Physical Layer Security for NOMA-Based Full Duplex Relay Networks with Non-Ideal Interference Cancellation
LI Mei-ling1, LI Ying1, Sami Muhaidat2, WANG Gang-fei1, DONG Zeng-shou1, WANG An-hong1, LIANG Jie1
1. School of Electronic and Information Engineering, Taiyuan University of Science and Technology, Taiyuan, Shanxi 030024, China;
2. University of Surrey, Surrey GU27XH, UK
摘要 全双工协作中继转发信号时存在的自干扰现象会降低系统性能.本文考虑存在窃听者的下行非理想自干扰全双工协作中继非正交多址接入(NFCR-E-NOMA,Non-ideal Full Duplex Cooperative Relay in Non-Orthogonal Multiple Access system with Eavesdropper)系统,分别从系统中断概率和系统截获概率的角度分析了全双工协作中继的自干扰因素对于NFCR-E-NOMA系统安全中断性能的影响;推导了系统中断概率和截获概率的闭合表达式.仿真结果表明,全双工中继转发的自干扰因素对系统性能的影响较大,在NFCR-E-NOMA系统中,存在优化的中继转发功率,且在不同的基站发射功率和中继转发功率条件下,功率分配比对系统性能的影响也不同,在实际主链路信道条件允许的情况下,可通过设置较高的数据传输速率来抑制窃听者的截获概率.
Abstract:The imperfect self-interference cancellation in full-duplex cooperative relay networks can make the system performance reduced when the relay forwards signals.We considered the downlink non-ideal full duplex cooperative relay in non-orthogonal multiple access system with eavesdropper (NFCR-E-NOMA),based on which,the impact of self-interference to the NFCR-E-NOMA system was analyzed by outage probabilities and intercept probabilities respectively,and whose exact closed-form expressions were derived.Simulation results show that the self-interference have great influence on the system performance.We also find that there exists optimal relay retransmitting power in the NFCR-E-NOMA system.Moreover,the power allocation ratio also has different influence on the system performance under various transmitting power in base station and relay.In addition,the intercept probability of eavesdropper can be reduced by setting higher data rate under the permission of main link.
[1] GE X H,CHEN J Q,WANG C X,et al.5G green cellular networks considering power allocation schemes[J].Science China Information Sciences,2016,59(2):1-14.
[2] Ding Z G,Liu Y W,Choi J H,et al.Application ofnon-orthogonal multiple access in LTE and 5G networks[J].IEEE Communications Magazine,2017,55(2):185-191.
[3] Laneman J N,Tse D N C,Wornell G W,et al.Cooperativediversity in wireless networks:efficient protocols and outage behavior[J].IEEE Transactions on Information Theory,2004,50(12):3062-3080.
[4] Choi J.Non-orthogonalmultiple access in downlink coordinated two point systems[J].IEEE Communications Letters,2014,18(2):313-316.
[5] Ding Z,Peng M,Poor H V.Cooperativenon-orthogonal multiple access in 5G systems point systems[J].IEEE Communications Letters,2015,19(8):1462-1465.
[6] Ding Z,Dai H,Poor H V.Relay selection for cooperative NOMA[J].IEEE Wireless Communications Letters,2016,5(4):416-419.
[7] Men J,Ge J.Non-orthogonal multiple access for multiple-antenna relaying networks[J].IEEE Wireless Communications Letters,2015,19(10):1686-1689.
[8] Zhong C,Zhang Z.Non-orthogonal multiple access with cooperative full-duplex relaying[J].IEEE Communications Letters,2016,20(12):2478-2481.
[9] Zhang L,Liu J Q,Xiao M,et al.Performance analysis and optimization in downlink NOMA systems with cooperative full-duplex relaying[J].IEEE Journal on Selected Areas in Communications,2017,35(10):2398-2412.
[10] Mukherjee A,Fakoorian S A A,J Huang,et al.Principles of physical layer security in multiuser wireless networks:a survey[J].IEEE Communications Surveys & Tutorials,2014,16(3):1550-1573.
[11] Dai B,Ma Z.Multiple-accessrelay wiretap channel[J].IEEE Transactions on Information Forensics and Security,2014,10(9):1835-1849.
[12] Zou Y,Wang X,Shen W.Optimalrelay selection for physical-layer security in cooperative wireless networks[J].IEEE Journal on Selected Areas in Communications,2013,31(10):2099-2111.
[13] Zou Y,Wang X,Shen W.Security versus reliability analysis of opportunistic relaying[J].IEEE Transactions on Vehicular Technology,2014,63(6):2653-2661.
[14] Zou Y,Zhu J,Wang X,et al.Improving physical-layer security in wireless communications using diversity techniques[J].IEEE Network,2014,29(1):42-48.
[15] Zhang Y,Wang H M.Secrecy sum rate maximization in non-orthogonal multiple access[J].IEEE Communications Letters,2016,20(5):930-933.
[16] Li Y,Jiang M,Zhang Q,et al.Secure beamforming in downlink MISO non-orthogonal multiple access systems[J].IEEE Transactions on Vehicular Technology,2017,66(8):7563-7567.
[17] He B,Liu A,Yang.On the design of secure non-orthogonal multiple access systems[J].IEEE Journal on Selected Areas in Communications,2017,35(10):2196-2206.
[18] Liu Y,Qin Z,Elkashlan M,et al.Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks[J].IEEE Transactions on Wireless Communications,2017,16(3):1656-1672.
[19] Zhang Z Q,Ma Z,Xiao M,et al.Full-duplex device-to-device aided cooperative non-orthogonal multiple access[J].IEEE Transactions on Vehicular Technology,2017,66(5):4467-4471.
[20] Phan K T,Le-Ngoc T.Power allocation for buffer-aided full-duplex relaying with imperfect self-interference cancelation and statistical delay constraint[J].IEEE Access,2016,4:3961-3974.
[21] DoT P and Yun H K.Resource allocation for a full-duplex wireless-powered communication network with imperfect self-interference cancelation[J].IEEE Communications Letters,2016,20(12):2482-2485.
[22] Hildebrand F B.Introduction to Numerical Analysis[M].London:McGraw-Hill,1974.