ArticlePDF Available

Abstract and Figures

This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output and multiple-input and singleoutput systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether the base station has the global channel state information of both the main and wiretap channels, the exact closed-form expressions for the secrecy outage probability (SOP) with suboptimal antenna selection and optimal antenna selection schemes are obtained and compared with the traditional space-time transmission scheme. To obtain further insights, the asymptotic analysis of the SOP in high average channel power gains regime is presented and it is found that the secrecy diversity order for all the TAS schemes with fixed power allocation is zero. Furthermore, an effective power allocation scheme is proposed to obtain the nonzero diversity order with all the TAS schemes. Monte-Carlo simulations are performed to verify the proposed analytical results.
Content may be subject to copyright.
Received July 5, 2017, accepted August 1, 2017, date of publication August 9, 2017, date of current version September 19, 2017.
Digital Object Identifier 10.1109/ACCESS.2017.2737330
On Secure NOMA Systems With Transmit
Antenna Selection Schemes
HONGJIANG LEI1,2, (Member, IEEE), JIANMING ZHANG1, KI-HONG PARK2, (Member, IEEE),
PENG XU1, IMRAN SHAFIQUE ANSARI3, (Member, IEEE), GAOFENG PAN4, (Member, IEEE),
BASEL ALOMAIR5, (Member, IEEE), AND MOHAMED-SLIM ALOUINI2, (Fellow, IEEE)
1Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2Computer, Electrical, and Mathematical Sciences and Engineering Division, King Abdullah University of Science and Technology, Thuwal 23955-6900,
Saudi Arabia
3Department of Electrical and Computer Engineering, Texas A&M University at Qatar, Education City, Doha 23874, Qatar
4School of Computing and Communications, Lancaster University, Lancashire LA1 4WA, U.K.
5National Center for Cybersecurity Technology, King Abdulaziz City for Science and Technology, Riyadh 11442, Saudi Arabia
Corresponding author: Hongjiang Lei (leihj@cqupt.edu.cn)
This work was supported in part by the National Natural Science Foundation of China under Grant 61471076, in part by the Chinese
Scholarship Council under Grant 201607845004, in part by the Program for Changjiang Scholars and Innovative Research Team in
University under Grant IRT_16R72, in part by the special fund for the Key Lab of Chongqing Municipal Education Commission, in part by
the Project of Fundamental and Frontier Research Plan of Chongqing under Grant cstc2015jcyjBX0085 and Grant cstc2017jcyjAX0204,
in part by the Scientific and Technological Research Program of Chongqing Municipal Education Commission under Grant KJ1600413 and
Grant KJ1704088, and in part by the Qatar National Research Fund (a member of Qatar Foundation) under Grant NPRP7-125-2-061.
ABSTRACT This paper investigates the secrecy performance of a two-user downlink non-orthogonal
multiple access systems. Both single-input and single-output and multiple-input and single-output systems
with different transmit antenna selection (TAS) strategies are considered. Depending on whether the base
station has the global channel state information of both the main and wiretap channels, the exact closed-form
expressions for the secrecy outage probability (SOP) with suboptimal antenna selection and optimal antenna
selection schemes are obtained and compared with the traditional space-time transmission scheme. To obtain
further insights, the asymptotic analysis of the SOP in high average channel power gains regime is presented
and it is found that the secrecy diversity order for all the TAS schemes with fixed power allocation is zero.
Furthermore, an effective power allocation scheme is proposed to obtain the non-zero diversity order with
all the TAS schemes. Monte Carlo simulations are performed to verify the proposed analytical results.
INDEX TERMS Non-orthogonal multiple access, physical layer security, transmit antenna selection, secrecy
outage probability.
I. INTRODUCTION
A. BACKGROUND AND RELATED WORKS
Recently, non-orthogonal multiple access (NOMA) has been
accepted as a potential technology for the fifth genera-
tion (5G) mobile networks in face of the explosive growth of
the mobile traffic demands [1]–[4]. As opposed to the con-
ventional orthogonal multiple access (OMA) technologies
(e.g. time/frequency/code division multiple access), NOMA
can substantially improve the spectral efficiency by accom-
modating multiple users simultaneously via power domain
multiplexing. For example, in a downlink NOMA system that
consists of a near user (that has high channel gain), a far
user (that has low channel gain), and a base station. The
base station transmits signals to both users simultaneously
using superposition coding [5] and more transmission power
is allocated to the far user. Under NOMA scheme, the near
user decodes the signal to the far user first and then decodes
its signal after subtracting the decoded signal to the far user
by adopting successive interference cancellation (SIC). The
signal to the far user can be decoded without significant inter-
ference from the signal to the near user, which is weak. The
outage probability and ergodic capacity of NOMA system
were studied in [6] when the users are randomly distributed
in the vicinity of the base station, and confirmed that the
performance of NOMA was significantly superior to the tra-
ditional OMA when the power allocation scheme was used.
NOMA can also make the radio resources allocation more
flexible, as well as can improve the user’s fairness by employ-
ing appropriate resource allocation schemes [7]–[11]. As a
promising candidate for 5G wireless networks, the integration
17450
2169-3536 2017 IEEE. Translations and content mining are permitted for academic research only.
Personal use is also permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
VOLUME 5, 2017
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
of NOMA and conventional OMA paradigms also plays an
indispensable role in avoiding strong co-channel interference
caused by serving multiple users at the same time, frequency,
and spreading code [12], [13].
Recently, multiple-antenna technology has been uti-
lized in NOMA systems to improve the system
performance [14]-[18]. It was demonstrated that the sum
rate of a multiple-input multiple-output (MIMO) NOMA
system is strictly larger than that of a MIMO OMA system
in [15]. The outage performance of NOMA system with
a multiple-antenna energy harvesting relay was analyzed
in [16]. Although the performance can potentially scale up
with the number of antennas, the improvement comes at
the price of expensive RF chains at the terminal. To avoid
the high hardware costs while preserving the diversity and
throughput benefits from multiple antennas, transmit antenna
selection (TAS) technique has been recognized as an effec-
tive solution [16]–[18]. Due to the efficiency and flexibility,
NOMA can also be combined with many other wireless
technologies to enhance the system performance, such as
cooperative communication [19], [20], full duplex [21], cog-
nitive radio (CR) [22], millimeter wave [23], and visible light
communication [24], etc.
Physical layer security has taken one of the hottest spots
in both information security and wireless communications
as it can realize the secrecy communication by utilizing the
randomness and time-varying nature of the wireless chan-
nels without any encryption algorithm [25]. Zhang et al.
studied the security performance of single-input-single-
output (SISO) NOMA system, and confirmed that the secrecy
sum rate performance of NOMA outperforms the one of the
conventional OMA [26]. Qin et al. studied the physical layer
security of NOMA systems in large-scale networks wherein
both NOMA users and eavesdroppers are spatially deployed
at randomly location [27], and new exact and asymptotic
expressions for the secrecy outage probability (SOP) were
derived. Furthermore, the secrecy performance of multiple-
antenna NOMA with artificial noise was investigated and
the exact and asymptotic expressions for SOP were derived
in [28]. Depending on whether the base station has the global
channel state information (CSI) of both the main and wire-
tap channels, Zhu et al. proposed optimal antenna selec-
tion (OAS) and suboptimal antenna selection (SAS) schemes
to enhance the secrecy performance of a MIMO system
in [29], which was compared with the traditional space-
time transmission (STT) scheme. The closed-form expres-
sions for the exact and asymptotic SOP of an underlay
MIMO system were derived in [30]. The obtained results
showed that both SAS and OAS schemes can significantly
enhance the secrecy performance. Now we are wondering
about the secrecy performance of these TAS schemes in
NOMA system.
B. MOTIVATION AND CONTRIBUTIONS
Based on the open literature and to the best of the authors’
knowledge, it is still an open issue to study the secrecy
performance of multiple-input single-output (MISO) NOMA
systems with TAS schemes. The main contributions of our
work are listed as follows:
1) We investigate the secrecy outage performance of
MISO NOMA system consisting of one base station
with multiple antennas, two legitimate receivers, and
an eavesdropper. We investigate the secrecy outage
performance of OAS and SAS schemes for MISO
NOMA system and compare them with the STT
scheme. The closed-form expressions for the exact and
asymptotic SOP are derived. Moreover, the accuracy
of the analytical results are validated via Monte-Carlo
simulations. The results show that the SOP for the
far user with fixed power allocation scheme deteri-
orates as the transmit power surpasses some thresh-
old and then reaches a floor as the interference from
the near user increases while increasing the transmit
power.
2) To obtain further insights, the asymptotic analysis of
SOP is conducted and the secrecy diversity order for
different TAS schemes is derived when the average
signal-to-noise ratio (SNR) of the main channel tends
to infinity. The results show that the secrecy diversity
order for all the TAS schemes with fixed power alloca-
tion are zero.
3) Moreover, an effective power allocation scheme is pro-
posed to obtain non-zero diversity order under all the
TAS schemes. Simulations and numerical results are
given to validate the accuracy of all the analytical
results.
The rest of this paper is organized as follows. In Section II,
the two-user NOMA system model is described. The
performance analysis of SOP in a SISO NOMA sys-
tem is carried out in Section III. In Sections IV and V
the exact and asymptotic SOP in TAS-based MISO
NOMA system are investigated. An effective power allo-
cation method is proposed in Section VI and the secrecy
diversity order for all the cases with proposed power
allocation scheme is derived. Section VII presents and dis-
cusses the numerical results. Finally, we conclude the paper
in Section VIII.
II. SYSTEM MODEL
In this work, we consider a downlink NOMA system that
includes a base station (S), two legitimate users D1(the near
user) and D2(the far user), and an eavesdropper (E), as shown
in Fig. 1.1Both the legitimate and illegitimate receivers are
equipped with a single antenna. It is assumed that the fad-
ing coefficients between each antenna at Sand destinations
1Although only two users were considered in this works, the results can be
easily extended to the downlink NOMA system with N(N>2)users. For
example, the hybrid multiple access scheme proposed in [13] and [14], where
NOMA scheme is implemented among the users within each group, while
the conventional OMA scheme is utilized for inter-group multiple access.
In these scenarios, in order to decrease the complexity of message detection,
a user pairing technique can be used to ensure that only two users share a
specific orthogonal resource slot [28].
VOLUME 5, 2017 17451
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
FIGURE 1. System model consisting of a transmitting source (S) equipped
with multiple antennas, two legitimate receivers (D1and D2), and an
illegitimate eavesdropper (E).
(including D1,D2, and E) experience independent Rayleigh
fading.
Under NOMA scheme, the signal received at Dmcan be
expressed as
yDm=hDmpa1PSx1+pa2PSx2+nm,(1)
where m= {1,2},hDmdenotes the channel coefficient
between Sand Dm,amrepresents the power allocation coeffi-
cients, a1+a2=1, PSdenotes the transmit power at S, and xm
represents the messages to Dm.nmis complex additive white
Gaussian noise (AWGN) with zero mean and variance σ2
m,
For simplicity, we assume σ2
1=σ2
2=σ2.
In this work, it is assumed that users are not ordered by
their channel conditions.2Under NOMA scheme [6], D1can
detect x1by using SIC and x1will be regarded as interference
when D2decodes its received signal. Therefore, the received
instantaneous signal-to-interference-noise ratio (SINR) of the
m-th user can be given as [6]
γDm=
a1ρhD12,m=1
hD22a2
hD22a1+1
ρ
,m=2,(2)
where ρ=PSσ2sigifies the transmit SNR where PSis the
transmit power at the S.
In [27] and [28], the authors assumed that the eavesdropper
has enough powerful capabilities to detect multiuser data and
extracts the signal to Dmwhen it eavesdrops Dm. It is a
pessimistic assumption since the multi-user decoding ability
of Eis overestimated.
In this work, we assume Ecan eliminate
the signal to D2by SIC when it eavesdrops D1and
treats the message to D1as noise when it eavesdrops D2.3
2In these scenarios, users are categorized by their quality of service
requirements. Similar assumptions can be found in [32], and [33], in which
user 1 was assumed to be served opportunistically and user 2 was assumed
to be served for small packet transmission.
3For the wiretap scenarios with multiple users, it is assumed that the m1
users’ messages have already been decoded before the eavesdropper tries to
decode the mth user’s message. Similar assumptions can be found in [26].
Obviously, this assumption overestimates the eavesdropper’s capability and
is pessimistic, then our results will be a lower bound of practical cases.
Thus, we have
γEm=
a1ρ|hE|2,m=1
a2|hE|2
a1|hE|2+1
ρ
,m=2,(3)
where hEis the channel coefficient and γEmis the SINR
when it eavesdrops the transmitted signal to receiver
Dm(m=1,2), respectively. The cumulative distribution
function (CDF) of γkm(k{D,E},m=1,2)can be
written as
Fγk1(γ)=1eγ
λk1a1ρ,(4)
Fγk2(γ)=
1ϕλk2, γ , γ < a2
a1
1, γ a2
a1
,(5)
respectively, where ϕ(ξ , x)=ex
ξρ(a2a1x),λkmrepresents the
average channel power gain. In this work, it is assumed that
λE1=λE2=λEfor simplification.
The probability density function (PDF) of
γkm(k{D,E},m=1,2)can be obtained as
fγk1(γ)=1
λk1a1ρeγ
λk1a1ρ,(6)
fγk2(γ)=
a2
λk2ρ(a2a1γ)2ϕλk2, γ , γ < a2
a1
0, γ a2
a1
.
(7)
III. SECRECY OUTAGE PROBABILITY ANALYSIS
OF A SISO NOMA SYSTEM
In this section, we consider a two-user NOMA system with
a single-antenna base station, as motivated by the following
reasons: 1) preparing for the performance analysis of MISO
NOMA systems; 2) setting up a benchmark for comparing
the performance of MISO NOMA systems to testify the
enhancement befitted from using the multiple antennas at S.
The instantaneous secrecy capacity of Dm(m=1,2)can
be expressed as [25]
Cs,m=log21+γDmlog21+γEm+,(8)
where [x]+=max {x,0}.
SOP is defined as the probability that the secrecy capac-
ity is less than a preset target rate. Thus, the SOP at Dm
(m=1,2)can be expressed as
Pout,Dm=Pr Cs,mRs,m
=Z
0
FγDm(2mγ+2m1)fγEm(γ)dγ , (9)
where Rs,mdenotes the target rate at Dmand 2m=2Rs,m1.
Substituting (4) and (6) into (9), and using
[34, eq. (3.381.4)], the SOP at D1can be expressed as
Pout,D1=1λD1
21λE+λD1
e211
a1ρλD1.(10)
17452 VOLUME 5, 2017
D解码2的信号的概率没有考虑???
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
Observing (10), one can deduce that the SOP at D1will be
improved when the transmit SNR (ρ) increases. Furthermore,
there exists a floor at 21λE
21λE+λD1
for Pout,D1as ρ since
the average secrecy capacity will reach a ceiling, which is
testified in [35].
Lemma 1: the SOP at D2is expressed as
Pout,D2=1a2$ π
2NλEρ
N
X
n=1p1τn2
(a2a1ϑn)2eBn,(11)
where Bn=22(1+ϑn)1
λD2ρ(a2a1(22(1+ϑn)1)) +ϑn
λEρ(a2a1ϑn),Nis the
number of terms, τn=cos 2n1
2Nπand ϑn=$(τn+1)
2.
Proof: Substituting (5) and (7) into (9), we obtain
Pout,D2
=Z$
0
FγD2(22γ+221)fγE2(γ)dγ+Za2
a1
$
fγE2(γ)dγ
=1Z$
0
ϕλD2, 22γ+221fγE2(γ)dγ
| {z }
1
=χ
,(12)
where $=1
a1221a2
a1. To the best of the
authors’ knowledge, it is very difficult to obtain the closed-
form expression of χ. Using Gaussian-Chebyshev quadrature
[36, eq. (25.4.38)], χis approximated as
χ=a2
λEρZ$
0
1
(a2a1γ)2
×e22γ+221
λD2ρ(a2a1(221)a122γ)+γ
λEρ(a2a1γ)dγ
=a2$ π
2NλEρ
N
X
n=1p1τn2
(a2a1ϑn)2eBn.(13)
Remark 1: We rewrite Pout,D2as
Pout,D2=1
N
X
n=1
An
ρeBn
ρ,(14)
where An=a2$ π
2NλE
1τn2
(a2a1ϑn)2>0, Bn>0.
We obtain
dPout,D2
dρ=
N
X
n=1
An
ρ2eBn
ρ1Bn
ρ.(15)
One can find that dPout,D2
dρis negative within a certain
range (ρis lower), else dPout ,D2
dρis positive. That is to say that
Pout,D2will decrease within a certain range as ρincreases,
else it will increase in the other ranges. There is an optimal
ρthat can obtain the best SOP. This is the main difference
between Pout,D1and Pout ,D2. That means increasing the trans-
mit power may degrade the SOP of two-user NOMA system.
It is assumed that Eis interested only in a specific user’s
message, but the transmitter does not know which user E
wants to wiretap. Hence the SOP for the two-user NOMA
system can be expressed as4
Pout =Pr {D1secrecy outage or D2secrecy outage}
=Pr {D1secrecy outage, Eeavesdrops D1}
+Pr {D2secrecy outage, Eeavesdrops D2}
=Pr {D1secrecy outage |when Eeavesdrops D1}
×Pr {Eeavesdrops D1}
+Pr {D2secrecy outage |when Eeavesdrops D2}
×Pr {Eeavesdrops D2}
=Pout,D1×Pr {Eeavesdrops D1}
+Pout,D2×Pr {Eeavesdrops D2}.(16)
Pr {Eeavesdrop D1}and Pr {Eeavesdrop D2}can be
analyzed based on practical scenarios. To simplify the
analysis, it is assumed that Pr {Eeavesdrop D1}=
Pr {Eeavesdrop D1}=1
2. Then the SOP for the two-user
NOMA system is expressed as
Pout =1
2Pout,D1+Pout ,D2.(17)
IV. SECRECY OUTAGE PROBABILITY ANALYSIS OF A
MISO NOMA SYSTEMS
In this section, the secrecy outage performance of a MISO
NOMA system with different TAS schemes utilized at Sis
analyzed. Firstly, we analyze the secrecy outage performance
with OAS and SAS schemes, depending on whether the
global CSI is available at the base station. To better demon-
strate the enhancement of TAS schemes, we consider the STT
scheme as a benchmark, wherein all the antennas are utilized
to send the message with equal power.
A. THE OPTIMAL ANTENNA SELECTION SCHEME
In those scenarios where the users play dual roles as legiti-
mate receivers for some signals and eavesdroppers for others,
the eavesdropper is active (e.g., in a time-division multiple-
access (TDMA) environment) such that the source node can
estimate the eavesdropper’s channel during the eavesdrop-
per’s transmissions [37], [38]. When the CSI of both the wire-
tap and main links are known at the base station, the antenna
that maximizes the secrecy capacity is optimal [29], [30].
In this subsection we will analyze the SOP of MISO NOMA
systems while considering D1or D2, respectively.
Firstly, we consider the case that the secrecy issue of D1
is more important than the one of D2, the transmit antenna
is selected based on the secrecy capacity performance of D1.
The instantaneous secrecy capacity for such scenarios can be
expressed as [30]
COAS
s,1=max
iNSnCiOAS
s,1o,(18)
4In [27] and [28], a different definition of the SOP for the selected user
pair was given as Pout =11Pout,D11Pout ,D1. The results with
this definition can be easily obtained with the results of our work and the
same conclusion can be observed. Here we assume that Ecan not eavesdrop
both the users simultaneously.
VOLUME 5, 2017 17453
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
where CiOAS
s,1=hlog21+γiOAS
D1log21+γiOAS
E1i+
is the instantaneous secrecy capacity of D1when Sis
equipped with a single antenna.
The SOP at D1in the MISO NOMA system can be
expressed as
POAS
out,D1=Pr max
iNSnCiOAS
s,1oRs,1
=
NS
Y
i=1
Pr nCiOAS
s,1Rs,1o=PiOAS
out,D1NS,(19)
where PiOAS
out,D1=Pr nCiOAS
s,1Rs,1ois the SOP at D1when
Sis equipped with a single antenna. Obviously, we have
PiOAS
out,D1=Pout ,D1.
It is noted that selecting the optimal transmit antenna for D1
corresponds to selecting a random transmit antenna for D2,
which means the SOP at D2in this scenario can also be given
by (12).
When the transmitting antenna is selected based on D1,
the overall SOP can be expressed as
POAS,1
out =1
2Pout,D1NS+Pout ,D2.(20)
Similarly, we obtain the SOP with OAS scheme based on
D2as
POAS,2
out =1
2Pout,D1+Pout ,D2NS.(21)
B. THE SUBOPTIMAL ANTENNA SELECTION SCHEME
When the CSI of the wiretap link is not available at the base
station, the best transmit antenna is selected to maximize the
capacity of the main channel [29], [30].5We analyze the
secrecy outage performance for MISO NOMA systems while
considering D1or D2, respectively.
1) SAS SCHEME CONSIDERING D1
When D1is more important than D2for some practical rea-
sons, the transmit antenna is selected based on the capacity
of SD1link, which means γSAS,1
D1=max
1iNSγSiD1, where
γSiD1means the received instantaneous SINR at the near user
from the i-th antenna at S. The CDF and PDF of γSiD1are
the same as (4) and (6). Then the CDF of γSAS,1
D1can be
obtained as
FSAS
γD1(γ)=FγD1(γ)NS
=
NS
X
i=0
(1)iNS!
i!(NSi)!eiγ
λD1a1ρ.(22)
Note that selecting the optimal transmit antenna for D1cor-
responds to selecting a random transmit antenna for D2and E,
which means the CDF and PDF of γSAS,1
D2and γSAS,1
Emare same
5Note that selecting the strongest transmit antenna for the destination node
corresponds to selecting a random transmit antenna for E. Thus the secrecy
capacity with this scheme may not be the maximum and then this scheme is
called suboptimal antenna selection scheme.
as (5) and (7), respectively. Thus the SOP at D2in this case
is given by (12).
Substituting (7) and (22) into (9) and making use of
[34, eq. (3.351.3)], we obtain
PSAS
out,D1=Z
0
FSAS
γD1(21(1+γ)1)fγE2(γ)dγ
=
NS
X
i=0
(1)iNS!λD1
i!(NSi)!i21λE+λD1ei(211)
a1ρλD1.(23)
The SOP that maximizes the capacity of SD1link is
obtained by substituting (12) and (23) into (17) as
PSAS,1
out =1
2PSAS
out,D1+Pout ,D2.(24)
2) SAS SCHEME CONSIDERING D2
Similarly, when transmit antenna is selected based on
the capacity of SD2link, the CDF and PDF of
γSAS,2
D1and γSAS,2
Emare same as (5) and (7), respectively. The
SOP at D1in this case is given by (10).
The CDF of γSAS,2
D2is obtained as
FSAS
γD2(γ)=
NS
X
i=0
(1)iNS!
i!(NSi)!eiγ
λD2ρ(a2a1γ), γ < a2
a1
1, γ a2
a1
.
(25)
Lemma 2: The SOP at D2in the case with SAS scheme
considering D2is expressed as
PSAS
out,D2=$ π a2NS!
2ρNλE
NS
X
i=0
N
X
n=1
(1)ip1τn2e8
i!(NSi)!(a2a1ϑn)2
+e$
λEρ(a2a1$),(26)
where 8=i(22(1+ϑn)1)
λD2ρ(a2a1(22(1+ϑn)1)) +ϑn
λEρ(a2a1ϑn).
Proof: Substituting (7) and (25) into (9), we obtain
PSAS
out,D2=Z$
0
FSAS
γD2(22(1+γ)1)fγE2(γ)dγ
| {z }
ISAS,2
1
+Za2
a1
$
fγE2(γ)dγ
| {z }
ISAS,2
2
.(27)
Using (7), (25) and Gaussian-Chebyshev quadrature
method, we can achieve
ISAS,2
1=
NS
X
i=0
(1)ia2NS!
i!(NSi)!λEρZ$
0
1
(a2a1γ)2
×ei(22(1+γ)1)
λD2ρ(a2a1(22(1+γ)1)) γ
λEρ(a2a1γ)dγ
=$ π a2NS!
2ρNλE
NS
X
i=0
N
X
n=1
(1)ip1τn2e8
i!(NSi)!(a2a1ϑn)2.(28)
17454 VOLUME 5, 2017
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
Using (7), we can easily obtain
ISAS,2
2=e$
λEρ(a2a1$).(29)
The SOP in this case is obtained by substituting (10)
and (26) into (17) as
PSAS,2
out =1
2Pout,D1+PSAS
out,D2.(30)
C. THE SPACE-TIM E TRANSMISSION SCHEME
To demonstrate the enhancement of TAS scheme, in this
subsection we analyze the SOP with the traditional STT
scheme wherein all the antennas are utilized to transmit sig-
nals with power PS
NS[29], [30]. It is assumed that the selection
combination (SC) scheme is utilized at both legitimate and
illegitimate receivers, which means γSTT
km=max
1iNSγSikm.
With some simple algebraic manipulations, the CDF and PDF
of γkm(k{D,E},m=1,2)can be expressed as
FSTT
γk1(γ)=
NS
X
i=0
(1)iNS!
i!(NSi)!eiNSγ
λk1a1ρ,(31)
FSTT
γk2(γ)=
NS
X
i=0
(1)iNS!
i!(NSi)!eiNSγ
λk2ρ(a2a1γ), γ < a2
a1
1, γ a2
a1
,
(32)
fSTT
γk1(γ)=NS2
λk1a1ρ
NS1
X
i=0
(1)i(NS1)!
i!(NS1i)!e(i+1)NSγ
λk1a1ρ,(33)
fSTT
γk2(γ)=
a2NS2
λk2ρ(a2a1γ)2
NS1
X
i=0
(1)i
i!
×(NS1)!
(NS1i)!e(i+1)NSγ
λk2ρ(a2a1γ), γ < a2
a1
0, γ a2
a1
,
(34)
respectively.
Substituting (31) and (33) into (9) and making use of
[34, eq. (3.351.3)], we obtain
PSTT
out,D1=Z
0
FSTT
γD1(21γ+211)fSTT
γE1(γ)dγ
=NS2
λEa1ρ
NS
X
i=0
NS1
X
j=0
(1)i+jNS!
i!(NSi)!
(NS1)!
j!(NS1j)!
×eiNS(211)
λD1a1ρZ
0
ei21λE+(j+1)λD1NSγ
λD1λEa1ρdγ
=
NS
X
i=0
NS1
X
j=0
(1)i+jNS!
i!(NSi)!
(NS1)!
j!(NS1j)!
×NSλD1
i21λE+λD1(j+1)eiNS(211)
λD1a1ρ.(35)
Lemma 3: The SOP at D2in the case with STT scheme is
expressed as
PSTT
out,D2=a2$ π NS2
2ρNλE
NS
X
i=0
NS1
X
j=0
N
X
n=1
ψp1τn2e9
(a2a1ϑn)2
+1
NS
X
i=0
(1)iNS!
i!(NSi)!ei$NS
λEρ(a2a1$),(36)
where
ψ=(1)j+iNS!
i!(NSi)!
(NS1)!
j!(NS1j)!
and
9=iNS(22ϑn+221)
λD2ρ(a2a1(22ϑn+221)) +(j+1)NSϑn
λEρ(a2a1ϑn).
Proof: Substituting (32) and (34) into (9), we obtain
PSTT
out,D2=Z$
0
FSTT
γD2(22γ+221)fSTT
γE2(γ)dγ
| {z }
ISTT
1
+Za2
a1
$
fSTT
γE2(γ)dγ
| {z }
ISTT
2
.(37)
Utilizing (32), (34), and Gaussian-Chebyshev quadrature
method, we obtain
ISTT
1=a2NS2
ρλE
NS
X
i=0
NS1
X
j=0
ψZ$
0
1
(a2a1γ)2
×eiNS(22γ+221)
λD2ρ(a2a1(22γ+221)) (j+1)NSγ
λEρ(a2a1γ)dγ
=a2$ π NS2
2ρNλE
NS
X
i=0
NS1
X
j=0
N
X
n=1
ψp1τn2e9
(a2a1ϑn)2.(38)
Using (32), we obtain
ISTT
2=1
NS
X
i=0
(1)iNS!
i!(NSi)!ei$NS
λEρ(a2a1$).(39)
Finally, substituting (35) and (36) into (17), the SOP of
MISO NOMA system with STT scheme is obtained as
PSTT
out =1
2PSTT
out,D1+PSTT
out,D2.(40)
V. ASYMPTOTIC SECRECY OUTAGE
PROBABILITY ANALYSIS
In order to get more insights, we analyze the secrecy outage
performance in the high SINR regime, which is mathemati-
cally described as λD2→ ∞ and λD1=β λD2(β > 1). The
secrecy diversity order is expressed as [30]
Gd,m= − lim
λD2→∞
ln P
out,Dm
ln λD2
,(41)
where P
out,Dmdenotes the asymptotic SOP.
VOLUME 5, 2017 17455
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
A. SISO NOMA SYSTEMS
Using (4), (5), and ex=
k
P
m=0
xm
m!+Oxk, we obtain F
γD1(γ)
and F
γD2(γ)as
F
γD1(γ)=γ
βλD2a1ρ,(42)
F
γD2(γ)=
γ
λD2ρ(a2a1γ)γ < a2
a1
1, γ a2
a1
,
(43)
respectively.
Substituting (6) and (42) into (9) and making use
of (3.381.4) of [34], we obtain the asymptotic SOP at D1as
P
out,D1=Z
0
F
γD1(21(1+γ)1)fγE1(γ)dγ
=211+21λEa1ρ
βλD2a1ρ.(44)
Similarly, making use of Gaussian-Chebyshev quadrature
method, the asymptotic SOP at D2is obtained as
P
out,D2=Z$
0
F
γD2(22γ+221)fγE2(γ)dγ
+Za2
a1
$
fγE2(γ)dγ
=e$
λEρ(a2a1$)+a2
λD2λEρ2
×Z$
0
(22γ+221)eγ
λEρ(a2a1γ)dγ
(a2a1(22(1+γ)1)) (a2a1γ)2
=e$
λEρ(a2a1$)+a2$ π
2NλD2λEρ2
×
N
X
n=1
(22(1 +ϑn)1)p1τn2eϑn
λEρ(a2a1ϑn)
(a2a1(22(1+ϑn)1)) (a2a1ϑn)2.
(45)
Remark 2: Based on (44) and (45), one can easily obtain
the secrecy diversity order of the near and far users as 1 and 0,
respectively. This is because P
out,D2will become a constant
when λD2→ ∞. Furthermore, this means that increasing
the transmit power does not have any impact on the secrecy
performance of D2.
Finally, the overall SOP is obtained by substitut-
ing (44) and (45) into (17). The secrecy diversity order of
SISO NOMA system is easily obtained as GSISO
d=0 since
the secrecy diversity order of two-user NOMA is determined
by the one that has small diversity order [28].
B. MISO NOMA SYSTEMS WITH SAS SCHEME
When λD2→ ∞ and λD1=βλD2, we have
F,SAS
γD1(γ)=γNS
βλD2a1ρNS,(46)
F,SAS
γD2(γ)=
γNS
λD2ρ(a2a1γ)NSγ < a2
a1
1, γ a2
a1
.
(47)
By substituting (6) and (46) into (9) and using
of [34, eq. (3.351.3)], we obtain
P,SAS
out,D1=Z
0
F,SAS
γD1(21(1+γ)1)fγE1(γ)dγ
=NS!
λEβλD2NS(a1ρ)NS+1
×
NS
X
k=0
2k
1(211)NSk
k!(NSk)!Z
0
γkeγ
λEa1ρdγ
=NS!
βNSλD2
NS
NS
X
k=0
2k
1(211)NSkλEk
(NSk)!(a1ρ)NSk.(48)
Substituting (7) and (47) into (27) and utilizing
Gaussian-Chebyshev quadrature method, we obtain
P,SAS
out,D2=Z
0
F,SAS
γD2(22(1+γ)1)fγE2(γ)dγ
=ISAS,2
2+Z$
0
a2eγ
λEρ(a2a1γ)
λEρ(a2a1γ)2
×(22(1+γ)1)NSdγ
λD2ρ(a2a1(22(1+γ)1))NS
=ISAS,2
2+41
N
X
n=1
eϑn
λEρ(a2a1ϑn)
×p1τn2(22(1+ϑn)1)NS
(1a122(1+ϑn))NS(a2a1ϑn)2,(49)
where 41=$ π a2
2NλEρNS+1λD2
NS.
Substituting (48) and (49) into (24) and (30), respectively,
the asymptotic SOP for MISO NOMA system with SAS
scheme is obtained. The secrecy diversity order for SAS
scheme while considering D1or D2is NSand 0, respectively.
One can easily obtain the diversity order of two-user MISO
NOMA system for SAS scheme considering D1and D2as
GSAS,1
d=GSAS,2
d=0.(50)
C. MISO NOMA SYSTEMS WITH OAS SCHEME
Substituting (44) and (45) into (20) and (21), respec-
tively, the asymptotic SOP for MISO NOMA system
with OAS schemes while considering a single user is
obtained, respectively. The secrecy diversity order of two-
user MISO NOMA system for these two cases is obtained as
GOAS,1
d=GOAS,2
d=0.
17456 VOLUME 5, 2017
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
D. MISO NOMA SYSTEMS WITH STT SCHEME
When λD2→ ∞ and λD1=βλD2, we have
F,STT
γD1(γ)=NSNSγNS
βλD2a1ρNS,(51)
F,STT
γD2(γ)=
NSNSγNS
λD2ρ(a2a1γ)NS, γ < a2
a1
1, γ a2
a1
.
(52)
Utilizing (33), (51), and [34, eq. (3.351.3)], we obtain
P,STT
out,D1=Z
0
F,STT
γD1(21(1 +γ)1)fSTT
γE1(γ)dγ
=NSNS+2
λEa1ρβλD2a1ρNS
NS1
X
i=0
NS
X
k=0Z
0
γke(i+1)NSγ
λEa1ρdγ
×(1)i(NS1)!
i!(NS1i)!
NS!(211)NSk21k
k!(NSk)!
=(NS1)!NS!
βNSλD2
NS
NS1
X
i=0
NS
X
k=0
(1)iNSNSk+1
i!(NS1i)!
×(211)NSk(21λE)k0(k+1)
k!(NSk)!(i+1)k+1(a1ρ)NSk.(53)
Using (34), (52), and Gaussian-Chebyshev quadrature
method, we obtain
P,STT
out,D2
=Z
0
F,STT
γD2(22(1+γ)1)fSTT
γE2(γ)dγ
=ISTT
2+a2NSNS+2
λEρNS+1λD2
NS
NS1
X
j=0
(1)j(NS1)!
j!(NS1j)!
×Z
0
(22(1+γ)1)NSeNS(j+1)γ
λEρ(a2a1γ)dγ
λD2ρ(a2a1(22(1+γ)1))NS(a2a1γ)2
=ISTT
2+42
NS1
X
j=0
N
X
n=1
(1)j
j!(NS1j)!
×p1τn2(22ϑn+221)NSeNS(j+1)ϑn
λEρ(a2a1ϑn)
(a2a1(22ϑn+221))NS(a2a1ϑn)2,(54)
where 42=a2$ π NSNS+2(NS1)!
2NλEρNS+1λD2
NS.
Substituting (53) and (54) into (40), the asymptotic SOP
for MISO NOMA system with STT scheme is obtained. One
can obtain the secrecy diversity order of the near and far
users in this case as NSand 0, respectively. That is to say,
the diversity order of two-user MISO NOMA system with
STT scheme is 0.
Remark 3: Observing the obtained analytical results above,
one can deduce that the diversity order of all the TAS schemes
is zero. This is because the diversity order of the far user is
zero with the fixed power allocation scheme, which deter-
mines the diversity order of two-user NOMA system.
VI. A POWER ALLOCATION METHOD TO ACHIEVE
NON-ZERO DIVERSITY ORDER
In this subsection, a new variable power allocation method is
proposed to achieve non-zero diversity order.
Let a2
a1=αλD2
ϕ(0< ϕ < 1) (α > 0). Considering a2+
a1=1, we can obtain
a1=1
1+αλD2
ϕ
a2=αλD2
ϕ
1+αλD2
ϕ.
(55)
A. SISO NOMA SYSTEMS
Utilizing (5), (55), and ex=
k
P
m=0
xm
m!+Oxk, we obtain
F
γD2(γ)as
F
γD2(γ)=γ
a2ρλD2
.(56)
When λD2→ ∞, the instantaneous SINR of the
eavesdropper eavesdropping the transmitted signal at the
receiver D2can be given as
γE2=|hE|2a2
|hE|2a1+1
ρa2ρ|hE|2.(57)
Based on (57), the PDF of the eavesdropper applicable to
the new power allocation method can written as
fnon
γE2(γ)=1
a2ρλE
eγ
a2ρλE.(58)
Substituting (55) into (44), we obtain the asymptotic SOP
at D1as
P
out,D1=1+αλD2
ϕ(211)+ρλE21
βλD2ρ.(59)
Substituting (56) and (58) into (9) and making use of
[34, eq. (3.381.4)], we obtain
P
out,D2=22a2ρ λE+221
a2ρλD2
.(60)
From (59) and (60), one can easily obtain the diversity
order for two users with the proposed power allocation
scheme is 1 ϕand 1, respectively. This means the diversity
order of the far user increases by decreasing the diversity
order of the near user. Thus, the secrecy diversity order of
two-user NOMA is improved by
GSISO
d=1ϕ. (61)
Remark 4: The power allocation scheme proposed in this
paper is able to recover the diversity order by balancing the
diversity gain of the near user and the diversity gain of the far
user based on the channel gains.
VOLUME 5, 2017 17457
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
FIGURE 2. SOP for various PSwith λD1=15 dB, λD2=10 dB, λE= −5 dB, a1=0.1, and a2=0.9. (a) SOP of a SISO NOMA
system. (b) SOP for D1. (c) SOP for D2. (d) SOP for the two-user NOMA system.
B. MISO NOMA SYSTEMS WITH SAS SCHEME
Utilizing (55) into (25), and ex=
k
P
m=0
xm
m!+Oxk, we obtain
F,SAS
γD2(γ)=γNS
a2ρλD2NS.(62)
Substituting (55) into (48), we obtain the asymptotic SOP
at D1as
P,SAS
out,D1=
NS
X
k=0
NS!2k
1(211)NSkλEk1+αλD2
ϕNSk
(NSk)!βNSλD2
NS(ρ)NSk.
(63)
Substituting (62) and (58) into (9) and making use of [34,
eq. (3.381.4)], we obtain
P,SAS
out,D2=NS!
λD2ρa2NSλEρa2
×
NS
X
k=0
(221)NSk22k
k!(NSk)!Z
0
γkeγ
λEρa2dγ
=NS!
λD2
NS
NS
X
k=0
(221)NSk22kλEk
(NSk)!(ρa2)NSk.(64)
Based on (63), we easily obtain the diversity order for D1
with SAS scheme considering D1as (1ϕ)NS. Similarly,
the diversity order for D2with SAS scheme considering D2
is obtained as NSfrom (64). Note that the SOP for D2with
SAS scheme considering D1is the same as D2in SISO
scenario, and the SOP for D1with SAS scheme considering
D2is the same as D1in SISO scenario. Thus, the diversity
order of the two-user MISO NOMA system with SAS scheme
under the proposed power allocation scheme is
GSAS,1
d=min {(1ϕ)NS,1},(65)
GSAS,2
d=1ϕ, (66)
respectively.
C. MISO NOMA SYSTEMS WITH OAS SCHEME
Based on (19), we can easily obtain the diversity order for the
two users with OAS scheme scenario as (1ϕ)NSand NS,
respectively. Note that the SOP for D2with OAS scheme
considering D1is the same as D2in SISO scenario, and the
SOP for D1with OAS scheme considering D2is the same
as D1in SISO scenario. Finally, we obtain the diversity order
for the two-user MISO NOMA system with OAS scheme
17458 VOLUME 5, 2017
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
FIGURE 3. SOP for various λD2with λE=5 dB, NS=3, a1=0.1, a2=0.9, β=1.2, and PS=10 dB. (a) SOP of a SISO NOMA
system. (b) SOP for D1. (c) SOP for D2. (d) SOP for the two-user NOMA system.
under the proposed power allocation scheme as
GOAS,1
d=min {(1ϕ)NS,1},(67)
GOAS,2
d=1ϕ, (68)
Remark 5: It should be noted that the SAS/OAS consider-
ing the near user is more beneficial in terms of diversity gain,
which means G1
d>G2
d.
D. MISO NOMA SYSTEMS WITH STT SCHEME
By substituting (55) into (32), and ex=
k
P
m=0
xm
m!+Oxk,
we obtain
F,STT
γD2(γ)=NSNSγNS
λD2ρa2NS.(69)
Similarly, the fSTT,non
γk2(γ)can be rewritten as
fSTT,non
γk2(γ)=NS2
λEρa2
NS1
X
i=0
(1)i(NS1)!
i!(NS1i)!e(i+1)NSγ
λEρa2.
(70)
Substituting (55) into (53), we obtain
P,STT
out,D1=
NS1
X
i=0
NS
X
k=0
(1)i(NS1)!NS!NSNSk+1
i!(NS1i)!(NSk)!
×(211)NSk(21λE)k1+αλD2
ϕNSk
(i+1)k+1βNSλD2
NSρNSk.
(71)
On substituting (69) and (70) into (9) and making use
of [34, eq. (3.381.4)], we obtain
P,STT
out,D2=NSNS+2
λD2ρa2NSλEρa2
NS
X
k=0
NS1
X
i=0
NS!(221)NSk
k!(NSk)!
×(1)i(NS1)!22k
i!(NS1i)!Z
0
γke(i+1)NSγ
λEρa2dγ
=NS!(NS1)!
λD2ρa2NS
NS
X
k=0
NS1
X
i=0
(1)i(λEρa222)k
(NSk)!i!
×NSNSk+1(221)NSk
(NS1i)!(i+1)k+1.(72)
VOLUME 5, 2017 17459
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
FIGURE 4. SOP for various NSwith λD1=10 dB, λD2=8 dB, λE=0 dB, a1=0.1, a2=0.9, and PS=5 dB. (a) SOP for D1.
(b) SOP for D2. (c) SOP for the two-user NOMA system.
Similarly, the diversity order for the two users with STT
scheme is easily obtained as (1ϕ)NSand NS, respectively.
Finally we obtain the diversity order of MISO NOMA system
with STT scheme as
GSTT
d=(1ϕ)NS.(73)
VII. NUMERICAL RESULTS AND DISCUSSIONS
In this section, the proposed analytical models are verified
via Monte-Carlo simulation. The main parameters utilized
in the simulations are set as Rs,1=Rs,2=0.1 bit/s/Hz,
σ2=1. In all the figures, ‘SAS1’ and ‘SAS2’ means the SAS
scheme based on D1or D2, respectively. Similarly ‘OAS1’
and ‘OAS2’ means the OAS scheme based on D1or D2,
respectively.
Fig. 2 depicts the SOP versus PS, where
Figs. 2(a), 2(b), 2(c), and 2(d) plot the SOP for a SISO NOMA
system, the SOP for D1,D2, and the two-user NOMA system
with different TAS schemes, respectively. One can observe
from Fig. 2(a) that the SOP at D1is improved until it reaches
a floor. The reason is that the secrecy capacity tends to a
constant when PSbecomes large [35]. An interesting result
is found that the SOP at D2degrades before it reaches a
ceil because the interference from D1increases while PS
increasing, which testifies the result in Remark 1. Further,
the SOP at D2is superior to that at D1in the low transmit
power region although the channel quality of S-D1is better
than that of S-D2. This is because physical layer security
utilizes the randomness of the wireless channel. However,
the SOP at D2gets worse in the high transmit power region
until it reaches a constant due to increasing interference
from D1. The SOP of the NOMA system deteriorates due
to the increase of the SOP at D2. Figs. 2(b) and 2(c) depict
the SOP for D1and D2with different TAS schemes ver-
sus PS. One can observe that multiple antennas can improve
the secrecy outage performance and the SOPs of SAS and
OAS schemes outperform the STT scheme for both users.
In Fig. 2(d), it can be observed that the SOP for NOMA
system with STT outperforms those with SAS and OAS
schemes. This is because in the SAS1 and OAS1 schemes
only D1is considered in selecting transmit antenna. Since
one transmit antenna is selected randomly for D2, the SOP
for D2with SAS1 and OAS1 schemes is the same as the case
with a single antenna at S.
Fig. 3 depicts the SOP versus λD2. One can observe that
the asymptotic curves tightly approximate the exact ones as
17460 VOLUME 5, 2017
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
FIGURE 5. SOP with the proposed power allocation scheme for various λD2with λE=3 dB, NS=3, β=2, α=1.5, ϕ=0.9, and
PS=10dB. (a) SOP of a SISO NOMA system. (b) SOP for D1. (c) SOP for D2. (d) SOP for the two-user NOMA system.
λD2increases. The SOP of NOMA system is determined by
the farther user and hence the SOP of SISO NOMA system
reaches a constant when λD2tends to infinity. Thus the diver-
sity order of SISO NOMA system is zero. Moreover, similar
results can be observed from Figs. 3(c) and 3(d).
Figs. 4 depicts the SOP for MISO NOMA system with
different TAS schemes versus NS. It is observed from
Figs. 4(a) and 4(b) that multiple antennas can improve the
secrecy outage performance of each user when OAS scheme
is considered in selecting antenna. From Fig. (c), it is found
that the SOP of the NOMA system with SAS scheme is not
affected by the number of the antennas when NS>3 whereas
the NOMA system with STT scheme is effected. This means
that increasing the antenna number hardly affects the secrecy
performance of the NOMA system with TAS scheme but
improves with the STT scheme.
Figs. 5 plots the SOP for SISO and MISO NOMA systems
with the proposed power allocation scheme. We can observe
that the non-zero diversity order is obtained for all the cases.
We see in Figs. 5(a), 5(b), and 5(c) that the diversity order of
NOMA system can be improved by decreasing the diversity
order of the farther user. Fig. 5(d) demonstrates all the cases
with the proposed power allocation scheme. We can observe
that in SAS2 and OAS2 schemes, since P,SAS
out,D2and P,OAS
out,D2
is very small (can be found in Fig. 5(c)), then the SOP of D1in
SAS2 and OAS2 are dominant part of the SOP for the NOMA
system (the SOP of D1in SAS2 and OAS2 are same as ones in
SISO in Fig. 5(b)). So there is almost no difference between
the SOP of SISO, SAS2, and OAS2 schemes. Similarly, from
Fig. 5(c), one can observe that P,SAS
out,D1and P,OAS
out,D1is small
(Fig. 5(b)) and the SOP of D2in SAS1 and OAS1 schemes
are dominant part of the SOP for the NOMA system (the
SOP of D2in SAS1 and OAS1 schemes are same as the ones
in SISO in Fig. 5(c)). Furthermore, we can observe that the
SOP with SAS1 and OAS1 schemes outperform STT scheme
scenario with the proposed power allocation method in the
high SNR regime.
VIII. CONCLUSION
In this work, the secrecy outage performance of two-user
SISO and MISO NOMA systems with different TAS schemes
was investigated. The exact and approximated closed-
form expressions of the SOP for different TAS schemes
were derived and compared with the one of traditional
VOLUME 5, 2017 17461
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
STT scheme. The proposed analytical results were verified
via Monte-Carlo simulations. The results demonstrate that
the diversity order is zero when the fixed power allocation
scheme is utilized. Subsequently, an effective power allo-
cation strategy has been proposed and the diversity order
achieved by the proposed power allocation scheme was
analyzed.
ACKNOWLEDGMENT
The authors would like to thank the Editor and anonymous
reviewers for their helpful comments and suggestions in
improving the quality of this paper.
REFERENCES
[1] Z. Ding et al., ‘‘Application of non-orthogonal multiple access in LTE
and 5G networks,’IEEE Commun. Mag., vol. 55, no. 2, pp. 185–191,
Feb. 2017.
[2] L. Dai, B. Wang, Y. Yuan, S. Han, C.-L. I, and Z. Wang, ‘‘Non-
orthogonal multiple access for 5G: Solutions, challenges, opportuni-
ties, and future research trends,’IEEE Commun. Mag., vol. 53, no. 9,
pp. 74–81, Sep. 2015.
[3] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, ‘‘System-
level performance of downlink non-orthogonal multiple access (NOMA)
under various environments,’’ in Proc. IEEE 81st Veh. Technol.
Conf. (VTC Spring), Glasgow, Scotland, May 2015, pp. 1–5.
[4] Z. Ding, P. Fan, and H. V. Poor, ‘‘Impact of user pairing on 5G nonorthog-
onal multiple-access downlink transmissions,’IEEE Trans. Veh. Technol.,
vol. 65, no. 8, pp. 6010–6023, Aug. 2016.
[5] T. M. Cover and J. A. Thomas, Elements of Information Theory. Hoboken,
NJ, USA: Wiley, 2012.
[6] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, ‘‘On the performance of non-
orthogonal multiple access in 5G systems with randomly deployed users,’
IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
[7] S. Timotheou and I. Krikidis, ‘‘Fairness for non-orthogonal multiple access
in 5G systems,’IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1647–1651,
Oct. 2015.
[8] J. Cui, Z. Ding, and P. Fan, ‘‘A novel power allocation scheme under outage
constraints in NOMA systems,’IEEE Signal Process. Lett., vol. 23, no. 9,
pp. 1226–1230, Sep. 2016.
[9] Z. Yang, Z. Ding, P. Fan, and N. Al-Dhahir, ‘‘A general power allocation
scheme to guarantee quality of service in downlink and uplink NOMA
systems,’IEEE Trans. Wireless Commun., vol. 15, no. 11, pp. 7244–7257,
Nov. 2016.
[10] S. M. R. Islam, N. Avazov, O. A. Dobre, and K. S. Kwak, ‘‘Power-domain
non-orthogonal multiple access (NOMA) in 5G systems: Potentials and
challenges,’IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 721–742,
2nd Quart., 2017.
[11] Y. Liu, M. Elkashlan, Z. Ding, and G. K. Karagiannidis, ‘‘Fairness of
user clustering in MIMO non-orthogonal multiple access systems,’IEEE
Commun. Lett., vol. 20, no. 7, pp. 1465–1468, Jul. 2016.
[12] M. F. Hanif, Z. Ding, T. Ratnarajah, and G. K. Karagiannidis,
‘‘A minorization-maximization method for optimizing sum rate in the
downlink of non-orthogonal multiple access systems,’IEEE Trans. Signal
Process., vol. 64, no. 1, pp. 76–88, Jan. 2016.
[13] Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, ‘‘Cooperative non-
orthogonal multiple access with simultaneous wireless information and
power transfer,’’ IEEE. J. Sel. Areas Commun., vol. 34, no. 4, pp. 938–953,
Apr. 2016.
[14] Z. Ding, F. Adachi, and H. V. Poor, ‘‘The application of MIMO to non-
orthogonal multiple access,’IEEE Trans. Wireless Commun., vol. 15,
no. 1, pp. 537–552, Jan. 2016.
[15] Y. Liu, G. Pan, H. Zhang, and M. Song, ‘‘On the capacity compari-
son between MIMO-NOMA and MIMO-OMA,’IEEE Access, vol. 4,
pp. 2123–2129, May 2016.
[16] W. Han, J. Ge, and J. Men, ‘‘Performance analysis for NOMA energy
harvesting relaying networks with transmit antenna selection and maximal-
ratio combining over Nakagami-mfading,’’ IET Commun., vol. 10, no. 18,
pp. 2687–2693, Dec. 2016.
[17] X. Liu and X. Wang, ‘‘Efficient antenna selection and user scheduling in
5G massive MIMO-NOMA system,’’ in Proc. IEEE 83rd Veh. Technol.
Conf. (VTC Spring), Nanjing, China, May 2016, pp. 1–5.
[18] Y. Yu, H. Chen, Y. Li, Z. Ding, and B. Vucetic. (Dec. 2016). ‘‘Antenna
selection for MIMO non-orthogonal multiple access systems.’’ [Online].
Available: https://arxiv.org/abs/1612.04943
[19] J. Men and J. Ge, ‘‘Non-orthogonal multiple access for multiple-antenna
relaying networks,’IEEE Commun. Lett., vol. 19, no. 10, pp. 1686–1689,
Oct. 2015.
[20] J. Men, J. Ge, and C. Zhang, ‘‘Performance analysis of non-orthogonal
multiple access for relaying networks over Nakagami-mfading chan-
nels,’IEEE Trans. Veh. Technol., vol. 66, no. 2, pp. 1200–1208,
Feb. 2017.
[21] Z. Zhang, Z. Ma, M. Xiao, Z. Ding, and P. Fan, ‘‘Full-duplex
device-to-device aided cooperative non-orthogonal multiple access,’’
IEEE Trans. Veh. Technol., vol. 66, no. 5, pp. 4467–4471,
May 2016.
[22] Y. Liu, Z. Ding, M. Elkashlan, and J. Yuan, ‘‘Non-orthogonal
multiple access in large-scale underlay cognitive radio networks,’’
IEEE Trans. Veh. Technol, vol. 65, no. 12, pp. 10152–10157,
Dec. 2016.
[23] F. Lu, M. Xu, L. Cheng, J. Wang, J. Zhang, and G. K. Chang, ‘‘Non-
orthogonal multiple access with successive interference cancellation in
millimeter-wave radio-over-fiber systems,’’ J. Lightw. Technol., vol. 34,
no. 17, pp. 4179–4186, Sep. 2016.
[24] H. Marshoud, V. M. Kapinas, G. K. Karagiannidis, and S. Muhaidat,
‘‘Non-orthogonal multiple access for visible light communications,’’ IEEE
Photon. Technol. Lett., vol. 28, no. 1, pp. 51–54, Jan. 2016.
[25] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, ‘‘Wireless
information-theoretic security,’’ IEEE Trans. Inf. Theory, vol. 54, no. 6,
pp. 2515–2534, Jun. 2008.
[26] Y. Zhang, H. M. Wang, Q. Yang, and Z. Ding, ‘‘Secrecy sum rate maxi-
mization in non-orthogonal multiple access,’IEEE Commun. Lett., vol. 20,
no. 5, pp. 930–933, May 2016.
[27] Z. Qin, Y. Liu, Z. Ding, Y. Gao, and M. Elkashlan, ‘‘Physical layer security
for 5G non-orthogonal multiple access in large-scale networks,’’ in Proc.
IEEE Int. Conf. Commun. (ICC), Kuala Lumpur, Malaysia, May 2016,
pp. 1–6.
[28] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and F. L. Hanzo, ‘‘Enhancing the
physical layer security of non-orthogonal multiple access in large-scale
networks,’IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656–1672,
Mar. 2017.
[29] J. Zhu, Y. Zou, G. Wang, Y.-D. Yao, and G. K. Karagiannidis, ‘‘On
secrecy performance of antenna-selection-aided MIMO systems against
eavesdropping,’IEEE Trans. Veh. Technol., vol. 65, no. 1, pp. 214–225,
Jan. 2016.
[30] H. Lei et al., ‘‘Secrecy outage performance of transmit antenna selec-
tion for MIMO underlay cognitive radio systems over Nakagami-m
channels,’IEEE Trans. Veh. Technol., vol. 66, no. 3, pp. 2237–2250,
Mar. 2017.
[31] P. Xu, Z. Ding, X. Dai, and H. V. Poor, ‘‘A new evaluation criterion for
non-orthogonal multiple access in 5G software defined networks,’IEEE
Access, vol. 3, pp. 1633–1639, Oct. 2015.
[32] Z. Ding, L. Dai, and H. V. Poor, ‘‘MIMO-NOMA design for small
packet transmission in the Internet of Things,’IEEE Access, vol. 4,
pp. 1393–1405, Apr. 2016.
[33] Z. Ding, H. Dai, and H. V. Poor, ‘‘Relay selection for cooperative
NOMA,’IEEE Wireless Commun. Lett., vol. 5, no. 4, pp. 416–419,
Aug. 2016.
[34] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products,
7th. San Diego, CA, USA: Academic, 2007.
[35] H. Lei, I. S. Ansari, G. Pan, B. Alomair, and M.-S. Alouini, ‘‘Secrecy
capacity analysis over αµfading channels,’’ IEEE Commun. Lett.,
vol. 21, no. 6, pp. 1445–1448, Jun. 2017.
[36] M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions
With Formulas, Graphs, and Mathematical Tables, 9th. New York, NY,
USA: Dover, 1972.
[37] N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, ‘‘Multiuser MIMO relay
networks in Nakagami-mfading channels,’IEEE Trans. Commun., vol. 60,
no. 11, pp. 3298–3310, Nov. 2012.
[38] L. Wang, M. Elkashlan, J. Huang, R. Schober, and R. K. Mallik, ‘‘Secure
transmission with antenna selection in MIMO Nakagami-mfading chan-
nels,’IEEE Trans. Wireless Commun., vol. 13, no. 11, pp. 6054–6067,
Nov. 2014.
[39] H. Lei, M. Xu, I. S. Ansari, G. Pan, K. A. Qaraqe, and M.-S. Alouini, ‘‘On
secure underlay MIMO cognitive radio networks with energy harvesting
and transmit antenna selection,’IEEE Trans. Green Commun. Netw.,
vol. 1, no. 2, pp. 192–203, Jun. 2017.
17462 VOLUME 5, 2017
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
HONGJIANG LEI (M’17) received the B.Sc.
degree in mechanical and electrical engineering
from the Shenyang Institute of Aeronautical Engi-
neering, Shenyang, China, in 1998, the M.Sc.
degree in computer application technology from
Southwest Jiaotong University, Chengdu, China,
in 2004, and the Ph.D. degree in instrument sci-
ence and technology from Chongqing University,
Chongqing, China, in 2015, respectively. In 2004,
he joined the School of Communication and Infor-
mation Engineering, Chongqing University of Posts and Telecommunica-
tions, Chongqing, China, where he is currently an Associate Professor.
Since 2016, he has been with the Computer, Electrical, and Mathematical
Science and Engineering Division, King Abdullah University of Science and
Technology, Saudi Arabia, where he is currently a Post-Doctoral Research
Fellow supported by the Chinese Scholarship Council. His research inter-
est spans special topics in communications theory and signal processing,
including physical layer security and cognitive radio networks. He is a TPC
Member of IEEE Globecom’17. He has also served as a reviewer for major
international journals, e.g., IEEE TVT, IEEE TCOM, IEEE TWC, IEEE
TIFS, and IEEE CL.
JIANMING ZHANG received the B.Sc. degree
in electrical engineering from the Hebei Univer-
sity of Architecture, Zhangjiakou, China, in 2015.
He is currently pursuing the M.Sc. degree in infor-
mation and communication engineering with the
Chongqing University of Posts and Telecommuni-
cations, Chongqing, China. His research interests
include cognitive radio networks, physical layer
security, and non-orthogonal multiple access.
KI-HONG PARK (S’06–M’11) received the B.Sc.
degree in electrical, electronic, and radio engineer-
ing from Korea University, Seoul, South Korea,
in 2005, and the M.S. and Ph.D. degrees from
the School of Electrical Engineering, Korea Uni-
versity, Seoul, South Korea, in 2011. Since 2011,
he has been a Post-Doctoral Fellow of electrical
engineering with the Division of Physical Science
and Engineering, King Abdullah University of Sci-
ence and Technology, Thuwal, Saudi Arabia. His
research interests are broad in communication theory and its application
to the design and performance evaluation of wireless communication sys-
tems and networks. On-going research includes the application to MIMO
diversity/beamforming systems, cooperative relaying systems, physical layer
secrecy, and optical wireless communications.
PENG XU received the B.Sc. and Ph.D. degrees in
electronic and information engineering from the
University of Science and Technology of China,
Anhui, China, in 2009 and 2014, respectively.
Since 2014, he has been a Post-Doctoral
Researcher with the Department of Electronic
Engineering and Information Science, Univer-
sity of Science and Technology of China, Hefei,
China. Since 2016, he has been with the School
of Communication and Information Engineering,
Chongqing University of Posts and Telecommunications, Chongqing, China.
His current research interests include cooperative communications, infor-
mation theory, information-theoretic secrecy, and 5G networks. He received
IEEE Wireless Communications Letters Exemplary Reviewer 2015.
IMRAN SHAFIQUE ANSARI (S’07–M’15)
received the B.Sc. degree in computer engineer-
ing (Hons.) from the King Fahd University of
Petroleum and Minerals in 2009 and the M.Sc.
and Ph.D. degrees from the King Abdullah Uni-
versity of Science and Technology in 2010 and
2015, respectively. He is currently a Post-Doctoral
Research Associate with Texas A&M University
at Qatar. In 2009, he was a Visiting Scholar
with Michigan State University, East Lansing, MI,
USA, and from 2010 to 2010, he was a Research Intern with Carleton
University, Ottawa, ON, Canada.
He has authored/co-authored more than 50 journal and conference pub-
lications. He has co-organized the GRASNET’2016 workshop in con-
junction with IEEE WCNC’2016 and co-organizing the second edition
GRASNET’2017 workshop in conjunction with IEEE WCNC’2017. His
current research interests include free-space optics, channel modeling/signal
propagation issues, relay/multihop communications, physical layer secrecy
issues, full duplex systems, and diversity reception techniques among others.
GAOFENG PAN (M’12) received the B.Sc. degree
in communication engineering from Zhengzhou
University, Zhengzhou, China, in 2005, and the
Ph.D. degree in communication and informa-
tion systems from Southwest Jiaotong University,
Chengdu, China, in 2011. He was with The Ohio
State University, Columbus, OH, USA, from 2009
to 2011, as a joint-trained Ph.D. student under the
supervision of Prof. E. Ekici. In 2012, he joined the
School of Electronic and Information Engineering,
Southwest University, Chongqing, China, where he is currently an Associate
Professor. Since 2016, he has also been with the School of Computing and
Communications, Lancaster University, Lancaster, U.K., where he currently
holds a postdoctoral position under the supervision of Prof. Z. Ding. His
research interest spans special topics in communications theory, signal pro-
cessing, and protocol design, including secure communications, CR commu-
nications, and MAC protocols. He is a TPC Member of IEEE Globecom’16
Workshop on Wireless Energy Harvesting Communication Networks. He has
also served as a reviewer for major international journals, such as the IEEE
TCOM, the IEEE TWC, the IEEE TSP, the IEEE TVT, the IEEE CL, and the
IEEE WCL.
VOLUME 5, 2017 17463
H. Lei et al.: On Secure NOMA Systems With TAS Schemes
BASEL ALOMAIR (M’11) received the bache-
lor’s degree from King Saud University, Riyadh,
Saudi Arabia, the master’s degree from the Univer-
sity of Wisconsin-Madison, Madison, WI, USA,
and the Ph.D. degree from the University of
Washington-Seattle, Seattle, WA, USA. He is cur-
rently an Assistant Professor and the Founding
Director of the National Center for Cybersecurity
Technology, King Abdulaziz City for Science and
Technology, Riyadh, Saudi Arabia, an Affiliate
Professor, and the Co-Director of the Network Security Laboratory, Univer-
sity of Washington-Seattle, an Affiliate Professor with King Saud University,
and a cryptology consultant with various agencies.
Dr. Alomair was recognized by the IEEE Technical Committee on Fault-
Tolerant Computing and the IFIP Working Group on Dependable Computing
and Fault Tolerance (WG 10.4) with the 2010 IEEE/IFIP William Carter
Award for his significant contributions in the area of dependable computing.
He has authored/coauthored papers that received best paper awards. He was
a recipient of the 2011 Outstanding Research Award from the University
of Washington for his research in information security, the 2012 Distin-
guished Dissertation Award from the Center for Information Assurance and
Cybersecurity at the University of Washington, and the 2015 Early Career
Award in Cybersecurity by the NSA/DHS Center of Academic Excellence
in Information Assurance Research for his contributions to Modern Crypto-
graphic Systems and Visionary Leadership.
MOHAMED-SLIM ALOUINI (S’94–M’98–
SM’03–F’09) was born in Tunis, Tunisia.
He received the Ph.D. degree in Electrical Engi-
neering from the California Institute of Technol-
ogy, Pasadena, CA, USA, in 1998. He served as a
Faculty Member with the University of Minnesota,
Minneapolis, MN, USA, and then with the Texas
A&M University at Qatar, Education City, Doha,
Qatar, before joining the King Abdullah University
of Science and Technology, Thuwal, Saudi Arabia,
as a Professor of Electrical Engineering in 2009. His current research
interests include the modeling, design, and performance analysis of wireless
communication systems.
17464 VOLUME 5, 2017
... In order to improve secrecy performance, opportunistic scheduling schemes with multiple antennas were introduced in [23]- [25]. Particularly, the authors in [23] proposed the various TAS scheme in NOMA systems to enhance the secrecy performance. In [24], the authors studied the opportunistic scheduling scheme, called the proposed antenna/users selection (PAUS) scheme, that selects the transmit antenna and cell-centre/cell-edge users in each cluster to improve the secrecy performance. ...
... Contrarily, the performance of the OBAUS scheme is improved with an increase in the number of transmitters/receivers because it uses channel condition information to select the best transmitter/receiver, which corresponds to (22). Besides that, when the number of J increases, the SOP performance increases because increasing the number of J improves the received signal quality at users, which corresponds to (23). Similar to the cell-center user, increasing the number of K also can improve the SOP performance of the cell-edge user because choosing the best antenna for the cell-edge user can improve the received signal, which corresponds to the (24). ...
... Additionally, increasing the number of relay antennas leads to a decrease in SOP since having more antennas provides more options for selecting a relay antenna that minimizes the eavesdropper channel capacity. As described before, when the number of J and K increases, the SOP performance increases because users (cell-center and cell-edge) select the best antennas based on maximum capacity corresponding to (23) and (24). Fig. 8 presents the SOP as a function of the number of antennas at the cell-center user. ...
Article
Full-text available
In this paper, we propose a novel opportunistic scheduling-based antenna-user selection (OBAUS) scheme to improve the secrecy performance of cooperative non-orthogonal multiple access (NOMA) systems in the presence of a passive eavesdropper. The proposed OBAUS scheme can be divided into two steps such as relay antenna selection, which selects the antenna at the relay to minimize the eavesdropper channel condition, and user selection which selects the received antenna at each user to maximize the main channel, respectively. To capture the relation between network parameters and secrecy performance, we derive the closed-form expression for secrecy outage probability (SOP) of cell-center and cell-edge users, respectively. Toward a real-time setting, we design the deep neural network (DNN)-based optimization that predicts each user channel capacity, the optimal values of transmit power and power allocation coefficient at the same time. Numerical results show that the proposed scheme can improve the SOP and secrecy throughput performances compared to that of the conventional scheduling scheme, called random relay-user pair antenna selection (RRUAS) scheme. Besides that, the proposed DNN-based optimization can predict the secrecy performance and find the optimal points. Compared to that of the traditional searching algorithm (2D Golden Section Searching), the proposed DNN-based optimization significantly reduces the execution time as well as reasonable secrecy performance prediction and optimal point finding. Moreover, the impact of essential network parameters such as transmit power at source and relay, the number of relay’s and user’s antennas, power allocation coefficient, and minimum secrecy data rates on the system secrecy performance are investigated to show the effectiveness of the proposed scheme.
... In addition, the results in [9]- [10] indicated that NOMA exhibits a significant secrecy performance improvement compared to traditional orthogonal multiple access (OMA). Moreover, a practical scenario without the instantaneous knowledge of the eavesdropper's CSI at the transmitter was studied in [11]- [14]. In particular, to improve the secrecy performance the authors in [11] investigated some transmit antenna selection (TAS) schemes to benefit NOMA systems. ...
... Moreover, a practical scenario without the instantaneous knowledge of the eavesdropper's CSI at the transmitter was studied in [11]- [14]. In particular, to improve the secrecy performance the authors in [11] investigated some transmit antenna selection (TAS) schemes to benefit NOMA systems. The authors in [11] derived the exact closed-form formula of secrecy outage probability (SOP) and asymptotic SOP was further provided. ...
... In particular, to improve the secrecy performance the authors in [11] investigated some transmit antenna selection (TAS) schemes to benefit NOMA systems. The authors in [11] derived the exact closed-form formula of secrecy outage probability (SOP) and asymptotic SOP was further provided. Another work in [12] presented the scenario of randomly deployed users and eavesdroppers in large-scale networks with the exact and asymptotic expressions for the SOP. ...
Article
Full-text available
This paper presents a controllable analysis framework for evaluating the reliability and security of underlay cognitive radio networks (CRs) relying on non-orthogonal multiple access (NOMA). In such systems, a secondary base station (BS) transmits confidential information to multiple secondary users uniformly distributed in the presence of a nearby located external eavesdropper. Moreover, transmit power constraints are introduced to limit the interference to the primary imposed by cognitive base stations. As an effective approach of multiple input single output (MISO) systems, the transmit antenna selection (TAS) is selected in the BS to improve the secrecy performance of the primary networks. Furthermore, we first consider the impact of quadrature-phase imbalance (IQI) to characterize the secure performance of the considered network in practice. Then, the degraded performance is evaluated in terms of outage probability (OP), intercept probability (IP), and effective secrecy throughput (EST) of two NOMA users. The optimal EST can be achieved through simulations while the results of OP and IP provide guidelines in the design of IQI-aware CR-NOMA systems. Finally, the trade-off between OP and IP with transmit signal-to-noise ratio (SNR) at the BS is investigated for reflecting the security characteristic. Finally, the trade-off between OP and IP with transmit signal-to-noise ratio (SNR) at the BS is studied for displaying the security characteristic. Numerical results show that increasing the number of transmit antennas at the BS and other main parameters improves performance. Moreover, when the system parameters are reasonably set, the secondary NOMA user in CR-NOMA can be reached secure requirements regardless of the controlled IQI.
... Nonetheless, a notable limitation of the aforementioned studies is that the base station (BS) is equipped with only a single antenna, thus prompting researchers to shift their focus towards multi-antenna networks and investigate various transmit antenna selection (TAS) schemes to enhance secrecy outage performance [12][13][14][15][16][17][18]. For example, in [12], Nandan et al. proposed a zero-forcing-beamforming (ZFBF) technique to enhance the secrecy performance in multiple-antenna CR-NOMA networks. ...
... Moreover, Zhu et al. proposed a space-time transmission (ST) scheme and a maximum channel capacity (MCC) scheme [15], which served as the basis for LEI et al.'s study on the SOP of two secondary users in the MISO-NOMA network with STT and MCC schemes. Simulation results shown that the secrecy performance with STT and MCC schemes were substantially better than that of a single-antenna NOMA system [16]. In [17,18], artificial noise and relay-assisted cooperative technology were applied to NOMA networks with ST and MCC schemes, further enhancing the secrecy outage performance of the system. ...
... In [17,18], artificial noise and relay-assisted cooperative technology were applied to NOMA networks with ST and MCC schemes, further enhancing the secrecy outage performance of the system. However, it is worth noting that [15][16][17][18] were conducted solely in non-cognitive scenarios. ...
Article
Full-text available
Cognitive radio inspired non-orthogonal multiple access (CR-NOMA) networks are a research focus in the wireless communication field. The secure communication of wireless networks has become a pressing issue due to the openness of the wireless channel. Multiple-antenna technology can enhance the secrecy performance in CR-NOMA networks, thus we propose a multiple-input-single-output (MISO) CR-NOMA network where the base station (BS) is equipped with multiple antennas, while others have a single antenna in the paper. The BS serves three secondary users in the presence of an eavesdropper and a primary user. We propose two transmit antenna selection (TAS) schemes, namely the space-time transmission (ST) scheme and the maximum channel capacity (MCC) scheme, respectively. Firstly, we obtain an exact closed-form expression for the secrecy outage probability (SOP) of three secondary users and the overall SOP of the networks with the two schemes, respectively. To gain further insights, the present study analyzes the asymptotic SOP performance to analyze the relationship between the network parameters and secrecy outage performance. Based on this, we propose a power allocation algorithm to further improve the secrecy outage performance of the networks. Finally, we verify the analyses with Monte Carlo simulations. The numerical and simulation results demonstrate that: (1) The MCC scheme outperforms the ST scheme on the secrecy outage performance. (2) The proposed power allocation algorithm optimizes the secrecy outage performance of the networks. (3) There exists a sole respective optimal power allocation factor for a BS different transmission power.
... , S.Ustunbas and U. Aygolu (2017), H.Lei et al. (2017 and2018), and D. -D.Tran et al. (2020). However, this scheme is unable to decide which transmit antenna offers the best channel condition between users and the base station. ...
... The best antenna selection is done by a series of factors amongst which is high sum-rate (A. P.Shrestha, et al., 2016), equity amongst users (S.Ustunbas & U. Aygolu, 2017), or safety between users (H.Lei et al., 2017;D. -D. ...
... In this scenario, SOP decreases before it reaches a ceiling because the interference increases with increasing ρ, which denotes that there is an optimal ρ to minimize SOP. Moreover, SOP worsens in the high-ρ region until it becomes constant due to increasing interference [28]. However, as ρ increases, the QoS of U 1 is easily guaranteed and the probability of decoding in both stages tends to be a constant. ...
Article
Full-text available
In the uplink cognitive radio-inspired non-orthogonal multiple access (CR-NOMA) systems, the successive interference cancellation (SIC) and power control (PC) schemes were designed to enhance the outage performance but they lack the capability of protecting signals from being eavesdropped. This work investigates the secrecy performance of uplink CR-NOMA systems with the hybrid SIC and PC (HSIC-PC) scheme in the presence of a passive eavesdropper. Furthermore, through transmitting artificial noise (AN), a new scheme is proposed to improve the security of the cognitive user with HSIC-PC without deteriorating the primary user’s quality of service. Specifically, the primary and secondary users transmit AN cooperatively to enhance the security of the secondary user. The secrecy performance of the proposed scheme is analyzed based on the relationship between the maximum interference power that the primary user can tolerate and the secondary user’s channel gain. The analytical expressions for the secrecy outage probability (SOP) are derived, and the effect of parameters on the SOP is discussed. We also derive the analytical expressions of the asymptotic SOP in the high-power region to obtain further insights. Monte Carlo simulation results are performed to verify the analytical results. The results demonstrate that the proposed scheme performs better than the benchmarks.
Article
Non-orthogonal multiple access (NOMA) is paramount in modern wireless communication systems since it enables efficient multiple access schemes, allowing multiple users to share the same spectrum resources and thus improving overall network capacity. Multiple-input multiple-output (MIMO) technology is crucial in wireless communication as it leverages multiple antennas to enhance data throughput, increase link reliability, and mitigate signal interference, resulting in improved communication performance. The combination of MIMO and NOMA represents a transformative synergy that harnesses the benefits of both technologies, facilitating efficient spectrum utilization, higher data rates, and improved reliability in wireless networks. This makes it particularly valuable in the fifth-generation (5G) era and beyond. This paper investigates the performance of majority-based transmit antenna selection and maximal ratio combining (TAS-maj/MRC) in MIMO-NOMA networks. We derive a closed-form expression for the exact bit error rate (BER) for binary phase shift keying (BPSK) modulation in Nakagami-m fading channels. Moreover, asymptotic expressions are obtained in the high signal-to-noise ratio (SNR) region to get further insight into the BER behavior of the system. Finally, we verify the analytical results’ accuracy through simulations. The results demonstrate that diversity and code gains are achieved. In addition, the BER performance is significantly improved as the number of receive antennas increases or channel condition enhances.
Chapter
There are ongoing research interests in the past decade to develop wireless communication systems and advance information rate limits. Therefore, to achieve future requirements and increase network capacity, the first method is to use millimeter wave (mmWave), which is essential for the upcoming 5G wireless communication technology. However, some challenges are encountered when using both mmWave and Massive MIMO in the spectrum and power efficiency to achieve optimal performance. Beamspace (BS) MIMO is a discovery in Massive MIMO, which is essential for making an exchange between energy efficiency (EE) and spectral efficiency (SE) in BS-MIMO. Therefore, BS-MIMO can increase network capacity and reduce energy consumption by significantly reducing the required number of radio frequency (RF) chains. The problem with the traditional method is that the beam can only support one user, not more at the same time and frequency resources. In this paper, we propose to use multiple users (MU) with non-orthogonal multiple access (NOMA) in the beamspace Massive MIMO. The method is integrating the NOMA with BS-MIMO to create a new configuration called BS-MIMO-NOMA. In this paper, we present simulation performance among three methods as fully digital MIMO, BS-MIMO, and BS-MIMO-NOMA. Simulation results show that the fully digital MIMO system shows the worst EE performance compared to other methods. In addition, the BS-MIMO-NOMA method can achieve better spectrum efficiency performance compared to the beamspace-specific MIMO method. This paper aims to make the trade-off between the EE and SE in terms of best performances. In the future, we propose the use of power optimization iterative method with minimal complexity to realize the best EE performance.KeywordsAntenna arraysBeamspace NOMAPower allocationMassive MIMOEnergy efficiencySpectral efficiency
Article
Full-text available
In this work, we study the secrecy capacity of the classic Wyner’s model over the − μ fading channels, where and μ specify the nonlinearity and clustering of fading channels, respectively. The average secrecy capacity (ASC) is derived in closed-form by using the extended generalized bivariate Fox’s Hfunction (EGBFHF). Moreover, the asymptotic analysis of ASC in high signal-to-noise ratio (SNR) regime is conducted. The asymptotic results unveil that the ASC follows the scaling law of (ln ), where stands for the ratio between the average powers of main channels and eavesdropping channels. Moreover, the ASC can be enhanced by increasing the transmit SNR, while there exists a ceiling of ASC as the SNRs at both sides are improved simultaneously. The accuracy of the analytical results is validated by Monte-Carlo simulations. The numerical results show that rigorous fading channels are beneficial to the secrecy performance, that is, serious nonlinearity (small ) and sparse clustering (small μ) will lead to the improvement of ASC.
Article
Full-text available
This paper considers the joint antenna selection (AS) problem for a classical two-user MIMO non-orthogonal multiple access (NOMA) system, where both the base station (BS) and users (UEs) are equipped with multiple antennas. Specifically, several computationally-efficient AS algorithms are developed for two commonly-used NOMA scenarios: fixed power allocation NOMA (F-NOMA) and cognitive radio-inspired NOMA (CR-NOMA). For the F-NOMA system, two novel AS schemes, namely max-max-max AS (A$^3$-AS) and max-min-max AS (AIA-AS), are proposed to maximize the system sum-rate, without and with the consideration of user fairness, respectively. In the CR-NOMA network, a novel AS algorithm, termed maximum-channel-gain-based AS (MCG-AS), is proposed to maximize the achievable rate of the secondary user, under the condition that the primary user's quality of service requirement is satisfied. The asymptotic closed-form expressions of the average sum-rate for A$^3$-AS and AIA-AS and that of the average rate of the secondary user for MCG-AS are derived, respectively. Numerical results demonstrate that the AIA-AS provides better user-fairness, while the A$^3$-AS achieves a near-optimal sum-rate in F-NOMA systems. For the CR-NOMA scenario, MCG-AS achieves a near-optimal performance in a wide SNR regime. Furthermore, all the proposed AS algorithms yield a significant computational complexity reduction, compared to exhaustive search-based counterparts.
Article
Full-text available
This paper investigates the physical layer security of non-orthogonal multiple access (NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and multiple-antenna aided transmission scenarios are considered, where the base station (BS) communicates with randomly distributed NOMA users. In the single-antenna scenario, we adopt a protected zone around the BS to establish an eavesdropper-exclusion area with the aid of careful channel-ordering of the NOMA users. In the multiple-antenna scenario, artificial noise is generated at the BS for further improving the security of a beamforming-aided system. In order to characterize the secrecy performance, we derive new exact expressions of the security outage probability for both single-antenna and multiple-antenna aided scenarios. To obtain further insights, 1) for the single antenna scenario, we perform secrecy diversity order analysis of the selected user pair. The analytical results derived demonstrate that the secrecy diversity order is determined by the specific user having the worse channel condition among the selected user pair; and 2) for the multiple-antenna scenario, we derive the asymptotic secrecy outage probability, when the number of transmit antennas tends to infinity. Monte Carlo simulations are provided for verifying the analytical results derived and to show that: i)~The security performance of the NOMA networks can be improved by invoking the protected zone and by generating artificial noise at the BS; and ii)~The asymptotic secrecy outage probability is close to the exact secrecy outage probability.
Article
Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for performance enhancement in next-generation cellular communications. Compared to orthogonal frequency division multiple access (OFDMA), which is a well-known high-capacity orthogonal multiple access (OMA) technique, NOMA offers a set of desirable benefits, including greater spectrum efficiency. There are different types of NOMA techniques, including power-domain and code-domain. This paper primarily focuses on power-domain NOMA that utilizes superposition coding (SC) at the transmitter and successive interference cancellation (SIC) at the receiver. Various researchers have demonstrated that NOMA can be used effectively to meet both network-level and user-experienced data rate requirements of fifth-generation (5G) technologies. From that perspective, this paper comprehensively surveys the recent progress of NOMA in 5G systems, reviewing the state-of-the-art capacity analysis, power allocation strategies, user fairness, and user-pairing schemes in NOMA. In addition, this paper discusses how NOMA performs when it is integrated with various proven wireless communications techniques, such as cooperative communications, multiple input multiple output (MIMO), beamforming, space time coding, and network coding, among others. Furthermore, this paper discusses several important issues on NOMA implementation and provides some avenues for future research.
Article
This paper presents a full-duplex device-to-device (D2D)-aided cooperative nonorthogonal multiple access (NOMA) scheme to improve the outage performance of the NOMA-weak user in a NOMA user pair, where the NOMA-weak user is helped by the NOMA-strong user with the capability of full-duplex D2D communications. The expressions for the outage probability are derived to characterize the performance of the proposed scheme. The results show that the proposed cooperative NOMA scheme can achieve superior outage performance compared to the conventional NOMA and orthogonal multiple access (OMA). In order to further improve the outage performance, an adaptive multiple access (AMA) scheme is also studied, which dynamically switches between the proposed cooperative NOMA, conventional NOMA, and OMA schemes, according to the level of residual self-interference and the quality of links. The results show that the AMA scheme outperforms the above multiple access schemes in terms of outage performance.
Article
Non-orthogonal multiple access (NOMA), which is an effective solution to improve spectral efficiency, has been considered as an emerging candidate for the fifth generation multiple access. In addition, simultaneous wireless information and power transfer, which aims to maximise energy efficiency, has received significant attention. In this study, the authors design NOMA for downlink energy harvesting (EH) multiple-antenna relaying networks. The base station communicates with multiple mobile users simultaneously via an EH relay node. In the first slot, the relay node harvests energy from the received signals; and in the second slot, the relay node uses the harvested energy to broadcast the received signals to all mobile users. Antenna selection is adopted at the base station while maximal-ratio combining is applied at the mobile users. The outage performance for the NOMA-EH relaying networks is studied over Nakagami-m fading and closed-form expressions for the outage probability are obtained. In addition, the presented simulation results demonstrate the correctness of the authors’ analysis and the advantage of NOMA over conventional orthogonal multiple access.
Article
In this paper, a novel dynamic power allocation scheme is proposed to downlink and uplink non-orthogonal multiple access (NOMA) scenarios with two users for more flexibly meeting various quality of service requirements. The exact expressions for the outage probability and the average rate achieved by the proposed scheme, as well as their high signal-to-noise ratio approximations, are established. Compared with the existing works, such as NOMA with fixed power allocation and cognitive radio inspired NOMA, the proposed scheme can: 1) strictly guarantee a performance gain over conventional orthogonal multiple access; and 2) offer more flexibility to realize different tradeoffs between the user fairness and system throughput. Monte Carlo simulation results are provided to demonstrate the accuracy of the developed analytical results and the performance gain of the proposed power allocation scheme.