Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2019 Feb 12;19(3):736. doi: 10.3390/s19030736

NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement

Dinh-Thuan Do 1,*, Minh-Sang Van Nguyen 2, Thi-Anh Hoang 2, Miroslav Voznak 3
PMCID: PMC6386980  PMID: 30759775

Abstract

In this paper, an Internet-of-Things (IoT) system containing a relay selection is studied as employing an emerging multiple access scheme, namely non-orthogonal multiple access (NOMA). This paper proposes a new scheme to consider secure performance, to be called relay selection NOMA (RS-NOMA). In particular, we consider metrics to evaluate secure performance in such an RS-NOMA system where a base station (master node in IoT) sends confidential messages to two main sensors (so-called NOMA users) under the influence of an external eavesdropper. In the proposed IoT scheme, both two NOMA sensors and an illegal sensor are served with different levels of allocated power at the base station. It is noticed that such RS-NOMA operates in two hop transmission of the relaying system. We formulate the closed-form expressions of secure outage probability (SOP) and the strictly positive secure capacity (SPSC) to examine the secrecy performance under controlling setting parameters such as transmit signal-to-noise ratio (SNR), the number of selected relays, channel gains, and threshold rates. The different performance is illustrated as performing comparisons between NOMA and orthogonal multiple access (OMA). Finally, the advantage of NOMA in secure performance over orthogonal multiple access (OMA) is confirmed both analytically and numerically.

Keywords: relay selection, NOMA, IoT, secure outage probability, strictly positive secure capacity

1. Introduction

Any eavesdropper is able to disturb the signal easily due to the broadcasting environment of wireless communication. At the application layer (i.e., highest layer), encryption methodology using cryptography is conventionally implemented to assurance the secure information transmission. Nevertheless, to tackle with situation of speedy growth of computer networks, these procedures and secure keys become ineffective ways, especially in increasing computing capability [1]. Additionally, great encounters in secure communications include the security of key transmission, the complexity of key management, and distribution [2]. Consequently, physical layer security (PLS) is an effective way to fight eavesdropping and diminish the overhearing information and it is considered as an extra data fostering key encryption technology as in [3,4].

To provide a network access technique for the next generation of wireless communications, an emerging multiple access scheme, namely, non-orthogonal multiple access (NOMA) transmission was proposed in many works such as [5]. The power domain and channel quality are acquired to exploit different performance of NOMA users regarding multiple access. As a main characterization, a significantly strengthened performance results from NOMA users with good channels, while relatively poor performance is seen in NOMA users with bad channel conditions [6]. Combining NOMA with cooperative communication [7,8,9], cooperative NOMA (C-NOMA) transmission scheme is proposed as a possible solution to generate a unique system in which users with better channel circumstances assist forwarding signal to distance users who are affected in situations of worse channels [7,10].

To achieve an advantage of the diversity related to wireless channels in relaying networks, a relay selection scheme has been broadly implemented and considered as improving the quality of the transmission [11]. Especially, a relay network is introduced in some technical deployment snapshots of the IoT devices of SmartBridge, SmartDIMES, and SmartSenSysCalLab [12]. Two policies in energy harvesting architecture inclusing time switching (TS) relaying, power splitting (PS) relaying are empoyed with NOMA and it is considered as suitable deployment of wireless powered IoT relay systems [13]. In a practical scenario, main technologies for wireless communication systems (for example LTE) are required to deploy multiuser selection or scheduling schemes. In addition, the relay selection scheme under NOMA networks is introduced and analysed in recent works [14,15,16]. A great improvement in the QoS of the system is resulted from a system model which combines cooperative relay and NOMA. In particular, a two-stage relay selection is proposed and derived with respect to closed-form expressions on outage probability and they are obtained in cooperative systems using decode-and-forward as in [14]. The approximate and asymptotic expressions on average sum rate are examined as combining relay selection and amplify-and-forward (AF) assisted NOMA [15]. Moreover, by analyzing the outage probability and its asymptotic results, a partial relay selection scheme is studied in [16]. The fixed and adaptive power allocations (PAs) at the relays are introduced in cooperative NOMA to consider two optimal relay selection schemes, namely as the two-stage weighted-max-min (WMM) and max-weighted-harmonic-mean (MWHM) schemes [17]. On the orther hand, to improve the performance in throughput and coverage, new model is exploited as combining the orthogonal frequency division multiple access (OFDMA) and cooperative multicast (CM) technology to perform the intra-cooperation of multicast group (MG) [18]. In other systems, relay selection (RS) non-orthogonal multiple access (NOMA) is studied in terms of the diversity orders by deployment of RS schemes for full-duplex /half-duplex communications [19].

Furthermore, power allocation and user scheduling are discussed as the other encounters in NOMA networks [20]. To improve the NOMA’s performance, power distribution therein shows a major characterization affecting different user’s performance since certain power partitions which are allocated for multiple superposed users, and this topic fascinates a lot of study. For instance, fixed power allocation scheme is deploy to serve two NOMA users and its performance is evaluated by employing the closed-form expression of outage probability and ergodic sum-rate in [21]. In addition, a general two-user power allocation algorithm is proposed by overcoming the drawbacks of fixed power distribution in NOMA network [22]. On the other hand, fairness performance of NOMA network is resulted by varying power allocation factors as investigation in [23]. While sum rate maximization and proportional fairness criteria under impact of the power allocation algorithms is studied for two user NOMA networks in [24].

On the other hand, stochastic geometry networks are exploited regarding the physical layer security to apply to 5G NOMA networks in [25]. To enhance the secrecy performance for single antenna and multiple-antenna stochastic geometry networks two dissimilar schemes were considered as extended work of [25] and detailed contribution can be observed in [26]. Furthermore, the optimal decoding order, power allocation and transmission rates are important metrics to evaluate and exhibit a new design of NOMA under secrecy considerations [27]. A single-input single-output (SISO) system serving NOMA scheme was investigated in terms of secure performance in [28]. In such system, optimal power allocation policy is proposed to highlight advantage of secrecy performance of NOMA compared with that in the conventional OMA [28]. The authors in [29] exploited physical layer security in downlink of NOMA systems [29] and both the exact and asymptotic secrecy outage probability (SOP) were investigated to examine secure performance of the SISO and MISO NOMA systems. In other trend of research, two transmit antenna selection (TAS) schemes were proposed to perform secure performance evaluation in cooperative NOMA networks in [30], and then the closed-form formula of the ergodic secrecy rate was achieved. To the best of the authors’ knowledge, there are few works related to the analysis of the physical layer security in relay selection NOMA systems. Thus, this is the main motivation of this work.

From the above analysis, it is worth noting that a few studies have considered the technical design of NOMA relaying architecture against the unwanted eavesdropper with appropriate secrecy. This paper aims to exploit the advantage of relay selection to improve system performance of IoT deploying NOMA. In particular, this motivates us to design secure NOMA schemes for the practical IoT scenario where the relay is selected to forward signal with enhanced performance at NOMA receivers. In this scenario, we use the secrecy probability to measure the secrecy performance of the system since the perfect secrecy rate is usually not obtained, and hence, it can not be evaluated as the secrecy metric. We highlight that the SOP and SPSC are appropriate secrecy metrics for security consideration in the NOMA systems.

The primary contributions of the paper are summarized as follows:

  • Targeting the secrecy outage constraint, we comprehensively study the design of NOMA-assisted IoT system against the external eavesdropper. The transmit signal to noise ratio (SNR) at the base station (BS), transmission rates, and power allocated factors to each user are considered as main parameters. These values need be determined in design of RS-NOMA. For the first time, we analytically prove that the relay selection provides improved secure performance at higher number of relay for RS-NOMA.

  • For Decode-and-Forward (DF) mode, we show that the outage behavior of RS- NOMA scheme is superior to that of OMA scheme in the specific SNR region. Furthermore, we confirm that the RS-NOMA scheme depends on how strong the eavesdropper channel is. In fact, SOP and SPSC of far user depend on the number of relay selected.

  • Both analytically and numerically, the exactness of derived expressions is verified and we compare the performance of the NOMA scheme with that of the OMA scheme in the studied problems with the secrecy outage constraint.

The remainder of this paper is organized as follows. In Section 2, the system model is introduced. The detailed analysis in terms of SOP metric is proposed in Section 3. In Section 4, we derive an exact expression of SPSC in RS-NOMA. Section 5 presents the benchmark of OMA scheme for further evaluation. Numerical results are presented in Section 6. Concluding remarks are given in Section 7.

The main notations of this paper are shown as follows: E· denotes expectation operation; fX. and FX. stand for the probability density function (PDF) and the cumulative distribution function (CDF) of a random variable X.

2. System Model of Secure Analysis for DF Relay Selection

Figure 1 represents the considered RS-NOMA assisted IoT system including a base station (BS), multiple relays (i.e., K relays), two main sensors (D1, strong user, and D2, poor user), and an eavesdropper (E) in an IoT network. In such a system model, the BS is located in the cell-center, strong user D1 and E are located near with the BS while the poor user D2 is very close to the cell-edge. In this situation, it is assumed that there is no direct links between BS and the poor user due to high obstructions or deep fading. However, quality of transmission from the BS to D2 will be improved by employing relay selection scheme. We further assume that single antenna is equipped at all nodes in the RS-NOMA network and each link employing channels associated with independent Rayleigh fading. As most expectations in the literature, it is assumed that E can acquire the signals transmitted from the BS.

Figure 1.

Figure 1

System model of a RS-NOMA assisted IoT system in the existence of an external eavesdropper.

The channel coefficients from the BS to relay k,k=1,2,,K and the eavesdropper are denoted by hSRk and hE, respectively. Next, the channel coefficient from the BS to near NOMA user is hD1, while gkD2 is denoted as channel coefficient between relay k and D2. These channels are normalized as Rayleigh fading channel. We assume the quasi-static block fading model adopted; it means the channel coefficients are kept constant during the transmission of one message, which includes a block of symbols, and adjust independently of one block to the next block. We call PS is transmit power at the BS, α1, α2 are power allocation factors for two NOMA users and they satisfy α1+α2=1. It is noted that x1, x2 are simultaneous transmissions from the BS to serve two NOMA users D1, D2 respectively. In addition, we denote wU as Additive white Gaussian noise (AWGN) term at node U.

As a fundamental principle of RS-NOMA, the transmitter is enabled to simultaneously assist multiple users. To perform this task, the superposition coding (SC) is deployed in the transmitter to conduct a linear combination of multiple signals to serve the users. The composed signal xSNOMA is transmitted from the BS to all relays and two NOMA users in the first phase, which is shown as

xSNOMA=α1PSx1+α2PSx2. (1)

The received signal at D1 in the direct link is expressed by

ySD1NOMA=hD1xSNOMA+wD1=hD1α1PSx1+α2PSx2+wD1. (2)

Here, it is AWGN noise and variance of σ02.

The received signal at Rk is given by

ySRkNOMA=hSRkxSNOMA+wR=hSRkα1PSx1+α2PSx2+wRk. (3)

In this paper, it is assumed that users are not arranged by their channel conditions. Under such considered RS-NOMA scheme, x2 can be detected at user 1 before using successive interference cancellation (SIC) [6]. Therefore, the received instantaneous signal-to-interference-noise ratio (SINR) of the user D1 can be given as SNR to detect x2 as

γSD1,x2NOMA=α2PShD12α1PShD12+σ02=α2ρShD12α1ρShD12+1. (4)

The SIC is carried out at D1 to remove the signal for D2, therefore the instantaneous rate for D1 detect the signal x1 is given by

γSD1,x1NOMA=α1PShD12σ02=α1ρShD12 (5)

where ρS=PSσ02.

In this situation, it is possible to apply fixed power allocation coefficients in two NOMA users in such relay selection mode. To improve the performance of the relay selection schemes, reasonable power optimization can be further studied, and this concern may be considered in our future work.

At relay, x2 can be detected before using SIC and as employing SIC, x2 will be regarded as interference eliminated before decoding signal x1. It is assumed that these relays can not harm D1 and there is no detection on x1. Firstly, the expression of SNR must be computed to decode x2 transmitted from the BS to relay as

γSR,x2NOMA=α2PShSRk2α1PShSRk2+σ02=α2ρShSRk2α1ρShSRk2+1. (6)

At the cell-edge user, the received signal can be obtained at D2 from the relay as

yRD2NOMA=gkD2PRx2+wD2. (7)

Therefore, calculating SNR to detect x2, which is transmitted in the second hop from the kth relay to user D2, is given as

γRD2,x2NOMA=PRgkD22σ02=ρRgkD22, (8)

where ρR=PRσ02.

The received signal at D2 which forwarded by D1 is expressed as

yD1D2NOMA=gD12PRx2+wD2. (9)

The received SINR at D2 to get x2 for link is given by

γD12,x2NOMA=PRgD122σ02=ρRgD122. (10)

Regarding computation of the received signal to interference plus noise ratio (SINRs) at the eavesdropper, here, we overestimate the eavesdropper’s capability. A worst-case assumption from the legitimate user’s perspective is made here. That is, E is equipped capability of the multiuser detection. In more detailed consideration, user E performs parallel interference cancellation (PIC) to distinguish the superimposed mixture. In such a scenario, the eavesdropper knows the decoding order and the power allocation factors. Thus, we have to adopt the worst-case assumption from the legitimate user’s perspective due to the conservativeness mandated by the security studies. It is worth noting that this assumption has been adopted in previous work on the secrecy of NOMA systems [25,26]. It is shown that the received signal at E is

ySENOMA=hExSNOMA+wE=hEα1PSx1+α2PSx2+wE. (11)

Therefore, SNR is computed to overhear x1 at E as

γSE1NOMA=α1PShE2σE2=α1ρEhE2, (12)

where ρE=PSσE2, Here, AWGN noise term at E has variance of σE2.

And then, SNR related to overhearing signal x2 at E is given by

γSE2NOMA=α2PShE2σE2=α2ρEhE2. (13)

In this RS-NOMA scheme, the best relay node is selected by the following criterion. Firstly, the end-to-end SNR following DF mode can be computed by [31]

γkNOMA=minγSRk,x2NOMA,γRD2,x2NOMA, (14)

where γSRk,x2 stands for SNR at the first hop from the BS transmitting signal to the kth relay Rk.

The index k in group of relay in considered criteria is determined by

γkNOMA=maxk=1,,KγkNOMA. (15)

The secrecy capacity for D1 is obtained as

Cx1NOMA=12log21+minγSD1,x1NOMA,γSD1,x2NOMA1+γSE1NOMA+, (16)

where x+=maxx,0. It is worth noting that D2 employs Maximum ratio combining (MRC) principle to process mixture signal as existence of both D1-D2 link and Source-Selected Relay-D2 link. As a result, the secrecy capacity for D2 is obtained as [16]

Cx2NOMA=12log21+maxminγSD1,x2NOMA,γD12,x2NOMA,γkNOMA1+γSE2NOMA+. (17)

3. Secure Outage Performance in RS-NOMA

In this section, the secrecy capacity is studied for Rayleigh fading channels in terms of the SOP. To describe the secrecy performance of a wireless communication system, such a metric is also an important performance measurement and SOP is generally used. In particular, the SOP is defined as the probability that the instantaneous secrecy capacity Csec will drop below a required secrecy rate threshold R (i.e., if Csec<R, information security will not be satisfied, and then an outage event can be raised; otherwise, perfect secrecy will be maintained).

3.1. SOP at D1

Proposition 1.

The SOP for D1 can be expressed as

PSOP1NOMA=1α1ρSλD1α1ρSλD1+φ1λEφ1α1λEexpψ1α1ρSλD1+1α1ρSλD1α2ψ1α1φ1α1λEUt1, (18)

where φ1=22R1α1ρE,ψ1=22R11,Ut1=0α2ψ1α1expα2α1t1ρSλD1+t1φ1α1α1ρSλEdt1. From here to following sections, we denote λD1, λD12, λSRk, λkD2, λE as channel gains of links BS-D1, D1-D2, BS-Rk, Rk-D2, BS-E respectively. Here, R1 denotes the target data rate of D1.

Proof. 

See in Appendix A. ☐

3.2. SOP at D2

Proposition 2.

For performance evaluation on user D2, we formulate SOP as

PSOP2NOMA=1ρRλD12ρRλD12+φ2λEφ2α1ρSλEexp1α1ρSλD1α2ρSψ2α1ρSφ2α1ρSλEψ2ρRλD12qt2×k=1KρRλkD2ρRλkD2+φ2λEφ2α1λEexp1α1ρSλSR1α2ψ2α1φ2α1λEψ2ρRλkD2qt3, (19)

where φ2=22R2α2ρE,ψ2=22R21,qt2=0α2ρSψ2α1ρSexpα2ρSα1ρSt2λD1+t2φ2α1ρSλEdt2,qt3=0α2ψ2α1expα2α1t3ρSλSR1+t3φ2α1λEdt3. We denote R2 as the target data rate of D2.

Proof. 

See in Appendix B. ☐

The secure performance can be examined for the whole NOMA system by deploying this formula

OPNOMA=11OP1NOMA1OP2NOMA. (20)

4. SPSC Analysis in RS-NOMA

In such RS-NOMA, the SPSC is fundamentally defined as the probability of the secrecy capacity Csec being zero. Under this circumstance, SPSC is an extra metric characterizing the properties of physical channels in wireless communication, and hence, physical-layer (PHY) security is perfectly evaluated to exhibit the RS-NOMA scheme to real application under the existence of eavesdropper in nature wireless transmission environment. In general, the SPSC can be calculated by

PSPSC=PrCsec>0 (21)

4.1. SPSC Compution at D1

From the definition above, we have the outage formula in this case as

PSPSC1NOMA=PrCx1NOMA>0=PrγSD1,x1NOMA>γSE1NOMA,γSD1,x2NOMA>γSE1NOMAPrγSD1,x1NOMA>γSE1NOMAP1PrγSD1,x2NOMA>γSE1NOMAP2. (22)

Such outage event must be constrained by ρEhE2ρS>α1ρEhE2α2ρSα1ρSα1ρEhE2. Firstly, P1 can be written by

P1=PrhD12>ρEρShE2=0α2α1α1α1ρEexpρExρSλD11λEexpxλEdx=ρSλD1ρSλD1+ρEλEexpρEρSλD1+1λEα2α1α1α1ρE1 (23)

Similarly, in case of α1ρEhE2α2ρSα1ρSα1ρEhE2>ρEhE2ρS, P2 can be calculated as

P2=PrhD12>α1ρEhE2α2ρSα1ρSα1ρEhE2=α2α1α1α1ρEexpα1ρExα2ρSα1ρSα1ρExλD11λEexpxλEdx (24)

To calculate the above integral, we set new variable as v=α2ρSα1ρSα1ρExx=α2ρSvα1ρSα1ρE, then it can be expressed by

P2=1λEα1ρSα2ρSexpα2ρSvα1ρSvλD1α2ρSvα1ρSα1ρEλEdvα1ρSα1ρE=1α1ρSα1ρEλEexp1α1ρSλD1α2ρSα1ρSα1ρEλEqv. (25)

Therefore, the SPSC is then computed to evaluate secure performance at D1 as

PSPSC1NOMA=P1×P2=mqvexpnα2α1α1α1ρE+1α1ρSλD1α2ρSα1α1ρSρEλEqvexp1α1ρSλD1α2ρSα1α1ρSρEλE, (26)

where m=ρSλD1ρSλD1+ρEλEα1α1ρSρEλE,n=ρEρSλD1+1λE,qv=α2ρSα1ρSexpα2α1vλD1+vα1ρSα1ρEλEdv.

4.2. SPSC Computation at D2

In a similar way, the SPSC performance at D2 can be expressed as

PSPSC2NOMA=PrCx2NOMA>0=PrminγSD1,x2NOMA,γD12,x2NOMA>γSE2NOMAG×Prmaxk=1KminγSR,x2NOMA,γRKD2,x2NOMA>γSE2NOMAH. (27)

To proceed from this formula, we first consider term of G and it can be calculated as

G=PrminγSD1,x2NOMA,γD12,x2NOMA>α2ρEhE2=Prα2ρShD12α1ρShD12+1>α2ρEhE2G1PrρRgD122>α2ρEhE2G2. (28)

It is worth noting that the outage probability must satisfy the condition of ρSα1ρSρEhE2>0hE2<1α1ρE. As a result, it can be rewritten as

G1=01α1ρEexpρEx1α1ρExρSλD11λEexpxλEdx=1λE01α1ρEexpρEx1α1ρExρSλD1xλEdx. (29)

Next, a new variable can be put as v1=1α1ρExx=1v1α1ρE to calculate the above integral. As a result, it can be expressed by

G1=1λE10exp1v1α1v1ρSλD11v1α1ρEλEdv1α1ρE=1α1ρEλEexp1α1ρSλD11α1ρEλEqv1, (30)

where qv1=01exp1α1v1ρSλD1+v1α1ρEλEdv1.

Similarly, we have

G2=PrhD122>α2ρEρRhE2=0expα2ρExρRλD121λEexpxλEdx=ρRλD12ρRλD12+α2ρEλE. (31)

From (30) and (31), we have

G=ρRλD12ρRλD12+α2ρEλEα1ρEλEexp1α1ρSλD11α1ρEλEqv1. (32)

From (27), H can be calculated as

H=Prmaxk=1KminγSR,x2NOMA,γRKD2,x2NOMA>γSE2NOMA=k=1KPrα2ρShSR12α1ρShSR12+1>ζH1PrρRgkD22>ζH2. (33)

H1 can be computed as:

H1=Prα2ρShSR12α1ρShSR12+1>ζ=PrhSR12>ζα2ζα1ρS=expζα2ζα1ρSλSR1,ζ<α2α10,ζα2α1. (34)

Similarly, we can calculate H2 to be

H2=PrgkD22>ζρR=expζρRλkD2. (35)

It is constrained by α2ρEhE2<α2α1hE2<1α1ρE. In this situation, it can be rewritten as

H1×H2=EhE2expζα2δα1ρSλSR1H1×expζρRλkD2H2,ζ<α2α1=EhE2expα2ρEhE2α2α2ρEhE2α1ρSλSR1×expα2ρEhE2ρRλkD2,hE2<1α1ρE=1λE01α1ρEexpα2ρExα2α1α2ρExρSλSR1α2ρExρRλkD2xλEdx. (36)

We formulate H as

H=1k=1K101α1ρEexpα2ρExα2α1α2ρExρSλSR1α2ρExρRλkD2xλEdx. (37)

Therefore, the SPSC evaluation at D2 can be determined by

PSPSC2NOMA=ρRλD12ρRλD12+α2ρEλEα1ρEλEexp1α1ρSλD11α1ρEλEqv1×1k=1K101α1ρEexpα2ρExα2α1α2ρExρSλSR1α2ρExρRλkD2xλEdx, (38)

where qv1=01exp1α1v1ρSλD1+v1α1ρEλEdv1,ζ=α2ρEhE2.

5. Optimization and Studying OMA as Benchmark

5.1. Selection of α1 for NOMA Transmission

In this section, we perform a numerical search for the value of α1 that minimizes outage performance. However, these derived expressions of outage probability can not exhibit optimal α1. Fortunately, it can show an approximation to α1 obtained in a simple manner from the following observations

γSD1,x1NOMAε2ϑSD1,x1ε2α1, (39)

where ϑSD1,x1=ρShD12, and

γSD1,x2NOMAε2ϑSD1,x2ε2α2α1ε2, (40)

where ε2=22R2.

Clearly, the value of α1 which minimizes outage performance is equivalent with evaluation of ϑSD1,x1 and ϑSD1,x2 as below

ϑSD1,x2=ϑSD1,x1α1=12+ε2. (41)

Although our derivation is clearly an approximation computation, its accuracy will be verified later in the numerical results section. It is interesting to see that considered outage value does not depend on the instantaneous channel values and it depends only on the target rates of the two users.

5.2. Asymptotic Analysis

We first consider asymptotic SOP for D1. To investigate the asymptotic secrecy performance, we also provide an asymptotic SOP analysis.

From (18), at high SNR ρE the SOP performance of D1 based NOMA system can be asymptotically expressed as

PSOP1asyNOMAPr1+a2a11+α1ρEhE2<22R1PrhE2>1+a2a1ε1ε1α1ρEexp1+a2a1ε1ε1α1ρEλE, (42)

where ε1=22R1.

Then, we perform asymptotic derivation for SOP of D2. Similarly, from (19), the asymptotic expression for a D2 is given by

PSOP2NOMAPr1+a2a11+γSE2NOMA<22R2U1Pr1+a2a11+γSE2NOMA22R2U2. (43)

From (43), we can calculate U1 as

U1=Pr1+a2a11+α2ρEhE2<22R2exp1+a2a1ε2ε2α2ρEλE. (44)

Similarly, with U2 we get

U2=Pr1+a2a11+γSE2NOMA<22R2=k=1KPrhE2>1+a2a1ε2ε2α2ρE=k=1Kexp1+a2a1ε2ε2α2ρEλE. (45)

Replacing (44) and (45) into (43) leads to

PSOP2NOMAexp1+a2a1ε2ε2α2ρEλEk=1Kexp1+a2a1ε2ε2α2ρEλE. (46)

5.3. Consideration on OMA as Benchmark

As a traditional multiple access scheme, OMA is still deployed in a huge number of applications. It is further considered an advantage of NOMA compared with older counterpart, i.e., OMA. Although security concerns in OMA scheme are studied in the literature, this paper carefully presents the main computations to make such comparisons clearer. In OMA, we first compute SNR to detect x1 from the BS to D1 as

γSD1,x1OMA=PShD12σ02=ρShD12. (47)

To detect x2 from the BS to relay, it is required to calculate SNR as

γSR,x2OMA=PShSR12σ02=ρShSRk2. (48)

We compute SNR to detect x2 in second hop from relay to D2 as

γRD2,x2OMA=PRgkD22σ02=ρRgkD22. (49)

It is shown SNR to detect signal x1, x2 at E respectively

γSE1OMA=PShE2σE2=ρEhE2, (50)

and

γSE2OMA=PShE2σE2=ρEhE2. (51)

Similarly, the secrecy capacity for D1 in OMA is obtained as

Cx1OMA=12log21+γSD1,x1OMA1+γSE1OMA+. (52)

The secrecy capacity for D2 in OMA is obtained as

Cx2OMA=14log21+γkOMA1+γSE2OMA+. (53)

It is worth noting that the best relay node is selected by the following criterion γkOMA=maxk=1,,KγkOMA with γkOMA=minγSR,x2OMA,γRD2,x2OMA.

In similar way, SOP at D1 in OMA scheme is given by

PSOP1OMA=1PrCx1OMAξ1=1Pr1+γSD1,x1OMA1+γSE1OMAξ1=1PrhD12ξ1ρEρShE2+ξ11ρS. (54)

In next step, it is calculated as

PSOP1OMA=1PrhD12A1OMAhE2+B1OMA=10expA1OMAx+B1OMAλD11λEexpxλEdx=11λEexpB1OMAλD10expA1OMAλD1+1λExdx. (55)

Finally, SOP at D1 in this situation is given by

PSOP1OMA=1λD1λEA1OMA+λD1expB1OMAλD1, (56)

where ξ1=22R1, A1OMA=ξ1ρEρS,B1OMA=ξ11ρS.

The SOP at D2 in OMA scheme is further computed as

PSOP2OMA=PrCx2OMA<R2=Pr1+γkOMA1+γSE2OMA<24R2=Prmaxk=1,,KminρShSR12,ρRgkD22ν<ψhE2+μ. (57)

And then, it is rewritten as

PSOP2OMA=01Fνηy1fhE2xdx=011expηψx+μk1λEexpxλEdx=1λEexpkημ×0k=1KKk1k1expkηψ+1λExdx=1expkημk=1KKk1k11kηψλE+1, (58)

where ψ=24R2ρE,μ=24R21,η=1ρSλSRk+1ρRλkD2.

The SOP for secure performance evaluation of whole OMA is given as

OPOMA=11OP1OMA1OP2OMA. (59)

Regarding SPSC analysis for an OMA scenario, we have the following equation in similar computation. We first present SPSC metric at D1 as

PSPSC1OMA=PrCx1OMA>0=PrγSD1,x1OMA>γSE1OMA=1λE0expρEρSλD1+1λExdx=ρSλD1ρEλE+ρSλD1. (60)

Furthermore, the expression of SPSC metric can be derived at D2 as

PSPSC2OMA=01Fνηy2fhE2xdx=011expηρExk1λEexpxλEdx=1λE0k=1KKk1k1expkηρE+1λExdx=1k=1KKk1k11kηρEλE+1, (61)

where η=1ρSλSRk+1ρRλkD2.

6. Numerical Results

In this section, we provide numerical examples to evaluate the secrecy performance of RS-NOMA under impact of eavesdropper based on two system metrics including SOP and SPSC. Specifically, we investigate these metrics by considering the effects of transmit SNR, fixed power allocation factors, the number of relays, channel gains.

As an important parameter of NOMA, the impact of different threshold rates on the SOP performance of user D1 is simulated in Figure 2. The reason for such observation is that the threshold rate is the limited secure capacity as performing probability calculation. At high threshold rate, the performance gap between NOMA and OMA can be observed clearly. In addition, asymptotic evaluation shows that outage behavior is constant because such outage does not depend on ρS. This observation can be seen in the following experiments.

Figure 2.

Figure 2

Comparison study on SOP of NOMA and OMA for User D1 versus ρS=ρR as changing R1 (λD1=λE=1, ρE=0 dB, R2=1).

Another observation is that the impact of the number of relays selected to forward signal to user D2. As a further development, Figure 3 plots the SOP of NOMA scheme versus a different number of relays. As observed from the figure, we can see that the higher number of selected relays also strongly affect secure performance of RS-NOMA scheme compared with small variations at OMA. The most important thing is that the RS-NOMA furnishes with K=5 relay providing remarkable improvement in secure outage performance. This is due to the fact that there are more chances to achieve improved signal to serve far NOMA user. This observation confirms a role of relay selection to enhanced secure performance in the considered RS-NOMA.

Figure 3.

Figure 3

Comparison study on SOP of NOMA and OMA for User D2 versus ρS=ρR as changing K (λD1=λD12=λSRk=λkD2=λE=1, ρE=10 dB, R2=1).

Figure 4 plots the outage probability of RS-NOMA and OMA schemes versus SNR for simulation settings with λE=1, ρE=0 dB, R1=0.5, R2=1. Obviously, the outage probability curves match precisely with the Monte Carlo simulation results. In this observation, the performance gap between NOMA and OMA is small as changing channel gain of link S-D1. This is in contrast with Figure 4, which shows larger a performance gap between NOMA and OMA for secure consideration at D2.

Figure 4.

Figure 4

Comparison study on SOP of NOMA and OMA for User D1 versus transmit ρS=ρR as varying λD1.

In Figure 5, the SOP performance of the RS-NOMA and OMA schemes with different threshold rates at D2 are compared to provide an impact of the required rates on secure performance. We setup the main parameters as λD1=λD12=λSRk=λkD2=λE=1, ρE=10 dB, K=1. It can be seen from both figures that the proposed RS-NOMA scheme can remarkably enhance the secure performance compared to the OMA scheme. Performance gaps between NOMA and OMA can be seen clearly at higher threshold rate R2.

Figure 5.

Figure 5

SOP of NOMA and OMA for User D2 versus ρS=ρR as varying R2.

In Figure 6, we compare the secure performance for the RS-NOMA and OMA schemes with different strong levels of eavesdroppers. To perform the simulation, the required parameters are summarized as λD1=λE=1, R1=0.5, R2=1. It can be evidently seen that SOP in the OMA is better than that in the RS-NOMA scheme. The main reason for this is that the cooperative NOMA network is sensitive to the relation between the target data rates and power allocation. In a similar trend, we see the performance gap at user D2 as in Figure 7. In this situation, the simulated parameters are shown in this case as λD1=λD12=λSRk=λkD2=λE=1, R2=0.5, K=3. To provide more insights, the secure performance of the whole system needs be considered. In Figure 8, the curves of SOP are illustrated to show performance gaps among these cases including User D1, User D2 and the whole NOMA system.

Figure 6.

Figure 6

Comparison study of SOP for NOMA and OMA for User D1 versus ρS=ρR as varying ρE.

Figure 7.

Figure 7

Comparison study of SOP for NOMA and OMA for User D2 versus ρS=ρR as varying ρE.

Figure 8.

Figure 8

Comparison study of SOP in several cases versus ρS=ρR (λD1=λD12=λSRk=λkD2=λE=1, ρE=8 dB, K=1, R1=R2=1).

In Figure 9, an optimal value of power allocation factor, i.e., α1 can be checked by a numerical method. It can be confirmed that our derivation in an approximate manner is similar to numerical value obtained. This is the guideline for designing NOMA to achieve the lowest outage performance.

Figure 9.

Figure 9

Optimal SOP in several cases with indication of optimal value regarding α1 (λD1=λD12=λSRk=λkD2=λE=1, ρE=5 dB, K=1, R1=R2=0.5).

In Figure 10, further simulation is performed for consideration at D1; the SPSC performance versus transmit SNR is presented. As can be seen, at lower SNR regime, SPSC performance between OMA and NOMA is similar. This observation will change at higher SNR. The strong characterization of eavesdropper leads to varying SPSC performance. As seen in other simulations, this result verifies the exactness of the analytical computations presented in the previous section.

Figure 10.

Figure 10

Comparison study of SPSC in several cases versus ρS=ρR at D1 as setting different values of ρE (λD1=λE=1, R1=0.5, R2=1).

In Figure 11, the curves of SPSC versus transmit SNR at D2 are presented. As can be seen, the analytical results can match the simulations very well. Obviously, by varying channel gains of the eavesdropper, the SPSC will be changed. Meanwhile, the performance gap between OMA and NOMA in such SPSC is linear in the range of SNR from −20 dB to 5 dB and it does not exist if the SNR is greater than 10 dB. Like previous simulations, this result coincides with the analysis in analytical computations presented in the previous section.

Figure 11.

Figure 11

SPSC performance in several cases versus ρS=ρR as different choices of ρE (λD1=λD12=λSRk=λkD2=λE=1, K=1, R1=0.5,R2=1).

7. Conclusions

In this study, the closed-form expressions are derived in a scenario of relaying network deploying NOMA. In such NOMA, relay in group is selected to evaluate secure performance in situations regarding the existence of secrecy probability in such RS-NOMA. In this scenario, we considered a system with an eavesdropper, multiple-relay, two NOMA users, and a base station. As an important achievement, the best relay selection criteria was recommended to enhance system secrecy performance against eavesdropping attacks. By evaluating the effects of various indicators of the system, we investigated two main metrics, the SPSC and the SOP and then secrecy performance analysis is achieved. In addition, we further demonstrated the accuracy of the analysis using Monte Carlo simulations. In addition, we confirmed the advantage of NOMA scheme compared with OMA at specific values of simulated parameters. For future work, multiple antenna at the base station and multiple eavesdroppers should be examined together with relaying techniques to illustrate a practical implementation of RS-NOMA.

Appendix A

Proof of Proposition A1.

We first compute SOP based on the concerned definition as

PSOP1NOMA=1PrCx1NOMAR1=1Pr12log2min1+γSD1,x1NOMA1+γSE1NOMA,1+γSD1,x2NOMA1+γSE1NOMAR11PrγSD1,x1NOMA22R11+γSE1NOMA1X1PrγSD1,x2NOMA22R11+γSE1NOMA1X2. (A1)

To compute such outage, X1 can be first calculated as

X1=PrhD12φ1hE2+ψ1α1ρS=0expφ1hE2+ψ1α1ρSλD11λEexpxλEdx=α1ρSλD1α1ρSλD1+ε1λEexpψ1α1ρSλD1. (A2)

where φ1=22R1α1ρE,ψ1=22R11.

In addition, X2 can be expressed by

X2=PrhD12φ1hE2+ψ1ρSα2ψ1α1φ1α1hE2. (A3)

It is noted that strict constraint here is ρSα2ψ1α1φ1α1hE2>0hE2<α2ψ1α1φ1α1 then X2 can be further computed by

X2=0α2ψ1α1φ1α1expφ1x+ψ1α2ψ1α1φ1α1xρSλD11λEexpxλEdx. (A4)

Next, new variable can be seen as t1=α2ψ1α1φ1α1xx=α2ψ1α1t1φ1α1 then X2 can be re-expressed by

X2=1φ1α1λE0α2ψ1α1expα2t1α1t1ρSλD1expα2ψ1α1t1φ1α1λEdt1=1φ1α1λEexp1α1ρSλD1α2ψ1α1φ1α1λEUt1. (A5)

After performing simple manipulations, it can be obtained that

PSOP1NOMA=1α1ρSλD1α1ρSλD1+φ1λEφ1α1λEexpψ1α1ρSλD1+1α1ρSλD1α2ψ1α1φ1α1λEUt1. (A6)

This is end of the proof. ☐

Appendix B

Proof of Proposition A2.

From the definition, it can be expressed SOP as

PSOP2NOMA=PrCx2NOMA<R2=PrγSD1,x2NOMA<22R21+γSE2NOMA1γD12,x2NOMA<22R21+γSE2NOMA1×PrγSRk,x2NOMA<22R21+γSE2NOMA1γRkD2,x2NOMA<22R21+γSE2NOMA1=1PrγSD1,x2NOMA22R21+γSE2NOMA1,γD12,x2NOMA22R21+γSE2NOMA1Q1×k=1K1PrγSRk,x2NOMA22R21+γSE2NOMA1,γRkD2,x2NOMA22R21+γSE2NOMA1Q2. (A7)

In this situation, R1 can be written as

Q1=1PrγSD1,x2NOMA22R21+γSE2NOMA1,γD12,x2NOMA22R21+γSE2NOMA1=1PrhD12φ2hE2+ψ2α2ρSψ2α1ρSφ2α1ρShE2J1PrgD122φ2hE2+ψ2ρRJ2. (A8)

This case requires the constraint as α2ρSψ2α1ρSφ2α1ρShE2>0hE2<α2ρSψ2α1ρSφ2α1ρS then J1 can be expressed by

J1=1λE0α2ρSψ2α1ρSε2α1ρSexpφ2x+ψ2α2ρSψ2α1ρSφ2α1ρSxλD1xλEdx. (A9)

To further computation, we set new variable as t2=α2ρSψ2α1ρSφ2α1ρSxx=α2ρSψ2α1ρSt2φ2α1ρS then it can be expressed by

J1=1φ2α1ρSλEexp1α1ρSλD1α2ρSψ2α1ρSφ2α1ρSλEqt2. (A10)

In this step, it can be shown J2 as

J2=PrhD122φ2hE2+ψ2ρR=0expφ2x+ψ2ρRλD121λEexpxλEdx=ρRλD12ρRλD12+φ2λEexpψ2ρRλD12. (A11)

From (A10) and (A11), it can be obtained R1 as

Q1=1ρRλD12ρRλD12+φ2λEφ2α1ρSλEexp1α1ρSλD1α2ρSψ2α1ρSφ2α1ρSλEψ2ρRλD12qt2, (A12)

where φ2=22R2α2ρE,ψ2=22R21,qt2=0α2ρSψ2α1ρSexpα2ρSα1ρSt2λD1+t2φ2α1ρSλEdt2.

Then, R2 can be calculated as

Q2=k=1K1PrhSR12φ2hE2+ψ2α2ρSψ2α1ρSφ2α1ρShE2Y1PrgkD22φ2hE2+ψ2ρRY2. (A13)

Such outage event need the condition as α2ρSψ2α1ρSφ2α1ρShE2>0hE2<α2ψ2α1φ2α1 then Y1 can be expressed by

Y1=1λE0α2ψ2α1φ2α1expφ2x+ψ2α2ψ2α1φ2α1xρSλSR1xλEdx. (A14)

Similarly, we set new variable as t3=α2ψ2α1φ2α1xx=α2ψ2α1t3φ2α1 then it can be expressed by

Y1=1φ2α1λEexp1α1ρSλSR1α2ψ2α1φ2α1λEqt3. (A15)

As a result, we have Y2

Y2=0expφ2x+ψ2ρRλkD21λEexpxλEdx=ρRλkD2ρRλkD2+φ2λEexpψ2ρRλkD2. (A16)

From (A15) and (A16), R2 is rewritten as

Q2=k=1K1ρRλkD2ρRλkD2+φ2λEφ2α1λEexp1α1ρSλSR1α2ψ2α1φ2α1λEψ2ρRλkD2qt3. (A17)

Then, PSOP2NOMA can be achieved that

PSOP2NOMA=1ρRλD12ρRλD12+φ2λEφ2α1ρSλEexp1α1ρSλD1α2ρSψ2α1ρSφ2α1ρSλEψ2ρRλD12qt2×k=1K1ρRλkD2ρRλkD2+φ2λEφ2α1λEexp1α1ρSλSR1α2ψ2α1φ2α1λEψ2ρRλkD2qt3. (A18)

This is end of the proof. ☐

Author Contributions

D.-T.D. introduced the idea, contributed to developing some mathematical analysis; M.-S.V.N. performed the simulation experiments; T.-A.H. contributed some mathematical analysis; M.V. provided valuable comments.

Funding

This research received support from the grant SGS reg. No. SP2019/41 conducted at VSB Technical University of Ostrava, Czech Republic.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014;16:1550–1573. doi: 10.1109/SURV.2014.012314.00178. [DOI] [Google Scholar]
  • 2.Barenghi A., Breveglieri L., Koren I., Naccache D. Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures. Proc. IEEE. 2012;100:3056–3076. doi: 10.1109/JPROC.2012.2188769. [DOI] [Google Scholar]
  • 3.Hu L., Wen H., Wu B., Pan F., Liao R.-F., Song H., Tang J., Wang X. Cooperative Jamming for Physical Layer Security Enhancement in Internet-of-Things. IEEE Internet Things J. 2018;5:219–228. doi: 10.1109/JIOT.2017.2778185. [DOI] [Google Scholar]
  • 4.Rawat D.B., White T., Parwez M.S., Bajracharya C., Song M. Evaluating Secrecy Outage of Physical Layer Security in Large-Scale MIMO Wireless Communications for Cyber-Physical Systems. IEEE Internet Things J. 2017;4:1987–1993. doi: 10.1109/JIOT.2017.2691352. [DOI] [Google Scholar]
  • 5.Do D.-T., Le C.-B. Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage and Ergodic Capacity Performance Analysis. Sensors. 2018;18:3501. doi: 10.3390/s18103501. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6.Yang Z., Ding Z., Wu Y., Fan P. Novel Relay Selection Strategies for Cooperative NOMA. IEEE Trans. Veh. Technol. 2017;66:10114–10123. doi: 10.1109/TVT.2017.2752264. [DOI] [Google Scholar]
  • 7.Nguyen T.-L., Do D.-T. Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-orthogonal Multiple Access. Wirel. Commun. Mob. Comput. 2018;2018:2525492. doi: 10.1155/2018/2525492. [DOI] [Google Scholar]
  • 8.Do D.-T., Nguyen H.-S., Voznak M., Nguye T.-S. Wireless powered relaying networks under imperfect channel state information: System performance and optimal policy for instantaneous rates. Radioengineering. 2017;26:869–877. doi: 10.13164/re.2017.0869. [DOI] [Google Scholar]
  • 9.Nguye T.-L., Do D.-T. A new look at AF two-way relaying networks: energy harvesting architecture and impact of co-channel interference. Ann. Telecommun. 2017;72:669–678. [Google Scholar]
  • 10.Men J., Ge J., Zhang C. Performance Analysis of Nonorthogonal Multiple Access for Relaying Networks Over Nakagami-mFading Channels. IEEE Trans. Veh. Technol. 2017;66:1200–1208. doi: 10.1109/TVT.2016.2555399. [DOI] [Google Scholar]
  • 11.Nguyen X.-X., Do D.-T. Maximum harvested energy policy in full-duplex relaying networks with SWIPT. Int. J. Commun. Syst. 2017;30:e3359. doi: 10.1002/dac.3359. [DOI] [Google Scholar]
  • 12.Fortino G., Russo W., Savaglio C., Shen W., Zhou M. Agent-Oriented Cooperative Smart Objects: From IoT System Design to Implementation. IEEE Trans. Syst. Man Cybern. Syst. 2018;48:1939–1956. doi: 10.1109/TSMC.2017.2780618. [DOI] [Google Scholar]
  • 13.Rauniyar A., Engelstad P., Østerbø O.N. RF Energy Harvesting and Information Transmission Based on NOMA for Wireless Powered IoT Relay Systems. Sensors. 2018;18:3254. doi: 10.3390/s18103254. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 14.Ding Z., Dai H., Poor H.V. Relay Selection for Cooperative NOMA. IEEE Wirel. Commun. Lett. 2016;5:416–419. doi: 10.1109/LWC.2016.2574709. [DOI] [Google Scholar]
  • 15.Kim J., Song M.S., Lee I. Achievable rate of best relay selection for non-orthogonal multiple access-based cooperative relaying systems; Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC); Jeju, Korea. 19–21 October 2016; pp. 960–962. [Google Scholar]
  • 16.Lee S., da Costa D.B., Duong T.Q. Outage Probability of Non-Orthogonal Multiple Access Schemes with Partial Relay Selection; Proceedings of the IEEE 27th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications; Valencia, Spain. 4–8 September 2016. [Google Scholar]
  • 17.Xu P., Yang Z., Ding Z., Zhang Z. Optimal Relay Selection Schemes for Cooperative NOMA. IEEE Trans. Veh. Technol. 2018;67:7851–7855. doi: 10.1109/TVT.2018.2821900. [DOI] [Google Scholar]
  • 18.Zhang Y., Wang X., Wang D., Zhang Y., Zhao Q., Deng Q. NOMA-based Cooperative Opportunistic Multicast Transmission Scheme for Two Multicast Groups: Relay selection and Performance Analysis. IEEE Access. 2018;6:62793–62805. doi: 10.1109/ACCESS.2018.2876598. [DOI] [Google Scholar]
  • 19.Yue X., Liu Y., Kang S., Nallanathan A., Ding Z. Spatially Random Relay Selection for Full/Half-Duplex Cooperative NOMA Networks. IEEE Trans. Commun. 2018;66:3294–3308. doi: 10.1109/TCOMM.2018.2809740. [DOI] [Google Scholar]
  • 20.Benjebbour A., Saito Y., Kishiyama Y., Li A., Harada A., Nakamura T. Concept and practical considerations of non-orthogonal multiple access (NOMA) for future radio access; Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems; Naha, Japan. 12–15 November 2013; pp. 770–774. [Google Scholar]
  • 21.Ding Z., Yang Z., Fan P., Poor H.V. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users. IEEE Signal Process Lett. 2014;21:1501–1505. doi: 10.1109/LSP.2014.2343971. [DOI] [Google Scholar]
  • 22.Yang Z., Ding Z., Fan P., Al-Dhahir N. A General Power Allocation Scheme to Guarantee Quality of Service in Downlink and Uplink NOMA Systems. IEEE Trans. Wirel. Commun. 2016;15:7244–7257. doi: 10.1109/TWC.2016.2599521. [DOI] [Google Scholar]
  • 23.Timotheou S., Krikidis I. Fairness for Non-Orthogonal Multiple Access in 5G Systems. IEEE Signal Process Lett. 2015;22:1647–1651. doi: 10.1109/LSP.2015.2417119. [DOI] [Google Scholar]
  • 24.Choi J. Power Allocation for Max-Sum Rate and Max-Min Rate Proportional Fairness in NOMA. IEEE Commun. Lett. 2016;20:2055–2058. doi: 10.1109/LCOMM.2016.2596760. [DOI] [Google Scholar]
  • 25.Qin Z., Liu Y., Ding Z., Gao Y., Elkashlan M. Physical layer security for 5G non-orthogonal multiple access in large-scale networks; Proceedings of the IEEE International Conference on Communications (ICC); Kuala Lumpur, Malaysia. 22–27 May 2016; pp. 1–6. [Google Scholar]
  • 26.Liu Y., Qin Z., Elkashlan M., Gao Y., Hanzo L. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks. IEEE Trans. Wirel. Commun. 2017;16:1656–1672. doi: 10.1109/TWC.2017.2650987. [DOI] [Google Scholar]
  • 27.He B., Liu A., Yang N., Lau V.K.N. On the Design of Secure Non-Orthogonal Multiple Access Systems. IEEE J. Sel. Areas Commun. 2017;35:2196–2206. doi: 10.1109/JSAC.2017.2725698. [DOI] [Google Scholar]
  • 28.Zhang Y., Wang H., Yang Q., Ding Z. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access. IEEE Commun. Lett. 2016;20:930–933. doi: 10.1109/LCOMM.2016.2539162. [DOI] [Google Scholar]
  • 29.Lei H., Zhang J., Park K., Xu P., Ansar I.S., Pan G., Alomair B., Alouini M. On Secure NOMA Systems With Transmit Antenna Selection Schemes. IEEE Access. 2017;5:17450–17464. doi: 10.1109/ACCESS.2017.2737330. [DOI] [Google Scholar]
  • 30.Lv L., Ni Q., Ding Z., Chen J. Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks; Proceedings of the 2017 IEEE International Conference on Communications (ICC); Paris, France. 21–25 May 2017; pp. 1–6. [Google Scholar]
  • 31.Wang W., Teh K.C., Li K.H. Generalized Relay Selection for Improved Security in Cooperative DF Relay Networks. IIEEE Wirel. Commun. Lett. 2016;5:28–31. doi: 10.1109/LWC.2015.2488660. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES