Secure transmission design in cooperative NOMA networks: Orienting toward user requirements

Abstract This paper presents a full‐duplex and multi‐antenna relay‐aided transmission scheme for the user‐oriented perspective in cooperative non‐orthogonal multiple access (NOMA) systems. Relying on the service requirements, two legitimate users with security demands (SU) and quality of service (Qo...

Full description

Saved in:
Bibliographic Details
Main Authors: Dan Jiang, Yuanyuan Gao, Guoxin Li, Nan Sha, Jihao Cai, ChengFei Ding
Format: Article
Language:English
Published: Wiley 2024-12-01
Series:IET Communications
Subjects:
Online Access:https://doi.org/10.1049/cmu2.12779
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850250686622597120
author Dan Jiang
Yuanyuan Gao
Guoxin Li
Nan Sha
Jihao Cai
ChengFei Ding
author_facet Dan Jiang
Yuanyuan Gao
Guoxin Li
Nan Sha
Jihao Cai
ChengFei Ding
author_sort Dan Jiang
collection DOAJ
description Abstract This paper presents a full‐duplex and multi‐antenna relay‐aided transmission scheme for the user‐oriented perspective in cooperative non‐orthogonal multiple access (NOMA) systems. Relying on the service requirements, two legitimate users with security demands (SU) and quality of service (QoS) demands (QU) are paired for NOMA execution. The security of SU is enhanced through inverse power allocation of the conventional NOMA. The QoS requirements for QU are guaranteed, simultaneously. Then, the precoding design at the multi‐antenna relay has been exploited to improve the reliability demands of SU. Closed‐form expressions for SU's outage probability (OP) and intercepted probability, as well as QU's OP, are derived. The security–reliability trade‐off is also presented. Additionally, performance analysis under the half‐duplex and multi‐antenna scheme is provided as a benchmark for comparison. Finally, numerical simulations are performed to confirm the accuracy of the theoretical derivations under different schemes. Results demonstrate the superiority of the proposed scheme over benchmark schemes in terms of improving the security and reliability of SU, as well as saving power consumption of the system.
format Article
id doaj-art-4dbc9c5ccf1a43b18a222b2343fdcdc8
institution OA Journals
issn 1751-8628
1751-8636
language English
publishDate 2024-12-01
publisher Wiley
record_format Article
series IET Communications
spelling doaj-art-4dbc9c5ccf1a43b18a222b2343fdcdc82025-08-20T01:58:08ZengWileyIET Communications1751-86281751-86362024-12-0118201956196610.1049/cmu2.12779Secure transmission design in cooperative NOMA networks: Orienting toward user requirementsDan Jiang0Yuanyuan Gao1Guoxin Li2Nan Sha3Jihao Cai4ChengFei Ding5Troops Huizhou ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaCollege of Communications Engineering Army Engineering University of PLA Nanjing ChinaAbstract This paper presents a full‐duplex and multi‐antenna relay‐aided transmission scheme for the user‐oriented perspective in cooperative non‐orthogonal multiple access (NOMA) systems. Relying on the service requirements, two legitimate users with security demands (SU) and quality of service (QoS) demands (QU) are paired for NOMA execution. The security of SU is enhanced through inverse power allocation of the conventional NOMA. The QoS requirements for QU are guaranteed, simultaneously. Then, the precoding design at the multi‐antenna relay has been exploited to improve the reliability demands of SU. Closed‐form expressions for SU's outage probability (OP) and intercepted probability, as well as QU's OP, are derived. The security–reliability trade‐off is also presented. Additionally, performance analysis under the half‐duplex and multi‐antenna scheme is provided as a benchmark for comparison. Finally, numerical simulations are performed to confirm the accuracy of the theoretical derivations under different schemes. Results demonstrate the superiority of the proposed scheme over benchmark schemes in terms of improving the security and reliability of SU, as well as saving power consumption of the system.https://doi.org/10.1049/cmu2.127795G mobile communicationantennasinformation theoryinterference (signal)multi‐access systemsnumerical analysis
spellingShingle Dan Jiang
Yuanyuan Gao
Guoxin Li
Nan Sha
Jihao Cai
ChengFei Ding
Secure transmission design in cooperative NOMA networks: Orienting toward user requirements
IET Communications
5G mobile communication
antennas
information theory
interference (signal)
multi‐access systems
numerical analysis
title Secure transmission design in cooperative NOMA networks: Orienting toward user requirements
title_full Secure transmission design in cooperative NOMA networks: Orienting toward user requirements
title_fullStr Secure transmission design in cooperative NOMA networks: Orienting toward user requirements
title_full_unstemmed Secure transmission design in cooperative NOMA networks: Orienting toward user requirements
title_short Secure transmission design in cooperative NOMA networks: Orienting toward user requirements
title_sort secure transmission design in cooperative noma networks orienting toward user requirements
topic 5G mobile communication
antennas
information theory
interference (signal)
multi‐access systems
numerical analysis
url https://doi.org/10.1049/cmu2.12779
work_keys_str_mv AT danjiang securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements
AT yuanyuangao securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements
AT guoxinli securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements
AT nansha securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements
AT jihaocai securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements
AT chengfeiding securetransmissiondesignincooperativenomanetworksorientingtowarduserrequirements