Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios

08/23/2018
by   Ahmed Arafa, et al.
0

A downlink single-input single-output non-orthogonal multiple access setting is considered, in which a base station (BS) is communicating with two legitimate users in two possible scenarios of unsecure environments: existence of an external eavesdropper and communicating through an untrusted relay. For the first scenario, a number of trusted cooperative half-duplex relays is employed to assist with the BS's transmission and secure its signals from the external eavesdropper. Various relaying schemes, namely, cooperative jamming, decode-and-forward, and amplify-and-forward are proposed and analyzed for that matter, in each of which secure beamforming signals are devised at the relays to maximize the achievable secrecy rate regions. For the second scenario, with the untrusted relay, achievable secrecy rate regions are derived for two different relaying schemes, namely, compress-and-forward and amplify-and-forward, under two different modes of operation. In the first mode, coined passive user mode, the users receive signals from both the BS and the untrusted relay, and combine them to decode their messages. In the second mode, coined active user mode, the users transmit a cooperative jamming signal simultaneously with the BS's transmission to further confuse the relay. Focusing on half-duplex nodes, the users cannot receive the BS's signal while jamming the relay, i.e., while being active, and rely only on the signals forwarded to them by the relay. The results show that the best relaying scheme highly depends on the system parameters, in particular distances between the nodes, and also on which part of the secrecy rate region the system is to operate at.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/03/2018

Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays

A downlink single-input single-output (SISO) non-orthogonal multiple acc...
research
09/10/2018

Relay-Aided Secure Broadcasting for Visible Light Communications

A visible light communication broadcast channel is considered, in which ...
research
11/08/2018

Secrecy Outage Analysis for Cooperative NOMA Systems with Relay Selection Scheme

This paper considers the secrecy outage performance of a multiple-relay ...
research
06/08/2019

Secure Beamforming in MISO NOMA Backscatter Device Aided Symbiotic Radio Networks

Symbiotic radio (SR) networks are possible solutions to the future low-p...
research
01/16/2019

Utility Regions for DF Relay in OFDMA-based Secure Communication with Untrusted Users

This paper investigates the utility of a trusted decode-and-forward rela...
research
01/10/2018

Asymptotically Optimal Scheduling Algorithm for Compute-and-Forward

Consider a Compute and Forward (CF) relay network with L users and a sin...
research
04/03/2020

Max-Min Fair Beamforming for Cooperative Multigroup Multicasting with Rate-Splitting

The demand of massive access to the same multimedia content at the same ...

Please sign up or login with your details

Forgot password? Click here to reset