III
efficiency loss inherent to OWR. In addition, combining and verified by simulation results in section IV. Then, the
TWR with NOMA forces the UR to exchange a dense paper is concluded in section V.
information between nodes against the facility of its
decoding process. II. SYSTEM MODEL AND DESIGN
Motivated by the previous observations, in this pa- Consider the security issue of a cooperative TWR NOMA
per, we propose an enhanced secrecy performance of up- wireless network that consists of one base station, Bs, the
link/downlink cooperative TWR NOMA network against near user, NU and far user, FU1 , that communicates with Bs
untrusted relaying. In particular, the base station (Bs) com- via an AF-UR employing TWR and analog network coding
municates with the near (NU) and the far users (FU) where (ANC) [50] techniques as shown in Fig.1. All these nodes are
the communication with FU takes place by untrusted TWR. equipped with a single antenna and operate in HD mode of
The main contributions can be summarized as follows: operation.
• An uplink/downlink cooperative TWR NOMA scheme It is assumed (as in [17]) that the link between Bs and
against untrusted relaying is proposed in which Bs FU is absent due to heavy shadowing loss and only the
transmits a superimposed downlink signal for NU and AF-UR is responsible for delivering information between
FU where the communication to FU takes place via an Bs and FU. However, the UR is only trusted at the service
UR. Meanwhile, FU transmits its uplink signal to the level while it is not allowed to decode any confidential
UR. The received signals at the UR incurs an IUI with information at the data link processing level. This means that
unknown decoding order which impair the ability of the the UR is only permitted to perform AF protocol TWR that
UR to separate and decode the composite signal and involves reliable channel state information (CSI) feedback
confuses its eavesdropping capability. Then, amplify and estimation as well as signal amplification and forwarding
and forward (AF) relaying is employed at the UR to (e.g., it is assumed that full CSI is owned by the transmitting
forward the received signals to the destinations. To this nodes via pilot estimation processes prior to information
end, an unavoidable level of IUI can be created at the
1 Two user NOMA model has been adopted by the third generation
UR when it tries to decode each user symbol coherently
partnership project long-term evolution (3GPP-LTE) to minimize large inter-
while the decoding quality at legitimate users is not user interference and complex analysis inherent to multi-user NOMA model
affected. for practical implementation of cooperative NOMA networks, e.g., see [3].
VOLUME 4, 2016 3
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
Parameter Description
hBN
P The transmit power budget quantity of the downlink
or the uplink communication.
hRN hNF hab The channel fading coefficient between node a and
Far user node b.
gab The channel gain coefficient between node a and
hRF
node b.
hBR λab The normalized average channel gain between node
a and node b.
AF-UR employing TWR
The base station CN (0, λ) A circularly-symmetric complex Gaussian distribu-
The uplink signal of the first phase
tion of zero mean and variance equal to λ.
The downlink signal of the first phase
Information transmission of the second phase
N0 The thermal noise variance at the receiving nodes.
na The AWGN distribution at the receiving node a.
α The power sharing (allocation) coefficient of the
FIGURE 1. The proposed cooperative TWR NOMA scheme with an AF-UR. downlink communication.
The power sharing (allocation) coefficient of the up-
link communication.
transmission [48]2 ). To this end, the UR may try to intercept ρ The transmit signal to noise ratio (SNR) of the trans-
mit power budget P .
confidential information exchanged between nodes during xaD The downlink symbol for the node a.
uplink/downlink communications for its own sake. Hence, it xaU The uplink symbol for the node a.
is necessary to minimize the information leakage at UR3 . To γax The signal to interference noise ratio (SINR) at the
receiving node a for decoding the symbol x.
do this, FU simultaneously exploits transmitting its NOMA ya The received signal at the node a.
uplink signal as a noise signal to increase IUI at the UR and Cax The achievable rate at the receiving node a for decod-
impair its eavesdropping capability. ing the symbol x.
E (.) The mean or expectation function.
From a practical perspective, the proposed scheme can be E (CX ) The average rate (ergodic rate) of CX with respect to
vastly founded in some applicable cellular networks. The the random variable X.
intended network can consist of a Bs which is capable of EX (.) The mean or expectation function with respect to the
exchanging information with a pair of two types of residential random variable X.
P (.) The probability function.
and roadway users. The Bs is directly linked to the residential fX (x) The probability density function (PDF) of the random
user whereas it communicates with the roadway user via an variable X.
UR located near the road signs. Each type of user has a FX (x) The cumulative density function (CDF) of the random
variable X.
hierarchical secrecy demand against the UR which can be cu- β The amplification factor of the UR.
rious to decode its received signals before forwarding them. K 1 (.) The modified Bessel’s function of the first order and
Thus, the transmission rates are dynamically determined by the second kind.
CESSR Ergodic secrecy sum rate (ESSR).
the transmit nodes to maintain those secrecy demands. lower
CESSR Lower bound (LB) of the ESSR.
The communications’ channels are assumed to experience
independent and identical distributed (i.i.d) quasi-static fad-
ing, i.e., channels’ coefficients remain constants within a tion with normalized average channel gains λi i.e., λi , i ∈
resource block of time but independently vary from block to {BN, BF, RN, RF, N F }.
another. Each uplink/downlink and relaying transmission is Two communication phases (two time slots) are needed
bounded by a transmit power budget of P while an additive to complete information uplink/downlink transmission. This
white Gaussian noise (AWGN) is considered at each receiv- can be described in the following two subsections where the
ing node with mean equals to zero and variance equals to N0 . system parameters used in this paper are summarized in Table
Considering channel reciprocity, let the channel coeffi- 1.
cients between B ↔ N , B ↔ R, R ↔ N , R ↔ F
and N ↔ F links that are denoted as hBN , hBR , hRN , A. FIRST PHASE
hRF and hN F , respectively, follow circularly-symmetric
In this phase, Bs transmits simultaneously its downlink sym-
complex Gaussian random variables with zero means and
bols xN D and xF D of NU and FU with power sharing
variances equal to λBN , λBR , λRN , λRF and λN F , respec-
coefficients of α and 1 −nα, respectively, straightforwardly
tively (hi ∼ CN (0, λi ) , i ∈ {BN, BF, RN, RF, N F }). 2
o n
2
o
2
This means that = |hi | follows an exponential distribu- to NU and UR where E |xN D | = E |xF D | = 1.
Meanwhile, FU transmits its uplink symbol which represents
2 We will discuss a two-step CSI pilot estimation in subsection D. a background noise symbol at the UR, n i.e., oxF U , with a
3 Here, we consider the AF relaying protocol in the two-way scheme due to 2
the following reasons: 1) AF relaying protocol is easy to implement where
power sharing coefficient where E |xF U | = 1. It is
ANC can be applied efficiently to mix analog signals and reduce resource noted that NU shares the same uplink power budget, P ,
utilization; and 2) at low SNR, the AF relaying protocol can achieve better with FU with a power sharing coefficient of 1 − . Different
secrecy sum rate whatever the distance between Bs and UR is, e.g., see [46,
50]. Furthermore, by exploiting the HD TWR, a positive secrecy capacity from the cooperative AN-jamming schemes considered in
can be strictly achieved as we will see in the next section. the literature, e.g., see [46], where the AN relies on pseudo-
4 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
random signals, FU generates its uplink signal as a noise achievable rates for decoding xF D and xN D at NU can be
background signal of deterministic waveform to the UR, e.g., respectively expressed as
xF U , which can easily decoded by NU relying on its captured 1
(1 − α) ρgBN
xF D
characteristic during CSI estimation. CN = log 1 + , (7)
2 αρgBN + 1
Following√ the NOMApprinciple, Bs transmits the signal
xB = xN D P α + xF D P (1 − α) intended for the down- 1
xN D
CN =
log (1 + αρgBN ) . (8)
link communication. Meanwhile, FU transmits the signal 2
√
xF = xF U P intended for its uplink communication as a As such, we have considered in the first phase the over-
background noisy signal at the UR. Thus, the received signal estimated capability of eavesdropping at the UR which pro-
at UR and NU can be respectively expressed as vides a performance lower bound for the proposed system [8,
48].
yR = hBR xB + hRF xF + nR , (1)
B. SECOND PHASE
yN = hBN xB + hN F xF + nN , (2)
In this phase, the RU forwards an amplified version of its
where P is the transmit power,nR , nN ∼ CN (0, N0 ), N0 is received signals to do its main function without analyzing
the thermal noise variance of the receiving nodes. the entire information contents. Meanwhile, NU transmits its
Without loss of generality, we assume that UR and NU are uplink symbol xN U to Bs with a power allocation coefficient
more close to Bs than FU in the sense that λBN λRF and of 1 − . By exploiting the HD characteristic of the untrusted
λBR λRF . Thus, the SIC decoding order starts from xB TWR, the transmission of the uplink signal containing xN U
towards xF . Particularly, the UR carries out a complex joint is completely secured so that xN U can not be eavesdropped
maximum likelihood (ML) detection4 to decode its received by the UR as it is not able to transmit and receive at the
composite signal and achieve better eavesdropping capability same time. Thus, the received signal at Bs and FU can be
in a two-step decoding algorithm. In the first step, the UR respectively given by
tries to decode xF D by treating both xN D and xF U as
interference then it subtracts xF D from its observation before yB =hBR βyR + hBN xN + nB
the attempt of decoding xN D and xF U . In the second step, √ p
after a successful wiretapping of xF D , the UR performs SIC = h2BR βxN D P α + h2BR βxF D P (1 − α)
| {z }
one more time to decode xN D by treating xF U as a noise AN C cancellation term
√
before acquiring xF U . In the composite signal, xN D can +hBR hRF βxF U P
indeed represent an additional interference when decoding p
+hBR βnR + hBN xN U P (1 − ) + nB , (9)
xF U which can present an over-estimated capability of eaves-
dropping at the UR. Thus, the achievable rates for decoding
yF =hRF βyR + hN F xN + nF
xF D , xN D and xF U at the UR can be respectively expressed √ p
as =hRF hBR βxN D P α + hRF hBR βxF D P (1 − α)
xF D 1
(1 − α) ρgBR
√ p
CR = log 1 + , (3) + h2RF βxF U P + hN F xN U P (1 − )
2 αρgBR + ρgRF + 1 | {z }
AN C and prior estimation cancellation term
xN D 1 αρgBR +hRF βnR + nF , (10)
CR = log 1 + , (4)
2 ρgRF + 1 p q
1
where xN = xN U P (1 − ), β , gBR +gRF +1/ρ
xF U 1 ρgRF denotes the amplification factor of the UR and nB ∼
CR = log 1 + , (5)
2 αρgBR + 1 CN (0, N0 ) and nF ∼ CN (0, N0 ), where N0 is the thermal
noise variance of the receiving nodes, denote the AWGN at
where ρ , NP0 is the transmit signal to noise ratio (SNR)
Bs and FU.
of the transmit power budget P . Recall that the uplink and
Since Bs has a prior knowledge of the self-amplified
downlink transmit power is bounded by P as
version of its transmitted√ signal, it can cancel
p out the term
Puplink ≤ P and Pdownlink ≤ P. (6) h2BR βxB = h2BR βxN D P α+h2BR βxF D P (1 − α) from
its observation by using ANC and prior estimation cancel-
Depending on the previous knowledge of the CSI about xF U , lation techniques. Without loss of generality, it is assumed
NU can subtract xF U from its observation such that the that the received uplink signal power of xN U is larger than
4 It is assumed that R can perform a complex joint ML detection to separate
that of xF U due to its close proximity to Bs5 . Therefore, the
and remove IUI and decode the information signals correctly [8]. If the UR decoding sequence at Bs is considered to start from xN U to
can perform more intelligent signal decoding techniques, such as the joint xF U , i.e., xN U → xF U .
separation decoding technique, to indiviually separate the intended signals,
the secure transmission may fail, and thus, the injection of a friendly jammer 5 However, the reverse case in which the received uplink signal power of
should be carried out to impair the decoding quality at the UR while the other xF U at Bs is larger than that of xN U due to the amplification process can
nodes can decode their intended signals separately. be treated similarly [48].
VOLUME 4, 2016 5
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
After performing the NOMA SIC decoding technique, the Firstly, Bs needs to estimate gBN , gBR , gRN and gRF in
achievable rates for decoding xF U and xN U at Bs can be order to adjust the achievable rates for xN D and xF D while
respectively expressed as FU needs to estimate gBN , gBR , gRF and gN F in order to
1
(1 − ) ρgBN
adjust the achievable rate for xF U and the proper value of
xN U
CB = log 1 + , . Then, NU needs to estimate gBN in order to adjust the
2 ρgBR gRF β 2 + (gBR β 2 + 1)
(11) achievable rate for xN U according to the power budget, i.e.,
ρgBR gRF β 2 (1 − ) P . The training steps are described as follows:
xF U 1
CB = log 1 + . (12)
2 (gBR β 2 + 1) • Step 1: the UR transmits a pilot signal by which Bs can
On the other hand, FU has a prior knowledge of its self- estimate gBR and FU can estimate gRF while there is
retransmitted signal, as well as, the interference signal no need for NU to estimate gRN . Then, NU transmits
2
√from its pilot signal so that Bs can estimate gBN and FU can
NU, so that it can easily cancel out the term hRF βx F U P +
p
hN F xN U P (1 − ) from its observation by using ANC estimate gN F . Thereafter, NU forwards its received pilot
technique. Recall that NU should be previously able to de- from the RU, e.g., using AF protocol, by which Bs can
code xF D according to (6) before decoding its own downlink estimate gRN upon its prior knowledge of gBN .
• Step 2: both Bs and FU transmit their pilot signals
signal which means that the achievable rate for decoding
xF D at FU should be no more than CN xF D
. From (6) and (9), by which NU can estimate gBN by treating the pilot
the achievable rate for decoding xF D at FU can be expressed power of FU as noise. Then, NU forwards its received
as pilot from Bs, e.g., using AF protocol, by which FU
1 can estimate gBN upon its prior knowledge of gN F in
CFxF D = log (1 + min (γN xF D
, γFxF D )) , (13)
2 step 1. Meanwhile, the RU employs ANC to AF their
2 received pilots from both Bs and FU, e.g., using AF
where γN xF D
= (1−α)ρg BN
αρgBN +1 and γF
xF D (1−α)ρgBR gRF β
= αρgBR gRF β 2 +(gRF β 2 +1) TWR protocol, in the sense that Bs and FU can estimate
are the signal to interference noise ratio (SINR) for decoding
gRF and gBR depending on their previous knowledge of
xF D at NU and FU, respectively.
gBR and gRF in step 1, respectively.
C. ERGODIC SECRECY SUM RATE (ESSR)
III. ESSR PERFORMANCE ANALYSIS
To characterize the statistical effectiveness of the proposed In this section, we provide a detailed analysis on the secrecy
scheme, the ESSR is adopted as a secrecy performance performance of the proposed system in terms of the ESSR. In
metric. The ESSR is defined as the rate beyond which a particular, we derive analytical expressions for lower bound
secure communication rate can be available. The ESSR and and asymptotic lower bound of the ESSR of the proposed
a lower bound on the ESSR are mathematically given by scheme which represent a sufficient approach to determine
h
CESSR , E {CFxF D − CR xF D +
} + {CN xN D xN D +
− CR } the secrecy benefits of the proposed scheme. Furthermore, we
i obtain the optimal value of the power sharing coefficient of
xF U xF U + xN U
+{CB − CR } + CB , (14) the uplink transmission, i.e., , to maximize the ESSR relying
on the iterative golden search algorithm [51] given a fixed
+ value of the power coefficient of the downlink transmission,
lower
CESSR , {E (CFxF D ) − E (CR
xF D
)}
xN D xN D xF U + xF U +
i.e., α.
+{E (CN ) − E (CR )} + {E (CB ) − E (CR )}
(a) A. A LOWER BOUND ON THE ESSR
xN U
+E (CB ) ≤ CESSR , (15)
To proceed forward, we use the definition of average rate
+
where {A} , max (0, A), for arbitrary A and (a) is based (ergodic rate), i.e., E (CX ) , EX (log (1 + x)), for a non-
on Jensen’s inequality as in [8]. negative random variable X as [52]
Remark 1. The proposed scheme can guarantee a positive Z∞
secrecy sum rate. This is enabled by exploiting the HD E (CX ) , EX (log (1 + x)) = log (1 + x) fX (x) dx
xN U
characteristic of the TWR which reveals the term CB is out 0
of the eavesdropping capability. Different from [46, 48], the Z∞
1 1 − FX (x)
proposed scheme confirms achieving a secure performance = dx,
mode to the premier uplink symbol, i.e., xN U , while complet- ln 2 1+x
0
ing an uplink/downlink communication in only two time slots. (16)
where FX (x) and fX (x) are the cumulative density func-
D. CSI REQUIREMENTS
tion (CDF) and the probability density function (PDF) of the
To obtain the required CSI prior to the uplink/downlink trans-
random variable X, respectively.
mission process, a channel training mechanism is adopted
at the transmitting nodes comprised of a two-step training Theorem 1. A closed-form approximate expression for the
lower
mechanism with a transmission of six pilots. lower bound of the ESSR, i.e., CESSR , can be given by (17) at
6 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
the top of the next page, where CBR = λBR α, CRF = λRF ,
CBN = λBN α and λk , k = 1, . . . , 5 are given in Appendix
∗ = arg max CESSR
lower
,
A.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
λ3 ()
e− ρα
λ3 () (1−α) λ3 () λ1 () λ 1 ρ 1
lower
CESSR ≈ Ei − − e− ρα λ3 () Ei − − e BR Ei −
2 ln 2 ρα ρ 2 ln 2 λBR ρ
+
1 1 λ2 () C ρ 1 1
− CRF (1 + α) e CRF ρ Ei − − e BR Ei −
CRF ρ 2 ln 2 CBR ρ
( 1 )+
e CBN ρ 1 1 CBR 1 1 1 1
+ − Ei − − e CBR ρ Ei − − e CRF ρ Ei −
2 ln 2 CBN ρ 2 ln 2 CRF − CBR CBR ρ CRF ρ
+
1 − ρ1 C 2 +1 1 1 C 1 1
1 1
RF
+ − e RF Ei − − e CRF ρ Ei − − e CBR ρ Ei −
2 ln 2 ρ 2
+1 2 ln 2 CBR − CRF CRF ρ CBR ρ
CRF
1
eCRF ρ
λ4 () 1 1 λ5 () λ5 ()
+ e λ4 ()ρ Ei − −e ρ Ei − . (17)
2 ln 2 λBR (1 − λ4 () λ5 ()) λ4 () ρ ρ
to the parameters of C^
lower
ESSR . Instead, we propose an iterative
that concern the untrusted relaying based NOMA and OMA
optimized algorithm based on the golden search method [51] networks.
to obtain a very convergent value of ∗ . Without loss of generality, we specify the main system
parameters utilized in [48] as follows. For instance, we set
The algorithm is summarized in the following steps as
λBN = 0.7, λBR = 0.5, λRN = 0.5, λRF = 0.5,
shown in Algorithm 1.
λN F = 0.4, α = 0.4, N0 = −100(dBm), and = 0.4
Algorithm 1 Iterative algorithm for determining ∗ based on (i.e., denoted as PAR1).
the golden search method. In terms of the uplink/downlink ESSR performance,
we compare our proposed scheme with three benchmark
Input: α, ρ, gBR , gRF , gBN , u1 = 10−3 , Niter. = 0 and a
schemes described as follows:
maximum tolerance ε = 10−4 .
1: Calculate: 1 , 2 , 1) The adaptive uplink/downlink cooperative jamming
u√2 = min (1, 2 ) − 10−3 + max (0, 1 ) , d = NOMA based network proposed in [48]: In this
5−1
(u2 − u1 ), u3 = u1 + d and u4 = u2 − d. scheme, Bs uses the NOMA principle to√send a
2
2: While: (|u3 − u4 | > ε or Niter. < 10−3 do downlink
p superimposed signal, i.e., xN D P α +
3: Niter. = Niter. + 1; xF D P (1 − α), to communicate with NU directly
and FU by the aid of a one-way HD UR. Meanwhile,
= u3 , calculate C^lower ^ lower ^
lower
ESSR , CESSR (u3 ) = CESSR ; FU emits an adaptive structured jamming signal during
= u , calculate C^
4
lower , C^
lower (u ) = C^
ESSR
lower ;
ESSR 4 ESSR its idle state to overcome information leakage at the
4: If C^
lower ^lower
ESSR (u3 ) ≤ CESSR (u4 )
UR. This adaptive jamming signal has the same symbol
u2 = u3 , u3 = u4 and u4 = u2 − d; structure as the NOMA symbol structure and it is well-
5: Else if C^
lower ^lower known to the corresponding receivers. Then, the UR
ESSR (u3 ) > CESSR (u4 )
u1 = u4 , u4 = u3 and u3 = u1 + d; uses the AF technique to forward its received signal7 .
6: End if. Meanwhile, Bs sends another information signal to
7: End while. NU. In the uplink communication, both NU and FU
8: The optimal value of the uplink/jamming coefficient= sends their information signals to Bs and the UR,
∗ = u3 +u 4
. respectively. Meanwhile, NU emits in parallel a super-
2
Output: ∗ imposed adaptive jamming signal with its information
signal. Then, the UR amplifies and forward its received
signal. Meanwhile, NU sends another information sig-
IV. SIMULATION RESULTS, DISCUSSION AND FUTURE nal to Bs. It has been verified that the proposed system
WORK in [48] outperform the proposed system in [17, 18]
A. SIMULATION RESULTS without adaptive jamming signals.
In this section, we provide numerical results to validate 2) The uplink/downlink NOMA based network with desti-
the analytical results of our enhanced secrecy performance nation aided AN-jamming proposed in [53]: Different
scheme for TWR based cooperative NOMA network with from the previous proposed scheme [48], both FU in
UR via Monte Carlo simulations with 104 iterations. In 7 Throughout this paper, the dynamic value of the amplification factor, i.e.,
particular, we discuss the secrecy performance point of view β, is adopted to maintain a realistic secrecy scheme by adapting the secrecy
of the proposed scheme in terms of the state of art schemes performance of xN D , xF D , xN U and xF U .
8 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
a. λRF = 1.
FIGURE 4. Analytical and simulation LB results of downlink/uplink ESSR of
the proposed scheme in terms of ρ under PAR1, PAR2 and PAR3.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
an analytical expression for the lower bound of the up- =1− e λBR αρ , (A.3)
λRF x + λBR α
link/downlink ESSR and verified it by simulation results. The xN D
results demonstrated that the proposed scheme can achieve an where P(.) is the probability function. Hence, E (CR ) can
improvement in the uplink/downlink ESSR than the bench- be obtained as
mark schemes with the least utilization of resources. Fur- Z∞
xN D 1 λBR α exp (−x/λBR αρ)
thermore, we obtained an optimal value for the uplink power E (CR ) = dx
2 ln 2 (λRF x + λBR α) (1 + x)
sharing coefficient by holding an iterative algorithm based on 0
the golden search method. 1 λBR α
= ×
. 2 ln 2 λRF − λBR α
1 1
e λBR αρ Ei (−1/λBR αρ) − e λRF ρ Ei (−1/λRF ρ) .
APPENDIX A (A.4)
PROOF OF THEOREM 1. xF U
lower Consequently, E (CR )
can be simply obtained as
To find out a closed form expression for CESSR , we xN D
E (CR ) by interchanging λBR by λRF and ρ by . Fur-
firstly have to derive mathematical formulas for E (CFxF D ),
xF D xN D xN D xF U xF U thermore, the CDF of Y F D can be expressed as
E (CR ), E (CN ), E (CR ), E (CB ), E (CR ) and
E (CB ), separately. Let X F D , min (γN , γFxF D ),
xN U xF D Z∞
2
x (ρy + 1)
X N D , αρgBN , X F U , ρg BR gRF β FY F D (x) = P gBR < fgRF (y) dy
(gBR β 2 +1) , X N U , ρ (1 − α − αx)
(1−)ρgBN (1−α)ρgBR 0
ρgBR gRF β 2 +(gBR β 2 +1) , Y F D , αρgBR +ρgRF +1 , Y N D , Z∞
αρgBR ρgRF x(ρy+1) 1 −λy
ρgRF +1 , and Y F U , αρgBR +1 , then, we can obtain the
−λ
= 1−e BR (1−α−αx)ρ e RF dy
desired formulas as follows. λRF
− 12 0
By substituting by β , (gBR + gRF + 1/ρ) , XF U λBR (1 − α − αx) x
−
and X N U can be rewritten respectively as =1− e λBR (1−α−αx)ρ ,
λRF x + λBR (1 − α − αx)
(A.5)
ρgBR gRF xF D
XF U , , and E (CR ) can be obtained as
1
2gBR + gRF + ρ xF D
E (CR )=
(1 − ) ρgBN gBR + gRF + ρ1 1−α
α x
−
λBR (1 − α − αx) e λBR (1−α−αx)ρ
Z
XNU , 1 . (A.1) 1
ρgBR gRF + 2gBR + gRF + ρ
dx
2 ln 2 ((λRF − λBR α) x + λBR (1 − α)) (1 + x)
0
(1−α)y
Z∞ αλBR
e
−λ
BR αρ
Based on the above, the CDF of X N D can be expressed as 1 1 λRF (1−α)
= e λBR αρ × dy.
FX N D (x) = 1 − exp (−x/λBN αρ) where E (CN xN D
) can be 2 ln 2 y+ (λBR α−λRF )
y (y − 1)
1 λRF (1−α)
obtained directly as 1−α
(A.6)
After applying some algebraic manipulations, the method
Z∞
xN D 1 exp (−x/λBN αρ) of undetermined coefficients as used in [57-59] and using
E (CN = ) dx [[54], 3.352.2-5], we arrive at
2 ln 2 1+x
0
xF D λ1 () λ 1 ρ 1
exp λBN1 αρ E (CR )= e BR Ei −
1 2 ln 2 λBR ρ
=− Ei − , (A.2)
2 ln 2 λBN αρ 1 1
− λRF (1 + α) e λRF ρ Ei −
λRF ρ
where the last term is obtained from [[54], 3.352.4] and λ2 () λ 1 αρ 1
+ e BR Ei − , (A.7)
Ei(.) is the exponential integral function [[54], 8.211.1]. In 2 ln 2 λBR αρ
VOLUME 4, 2016 11
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
Z∞ Z∞
−λ
x(y+1/ρ) 1 −λy −λ
(1+)yx+x/ρ 1 −λy
=1− e BR (ρy−2x) e RF dy = e BR (ρy(1−α−αx)−x) e RF dy
λRF λRF
2x/ρ x
ρ(1−α−αx)
Z∞ x
− ρ(1−α−αx)
1
+λ
(1+)
Z∞
−λ 2x
−
x(t+2x+1) 1 −λ t
(b) e λRF BR x/ρ(1+(1+)x/(1−α−αx))
=1−e RF ρ e λBR ρt
e RF ρ dt = e
− λBR u
λRF ρ λRF ρ (1 − α − αx)
0 0
u
−x 2 1
λRF + λBR
−λ
=1−e ρ
C1 (x, ρ, ) K 1 (C1 (x, ρ, )) , ×e RF ρ(1−α−αx) du
(A.8)
x 1 (1+)
(c) − ρ(1−α−αx) +λ
=e λRF BR C2 (x, ρ, ) K 1 (C2 (x, ρ, )) ,
q (A.11)
where C1 (x, ρ, ) = ρ2 λx(2x+1)
BR λRF
where K 1 (.) is the
modified Bessel’s function of the second kind. It is noted that where step (b) follows by letting ρy (1 − α − αx) −
we use [[54], 3.324.1] and the substitution ρy − 2x = t in x = u, step (c) follows by [[54], 3.324.1] after
(A.7) where the condition y > 2x/ρ should be satisfied. doing some q algebraic manipulations by C2 (x, ρ, ) =
Recall that we focus on the lower bound of the ESSR, then, 1 x(1−α−(α−(1+))x)
ρ(1−α−αx) λBR λRF .
K 1 (x) can be upper-bounded by K 1 (x) ≤ 1/x when ρ →
xF U Substituting into (A.10), we can get the CDF of X F D as
∞. Consequently, E (CB ) can be simply obtained as
x 1 (1+) 1
− + +λ
Z∞ FX F D (x) = 1 − e ρ(1−α−αx) λRF λBR
BN
−x 2
λRF +1
xF U 1 e ρ
E (CB )= dx × C2 (x, ρ, ) K1 (C2 (x, ρ, )) . (A.12)
2 ln 2 (1 + x)
0
1 − ρ1 1 Recall that we search for a lower bound of the ESSR in the
2
λRF +1
=− e Ei − . sense that we can making the use of the relation K 1 (x) ≤
2 ln 2 2
ρ λRF + 1
1/x when ρ → ∞ to simplify the analysis. Then, E (CFxF D )
(A.9) can be expressed as
xF D
It is noted that γN and γFxF D are disjoint and consist 1−α
α
Z x
− ρ(1−α−αx)
1
+λ
(1+)
+λ 1
λ3 ()
e− ρα
λ3 ()
FXF D (x) = P (min (γNxF D
, γFxF D ) < x) E (CFxF D ) = Ei −
xF D
2 ln 2 ρα
= 1 − P (γN > x) P (γFxF D > x) . (A.10)
(1−α) λ3 ()
| {z }| {z } − e− ρα λ3 () Ei − . (A.14)
P1 P2 ρ
x
−λ (1−)ρgBN (gBR +gRF +1/ρ)
According to (12), P1 can be obtained as e BN ρ(1−α−αx) Finally, the CDF of X N U , ρgBR gRF +2gBR +gRF +1/ρ can
12 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
xN U
be evaluated as Thus, E (CB ) can be simply obtained as
FX N U (x) = 1 Z∞ x
λ4 () − λ ()ρ
e λRF ρ λBR e
4
xN U
ZZZ −λ t −λy −λ u E (CB ) = dx
e BR e RF e BN 2 ln 2 (x + λ4 () λ5 ()) (x + 1)
1− du dy dt 0
λBR λRF λBN 1 Z∞ x
λ4 () − λ ()ρ
( ) >x λBR e
(1−)ρu t+y+ 1 e λRF ρ 4
ρ (g)
ρty+2t+y+ 1 = dx−
ρ
2 ln 2 (1 − λ4 () λ5 ()) (x + λ4 () λ5 ())
Z∞ Z∞ (t+ ρ1 )(x−(1−)ρu)+xt e −λ u −λ t 0
− λ BN e BR
Z∞ x
λ4 () − λ ()ρ
=1− e ((1−)ρu−x(ρt+1))
dudt
λBR e
RF
λBN λBR
4
λ4 ()
dx = ×
0 x(ρt+1)
(1−)ρ
(1 − λ4 () λ5 ()) (1 + x) λBR (1 − λ4 () λ5 ())
0
Z∞ (ρt+1) x(ρt+1)
λRF ρ − λBN (1−)ρ
1
1 e
(e)
=1− × e λRF ρ 1 1 λ5 () λ5 ()
2 (1 − ) ρ e λ4 ()ρ
Ei − −e ρ Ei − ,
2 ln 2 λ4 () ρ ρ
0
Z∞ v
(A.16)
−λ t − (1−)ρλ
e BR xρt2 e BN (f ) 1
× e λRF v
dvdt = 1 − × where in step (g) follows after performing some algebraic
λBR λBN 2
1
−∞ manipulations, λ4 () = (1 − ) λBN and λ5 () = λBR −
Z∞ (ρt+1)
−λ
x(ρt+1)
−λ t Z∞ 2
1
. This completes the proof.
e λRF ρ
BN (1−)ρ BR − z− (1−)λxt λRF
e RF λBN z dzdt
λBR
0 −∞ APPENDIX B
Z∞ (ρt+1) x(ρt+1) t
λRF ρ − λBN (1−)ρ − λBR PROOF OF COROLLARY 1.
e
=1− dt At high transmit SNR, based on (15) and (17), it is evident
λBR xF D
0 that XF D , min (γN , γFxF D ) approaches a constant inde-
Z∞ pendent of ρ as both γN and γFxF D reach a constant value
xF D
x
−t λ +λ 1 −λ 1
1 x
λRF ρ − λBN (1−)ρ
e BN (1−) BR RF
=1−e dt with ρ → ∞. Thus, E (CFxF D ) can be approximated in terms
λBR of its scaling with ρ as
0
1 x
λRF ρ − λBN (1−)ρ
=1−e ×
lim E (CFxF D ) ∝ constant. (B.1)
(1 − ) λBN λRF ρ→∞
.
λBR λRF x + (1 − ) λBN λRF − (1 − ) λBN λBR
(A.15) This means that E (CFxF D ) is proportional to a constant
value with ρ grows to infinity where ∝ denotes the propor-
xF D xN D xF U
where in step (e) we put ((1 − ) ρu − x (ρt + 1)) = tional sign. Similarly, E (CR ), E (CR ), E (CR ) and
xN U
v, v ∈ [−∞, ∞], step (f) follows by applying [[54], E (CB ) can be regarded to scale as a constant with the ever
v increase of ρ as Y F D , Y N D , Y F U and X N U approach a
3.324.2], some algebraic manipulations, (1−)ρλBN
= z and
xt2
≥ 0. constant value with ρ → ∞, respectively.
(1−)λRF λBN
Furthermore, by utilizing the approximations e1/x ≈ 1 +
Remark 4. It is noted that the same result can be obtained 1/x and Ei (−1/x) ≈ − ln x in (A.2) and (A.9), it is evident
mathematically for the integration in step (e) by following xN D xF U
that both E (CN ) and E (CB ) scale respectively as
similar procedure as (A.11) and using [[54], 3.324.1], we
can get for v ∈ [0, ∞] or v ∈ [−∞, 0]
xN D 1 1
lim E (CN )∝ ln ρ + ln ρ × O , (B.2)
ρ→∞ 2 ρ
Z∞ (ρt+1) x(ρt+1)
λRF ρ − λBN (1−)ρ −λ t Z∞ v
− (1−)ρλ
e e BR xρt2 e BN
e λRF v dvdt
(1 − ) ρ λBR λBN
0 0 xF U 1 1
Z∞ (ρt+1) x(ρt+1)
−λ t
lim E (CB )∝ ln ρ + ln ρ × O . (B.3)
λRF ρ − λBN (1−)ρ ρ→∞ 2 ρ
e e BR K 1 (C4 (x, ρ, , t))
= dt
(1 − ) ρ λBR C4 (x, ρ, , t)
0 Combining the above results and the fact that lim E (.) =
ρ→∞
Z∞ (ρt+1) x(ρt+1) t
λRF ρ − λBN (1−)ρ − λBR
e lower
= dt, E lim (.) , one can find that CESSR scales with ρ as
λBR ρ→∞
0
lower 1 1
where we can making the use of the relation K 1 (x) ≤ 1/x lim CESSR ∝ ln ρ + ln ρ = ln ρ. (B.4)
ρ→∞ 2 2
q x defined as |arg (x)| < π where C4 (x, ρ, , t) =
with
−x
2t λRF (1−)λBN
. This completes the proof.
VOLUME 4, 2016 13
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
APPENDIX C and using the fact that the sum of monotonically increasing
PROOF OF THEOREM 2. (or decreasing) functions is also an increasing (or decreasing)
lower
Recall that the secrecy performance of xN D , xF D , xN U function, it is evident that CESSR is a sum of two monoton-
and xF U can be achieved. It is evident from (4) and (8) ically decreasing and increasing functions of and the first
xN D
that E (CR ) is a monotonically decreasing function of part of the proof is completed.
xN D xN U
) and E (CI ) , E (CFxF D ) −
while E (CN ) is a constant function of . Thus, the term Let E (C D ) = E (CB
xN D xN D xF D
xN D xN D xF U
{E (CN ) − E (CR )} can be verified as a monotonically E (CR ) + {E (CN ) − E (CR )} + E (CB ) −
xF U xN U
increasing function of . E (CR ) . Recall that E (CB ) is a monotonically de-
Regarding the term {E (CFxF D ) − E (CR xF D
)}, from (3) creasing function of which can be rewritten after some alge-
xF D
braic manipulations as E (CD ) ≡ log2 −D1 + D2 + D3 ,
E (CR ) is a monotonically decreasing function of
whereas E (CFxF D ) is a constant function of when γN xF D
< where D1 , D2 and D3 are arbitrary coefficients inde-
xF D xF D
γF and E (CF ) is a monotonically decreasing function pendent of . Thus, E (CD ) is a strictly decreasing func-
xF D
of when γN > γFxF D . Then, we discuss the monotonicity tion of ∈ [0, 1]. Furthermore, E (CI ) can be further
of the term {E (CFxF D ) − E (CR xF D
)} by following the same rewritten
after some algebraic manipulations as E (CI ) ≡
3 +I2 2 +I3 +I4
procedure in [[48], Appendix A] as follows: log2 I5 I41+I 3 2
6 +I7 +I8 +I9
, where I1 to I9 are arbitrary
x x x x
• If γNF D < γFF D , then, the term {E (CFF D ) − E (CRF D )} positive coefficients independent of , then, E (CI ) has neg-
is a monotonically increasing function of . ative roots and it comprises a sum of monotonically in-
x x x x
• If γNF D > γFF D , then, the term {E (CFF D ) − E (CRF D )} creasing functions of with positive secrecy performance
xF D xF D
can be expressed as {E (CF ) − E (C R )} , of xN D , xF D and xF U if and only if > gRFρg BR +1
ρ(ρgRF −1)
1 (1−α)ρgBR gRF
2 log 1 + αρgBR gRF +gBR +(1+)g RF +1/ρ
− 12 log 1 and < gBR (αρggBR −1)−1/ρ
. Thus, E (CI ) is a strictly in-
RF
creasing function of ∈ [max (0, 1 ) , min (1, 2 )], where
+ αρg(1−α)ρg 1 (1−α)ρgBR
+ρg
BR
+1 = 2 log 1 + αρg +f () − gBR (αρgBR −1)−1/ρ
BR RF
(1−α)ρgBR
BR
gBR
1
1 = gRFρg BR +1
ρ(ρgRF −1) and 2 = gRF .
1
2 log 1 + αρgBR +f2 () , where f1 () = gRF + 1 + ^
+ 1/gRF ρ and f2 () = ρgRF + 1. Since we Consequently, C lower ≈ E (C ) + E (C ) has at most one
ESSR D I
consider the condition where a secrecy performance maximal critical point of , ∈ [max (0, 1 ) , min (1, 2 )]
+
mode is achieved, i.e., when {A} , A, the term and the second part of the proof is completed.
xF D xF D
{E (CF ) − E (CR )} is a monotonically increasing
function of when f1 () increases slower than f2 (). REFERENCES
Otherwise, the term {E (CFxF D ) − E (CR xF D
)} , 0, e.g., [1] L. Dai, B. Wang, Y. Yuan, S. Han, I. Chih-Lin, and Z. Wang, "Non-
orthogonal multiple access for 5G: solutions, challenges, opportunities,
no secrecy performance for xF D can be achieved. In and future research trends," IEEE Communications Magazine, vol. 53, no.
other words, the condition f1 () − f2 () = ggBR RF
+ 9, pp. 74-81, 2015.
(1 − ρgRF ) + gRF 1
< 0 must be hold to guarantee [2] S. R. Islam, N. Avazov, O. A. Dobre, and K.-S. Kwak, "Power-domain
ρ non-orthogonal multiple access (NOMA) in 5G systems: Potentials and
that a secrecy performance for xF D can be achieved. challenges," IEEE Communications Surveys & Tutorials, vol. 19, no. 2,
Furthermore, the condition (1 − ρgRF ) < 0, i.e., or pp. 721-742, 2016.
equivalently gRF > 1/ρ, can guarantee that the term [3] Z. Ding et al., "Application of non-orthogonal multiple access in LTE and
5G networks," IEEE Communications Magazine, vol. 55, no. 2, pp. 185-
{E (CFxF D ) − E (CR xF D
)} is a monotonically increasing 191, 2017.
function of . [4] Z. Zhang, Z. Ma, M. Xiao, G. Liu, and P. Fan, "Modeling and analysis of
non-orthogonal MBMS transmission in heterogeneous networks," IEEE
Consequently, the term {E (CFxF D ) − E (CR xF D
)} is a Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2221-
monotonically increasing function of with positive secrecy 2237, 2017.
performance when both gRF > 1/ρ and > gRFρg BR +1
ρ(ρgRF −1)
[5] X. Yue, Y. Liu, S. Kang, A. Nallanathan, and Z. Ding, "Exploiting
full/half-duplex user relaying in NOMA systems," IEEE Transactions on
are satisfied. Communications, vol. 66, no. 2, pp. 560-575, 2017.
Next, we discuss the monotonicity of the term [6] L. Lv, J. Chen, Q. Ni, and Z. Ding, "Design of cooperative non-orthogonal
xF U xF U multicast cognitive multiple access for 5G systems: User scheduling and
{E (CB ) − E (CR )}. It is evident from (5) and (12) that
xF U xF U performance analysis," IEEE Transactions on Communications, vol. 65,
both E (CR ) and E (CB ) are monotonically increasing no. 6, pp. 2641-2656, 2017.
xF U xF U
of . Thus, the term
functions {E (CB ) − E (CR )} , [7] Q. Yang, H.-M. Wang, D. W. K. Ng, and M. H. Lee, "NOMA in downlink
1 ρgBR gRF 1 ρgRF SDMA with limited feedback: Performance analysis and optimization,"
2 log 1 + (2gBR +gRF +1/ρ) − 2 log 1 + αρgBR +1 can IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp.
be verified as a monotonically increasing function of if 2281-2294, 2017.
xF U [8] L. Lv, F. Zhou, J. Chen, and N. Al-Dhahir, "Secure cooperative communi-
and only if CB increases in a faster rate with than
xF U gBR (αρgBR −1)−1/ρ cations with an untrusted relay: A NOMA-inspired jamming and relaying
CR , i.e., < gRF , otherwise, the term approach," IEEE Transactions on Information Forensics and Security, vol.
xF U xF U 14, no. 12, pp. 3191-3205, 2019.
{E (CB ) − E (CR )} , 0, e.g., no secrecy performance
[9] S. Timotheou and I. Krikidis, "Fairness for non-orthogonal multiple access
for xF U can be achieved. in 5G systems," IEEE Signal Processing Letters, vol. 22, no. 10, pp. 1647-
xN U
it is evident from (11) that the term E (CB ) ,
Finally, 1651, 2015.
1 (1−)ρgBN (gBR +gRF +1/ρ) [10] P. Xu and K. Cumanan, "Optimal Power Allocation Scheme for Non-
2 log 1 + ρgBR gRF +2gBR +gRF +1/ρ is a monotonically Orthogonal Multiple Access With α-Fairness," IEEE Journal on Selected
decreasing function of . Combining the above discussion Areas in Communications, vol. 35, no. 10, pp. 2357-2369, 2017.
14 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
[11] Y. Liu, M. Elkashlan, Z. Ding, and G. K. Karagiannidis, "Fairness of [34] M. Tian, Q. Zhang, S. Zhao, Q. Li, and J. Qin, "Secrecy Sum Rate Opti-
user clustering in MIMO non-orthogonal multiple access systems," IEEE mization for Downlink MIMO Nonorthogonal Multiple Access Systems,"
Communications Letters, vol. 20, no. 7, pp. 1465-1468, 2016. IEEE Signal Processing Letters, vol. 24, pp. 1113-1117, 2017.
[12] Z. Ding, M. Peng, and H. V. Poor, "Cooperative non-orthogonal multiple [35] H. Lei et al., "Secrecy Outage of Ma~ Min TAS Scheme in MIMO-NOMA
access in 5G systems," IEEE Communications Letters, vol. 19, no. 8, pp. Systems," IEEE Transactions on Vehicular Technology, vol. 67, pp. 6981-
1462-1465, 2015. 6990, 2018.
[13] T. N. Do, D. B. da Costa, T. Q. Duong, and B. An, "Improving the [36] A. Arafa, W. Shin, M. Vaezi, and H. Poor, "Securing Downlink Non-
performance of cell-edge users in NOMA systems using cooperative Orthogonal Multiple Access Systems by Trusted Relays," 2018 IEEE
relaying," IEEE Transactions on Communications, vol. 66, no. 5, pp. 1883- Global Communications Conference (GLOBECOM), pp. 1-6, 2018.
1901, 2018. [37] H. Lei et al., "Secrecy Outage Analysis for Cooperative NOMA Systems
[14] Y. Zhou, V. W. S. Wong, and R. Schober, "Stable Throughput Regions of With Relay Selection Schemes," IEEE Transactions on Communications,
Opportunistic NOMA and Cooperative NOMA With Full-Duplex Relay- vol. 67, pp. 6282-6298, 2019.
ing," Trans. Wireless. Comm., vol. 17, no. 8, pp. 5059–5075, 2018, doi: [38] Y. Feng, S. Yan, C. Liu, Z. Yang, and N. Yang, "Two-Stage Relay Selec-
10.1109/twc.2018.2837014. tion for Enhancing Physical Layer Security in Non-Orthogonal Multiple
[15] Y. Liu, Z. Ding, M. Elkashlan, and H. Poor, "Cooperative Non-orthogonal Access," IEEE Transactions on Information Forensics and Security, vol.
Multiple Access With Simultaneous Wireless Information and Power 14, pp. 1670-1683, 2019.
Transfer," IEEE Journal on Selected Areas in Communications, vol. 34, [39] Y. Cao et al., "Secrecy Analysis for Cooperative NOMA Networks With
pp. 938-953, 2016. Multi-Antenna Full-Duplex Relay," IEEE Transactions on Communica-
[16] Y. Liu, H. Ding, J. Shen, R. Xiao, and H. Yang, "Outage Performance tions, vol. 67, pp. 5574-5587, 2019.
Analysis for SWIPT-Based Cooperative Non-Orthogonal Multiple Access [40] Y. Sun, D. W. K. Ng, J. Zhu, and R. Schober, "Robust and Secure Resource
Systems," IEEE Communications Letters, vol. 23, pp. 1501-1505, 2019. Allocation for Full-Duplex MISO Multicarrier NOMA Systems," IEEE
[17] J.-B. Kim and I.-H. Lee, "Non-orthogonal multiple access in coordinated Transactions on Communications, vol. 66, pp. 4119-4137, 2018.
direct and relay transmission," IEEE Communications Letters, vol. 19, no. [41] H. Zhang, N. Yang, K. Long, M. Pan, G. Karagiannidis, and V. C. M. Le-
11, pp. 2037-2040, 2015. ung, "Secure Communications in NOMA System: Subcarrier Assignment
[18] M. F. Kader and S. Y. Shin, "Coordinated Direct and Relay Transmission and Power Allocation," IEEE Journal on Selected Areas in Communica-
Using Uplink NOMA," IEEE Wireless Communications Letters, vol. 7, tions, vol. 36, pp. 1441-1452, 2018.
pp. 400-403, 2018.
[42] B. Zheng et al., "Secure NOMA Based Two-Way Relay Networks Using
[19] X.-m. Chen, R. Jia, and D. W. K. Ng, "The Application of Relay to Massive Artificial Noise and Full Duplex," IEEE Journal on Selected Areas in
Non-Orthogonal Multiple Access," IEEE Transactions on Communica- Communications, vol. 36, pp. 1426-1440, 2018.
tions, vol. 66, pp. 5168-5180, 2018.
[43] B. M. ElHalawany and K. Wu, "Physical-layer security of NOMA systems
[20] X. Yue, Y. Liu, S. Kang, A. Nallanathan, and Y. Chen, "Modeling and under untrusted users," in 2018 IEEE Global Communications Conference
analysis of two-way relay non-orthogonal multiple access systems," IEEE (GLOBECOM), 2018: IEEE, pp. 1-6.
Transactions on Communications, vol. 66, no. 9, pp. 3784-3796, 2018.
[44] K. Cao, B. Wang, H. Ding, T. Li, and F. Gong, "Optimal relay selection
[21] X. Wang, M. Jia, I. W.-H. Ho, Q. Guo, and F. C. Lau, "Exploiting full-
for secure NOMA systems under untrusted users," IEEE Transactions on
duplex two-way relay cooperative non-orthogonal multiple access," IEEE
Vehicular Technology, vol. 69, no. 2, pp. 1942-1955, 2019.
Transactions on Communications, vol. 67, no. 4, pp. 2716-2729, 2018.
[45] K. Cao, B. Wang, H. Ding, T. Li, J. Tian, and F. Gong, "Secure Transmis-
[22] B. Zheng, X. Wang, M. Wen, and F. Chen, "NOMA-based multi-pair two-
sion Designs for NOMA Systems Against Internal and External Eaves-
way relay networks with rate splitting and group decoding," IEEE Journal
dropping," IEEE Transactions on Information Forensics and Security, vol.
on Selected Areas in Communications, vol. 35, no. 10, pp. 2328-2341,
15, pp. 2930-2943, 2020.
2017.
[46] A. Arafa, W. Shin, M. Vaezi, and H. V. Poor, "Secure relaying in non-
[23] L. Lv, Q. Ye, Z. Ding, Z. Li, N. Al-Dhahir, and J. Chen, "Multi-Antenna
orthogonal multiple access: Trusted and untrusted scenarios," IEEE Trans-
Two-Way Relay Based Cooperative NOMA," IEEE Transactions on Wire-
actions on Information Forensics and Security, vol. 15, no. 1, pp. 210-222,
less Communications, 2020.
2019.
[24] Y. Zhang, H.-M. Wang, Q. Yang, and Z. Ding, "Secrecy Sum Rate Max-
imization in Non-orthogonal Multiple Access," IEEE Communications [47] Z. Xiang, W. Yang, G. Pan, Y. Cai, and X. Sun, "Secure Transmission
Letters, vol. 20, pp. 930-933, 2016. in Non-Orthogonal Multiple Access Networks With an Untrusted Relay,"
IEEE Wireless Communications Letters, vol. 8, pp. 905-908, 2019.
[25] Liu, "Enhancing the Physical Layer Security of Non-orthogonal Multiple
Access in Large-Scale Networks," 2018. [48] L. Lv, H. Jiang, Z. Ding, L. Yang, and J. Chen, "Secrecy-Enhancing Design
for Cooperative Downlink and Uplink NOMA With an Untrusted Relay,"
[26] Z. Xiang, W. Yang, G. Pan, Y. Cai, and Y. Song, "Physical Layer Security
IEEE Transactions on Communications, 2019.
in Cognitive Radio Inspired NOMA Network," IEEE Journal of Selected
Topics in Signal Processing, vol. 13, pp. 700-714, 2019. [49] L. Lv, H. Jiang, Z. Ding, Q. Ye, N. Al-Dhahir, and J. Chen, "Intelligent
[27] Y. Feng, S. Yan, and Z. Yang, "Secure Transmission to the Strong User Interference Engineering for Secure Non-Orthogonal Multiple Access,"
with Optimal Power Allocation in NOMA," ArXiv, vol. abs/1807.00935, arXiv preprint arXiv:2003.13488, 2020.
2018. [50] Y. Li, H. Long, M. Peng, and W. Wang, "Spectrum sharing with analog
[28] B. He, A. Liu, N. Yang, and V. Lau, "On the Design of Secure Non- network coding," IEEE transactions on vehicular technology, vol. 63, no.
Orthogonal Multiple Access Systems," IEEE Journal on Selected Areas 4, pp. 1703-1716, 2013.
in Communications, vol. 35, pp. 2196-2206, 2017. [51] J. Kiefer, "Sequential minimax search for a maximum," Proceedings of the
[29] L. Lv, Z. Ding, Q. Ni, and J. J. Chen, "Secure MISO-NOMA Transmission American mathematical society, vol. 4, no. 3, pp. 502-506, 1953.
With Artificial Noise," IEEE Transactions on Vehicular Technology, vol. [52] P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading
67, pp. 6700-6705, 2018. channels," IEEE Transactions on Information Theory, vol. 54, no. 10, pp.
[30] Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin, "Secure Beamforming in 4687-4698, 2008.
Downlink MISO Nonorthogonal Multiple Access Systems," IEEE Trans- [53] L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure
actions on Vehicular Technology, vol. 66, pp. 7563-7567, 2017. transmission with optimal power allocation in untrusted relay networks,"
[31] Y. Feng, S. Yan, Z. Yang, N. Yang, and J. Yuan, "Beamforming Design IEEE wireless communications Letters, vol. 3, no. 3, pp. 289-292, 2014.
and Power Allocation for Secure Transmission With NOMA," IEEE [54] A. Jeffrey and D. Zwillinger, Table of integrals, series, and products.
Transactions on Wireless Communications, vol. 18, pp. 2639-2651, 2019. Elsevier, 2007.
[32] F. Zhou, Z. Chu, H. Sun, R. Q. Hu, and L. H. Hanzo, "Artificial Noise [55] B. He, L. Lv, L. Lv, L. Yang and J. Chen, "Enhancing Secrecy for NOMA
Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Untrusted Relay Networks With User Scheduling and Jamming," in IEEE
Using SWIPT," IEEE Journal on Selected Areas in Communications, vol. Communications Letters, doi: 10.1109/LCOMM.2020.3019960.
36, pp. 918-931, 2018. [56] D. Do, T. Nguyen, K. M. Rabie, X. Li and B. M. Lee, "Throughput
[33] Z. Ding, Z. Zhao, M. Peng, and H. Poor, "On the Spectral Efficiency and Analysis of Multipair Two-Way Replaying Networks With NOMA and
Security Enhancements of NOMA Assisted Multicast-Unicast Streaming," Imperfect CSI," in IEEE Access, vol. 8, pp. 128942-128953, 2020, doi:
IEEE Transactions on Communications, vol. 65, pp. 3151-3163, 2017. 10.1109/ACCESS.2020.3008674.
VOLUME 4, 2016 15
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.3040951, IEEE Access
[57] M. Shokair, W. Saad, and S. M. Ibraheem, "On the performance of MONA SHOKAIR received the B.E. and M.E. de-
downlink multiuser cognitive radio inspired cooperative noma," Wireless grees in electronics engineering from El-Menoufia
Personal Communications, vol. 101, no. 2, pp. 875-895, 2018. University, El-Menoufia, Egypt, in 1993 and 1997,
[58] Shady M. Ibraheem, Walid Bedawy, Waleed Saad, Mona Shokair. "Out- respectively. She received Ph.D. from Kyushu
age Performance of NOMA-based DF Relay Sharing Networks over University, Japan, 2005. From 2005 till 2010,
Nakagami-m Fading Channels", 2018 13th International Conference on she was lecturer in El-Menoufia University. From
Computer Engineering and Systems (ICCES), 2018. 2011 till 2015, she was Associated Prof. in El-
[59] W. Saad, M. Shokair, and S. M. Ibraheem, “On the security of relay as-
Menoufia University. Now she is Prof. in El-
sisted cognitive radio networks in the presence of primary transceiver net-
Menoufia University. She received VTS chapter
work,” Wireless Personal Communications, vol. 104, no. 3, pp. 949–977,
2019. IEEE award from Japan in 2003. She received best
paper from NRSC 2016. Now, she is working in OFDM system, WIMAX
system, cognitive radios and D2D system. She published over 180 papers.
16 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
View publication stats