Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay

Yang Cao, Nan Zhao*, Gaofeng Pan, Yunfei Chen, Lisheng Fan, Minglu Jin, Mohamed Slim Alouini

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

89 Citations (Scopus)

Abstract

In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of cell-edge users cannot be guaranteed due to severe channel fading. On the other hand, the presence of eavesdroppers can severely threaten the secure transmission due to the open nature of wireless channel. Thus, a two-user NOMA system assisted by a multi-antenna decode-and-forward relay is considered in this paper, and a two-stage jamming scheme, full-duplex-jamming (FDJam), is proposed to ensure the secure transmission of NOMA users. In the FDJam scheme, using full-duplex, the relay transmits the jamming signal to the eavesdropper while receiving confidential messages in the first stage, and the base station generates the jamming signal in the second stage. Furthermore, we eliminate the self-interference and the jamming signal at the relay and the legitimate node, respectively, through relay beamforming. To measure the secrecy performance, analytical expressions for secrecy outage probability (SOP) are derived for both the cell-center and cell-edge users, and the asymptotic SOP analysis at high transmit power is presented as well. Moreover, two benchmark schemes, half-duplex-jamming and full-duplex-no-jamming, are also considered. Simulation results are presented to show the accuracy of the analytical expressions and the effectiveness of the proposed scheme.

Original languageEnglish
Pages (from-to)5574-5587
Number of pages14
JournalIEEE Transactions on Communications
Volume67
Issue number8
DOIs
Publication statusPublished - 2019

Keywords

  • Beamforming design
  • Full-duplex relay
  • Non-orthogonal multiple access
  • Physical layer security
  • Secrecy outage probability

Fingerprint

Dive into the research topics of 'Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay'. Together they form a unique fingerprint.

Cite this