4.7 Article

Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2020.3023277

Keywords

NOMA; Jamming; Uplink; Security; Wireless communication; Physical layer; Energy harvesting; Physical layer security; non-orthogonal multiple access; energy harvesting; cooperative jamming; jammer selection

Funding

  1. National Key Research and Development Program of China [2018YFE0100500]
  2. National Natural Science Foundation of China [61871387, 61901313]
  3. National University of Defense Technology Research Fund [ZK17-03-08]
  4. Natural Science Basic Research Program of Shaanxi [2019JM-019, 2020JQ-306]
  5. Open Research Fund of the National Mobile Communications Research Laboratory, Southeast University [2020D07]
  6. China Post-Doctoral Science Foundation [BX20190264, 2019M650258]

Ask authors/readers for more resources

This study investigates the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with energy harvesting jammers. Three different friendly EH jammer selection schemes are proposed to enhance system secrecy performance. Analytical and numerical results show that these schemes can achieve better secrecy performance than conventional schemes without EH jammers, with different levels of secrecy diversity orders and convergence to the same effective secrecy throughput floor.
We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with the aid of energy harvesting (EH) jammers. During each time frame, communication is divided into two phases. At the first phase, the base station (BS) transfers wireless power to EH receivers (EHRs). At the second phase, users perform uplink NOMA transmission to BS, while one of EHRs is selected as a friendly jammer that uses the energy harvested from the previous phase to emit the artificial noise for confusing the eavesdropper. In terms of the requirement of channel state information (CSI), we propose three friendly EH jammer selection schemes, namely random EH jammer selection (REJS) scheme without the requirement of any CSI, maximal EH jammer selection (MEJS) scheme with the CSI between BS and each EHR, and optimal EH jammer selection (OEJS) scheme where both the CSIs from BS to EHRs and from EHRs to the eavesdropper need to be known. Analytical closed-form expressions for the connection outage probability (COP), secrecy outage probability (SOP) and effective secrecy throughput (EST) are derived to evaluate the system performance achieved by the proposed schemes, respectively. Also, the asymptotic analysis is provided to gain further insights. The analytical and numerical results indicate that the proposed schemes can realize better secrecy performance than conventional scheme without an EH jammer. Both the secrecy diversity orders of the REJS and MEJS schemes are one while the OEJS scheme can achieve a full secrecy diversity order. Furthermore, owing to the impact of connection outage, the three schemes converge to the same EST floor with the increase of signal-to-noise ratio (SNR).

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available