Improving the Security in Cellular Communications Networks with adding Artificial Noise by method Non-Orthogonal Resource Allocation Techniques

Document Type : Original Article

Authors

Imam Hossain Comprehensive University

Abstract

The Non-orthogonal multiple access (NOMA) is known as a bandwidth efficient access method for fifth generation wireless systems. Unlike the conventional orthogonal multiple access method, which uses only one subcarrier to send information simultaneously, NOMA uses the power domain to serve multiple users from a number of subcarriers simultaneously. In previous attempts, the superiority of the non-orthogonal multiple access method has been proven to be the orthogonal access method of security-to-listening, which state by the Secrecy Sum Rate (SSR), but the superiority of the overall NOMA secrecy sum rate over the OMA, can’t be seen a lot of difference between them. The paper attempts to increase the secrecy sum rate by adding artificial noise along with the user's signal in the transmitter. In this way, legitimate users receive artificial noise signal and, as soon as they arrive, they remove this signal from the received signal, but the eavesdropper assume it is the signal of a legitimate user and they use a lot of energy to decode it. This will reduce the eavesdropper rate then reduce the listening probability. The results obtained in this paper show that, for example, in a specific SNR such as 10 dB, the total secrecy sum rate (SSR) for the orthogonal multiple access method is about 0.1, for the common non-orthogonal multiple access method is about 0.25 and for the non-orthodontic multiple access method with using the artificial noise is about 1 bit per second per hertz.

Keywords


[1]     L. Dai, B. Wang, Y. Yuan, S. Han, I. Chih-Lin, and Z. Wang, “Nonorthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends,” IEEE Commun. Mag., vol. 53, no. 9, pp. 74–81, September 2015.##
[2]     Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, “Non-Orthogonal multiple access (NOMA) for cellular future radio access,” in Proc. IEEE Veh. Technol. Conf. (VTC), Dresden, Germany, pp. 1–5, Jun 2013.##
[3]     Z. Ding, H. Dai, and H. V. Poor, “Relay Selection for Cooperative NOMA,” IEEE Wireless Commun. Lett., vol. 5, no. 4, pp. 416–419, Aug. 2016, pp. 1393–1405, 2016.##
[4]     S. Timotheou and I. Krikidis, “Fairness for non-orthogonal multiple access in 5G systems,” IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1647–1651, Oct. 2015.##
[5]     H.-M. Wang, T.-X. Zheng, J. Yuan, D. Towsley, and M. H. Lee, “Physical layer security in heterogeneous cellular networks,” IEEE Trans. Commun., vol. 64, no. 3, pp.     1204–1219, Mar. 2016.##
[6]     Y. Zhang, H.-M. Wang, Q. Yang, and Z. Ding, “Secrecy sum rate maximization in non-orthogonal multiple access,” IEEE Commun. Lett. vol. 20, no. 5, pp. 930–933, May 2016.##
[7]     M. Qin, S. Yang, H. Deng, and M. H. Lee, “Enhancing security of primary user in underlay cognitive radio networks with secondary user selection,” IEEE Access, vol. 6, pp. 32624–32636, 2018.##
[8]     N. Nandan, S. Majhi, and H. C. Wu, “Secure beamforming for MIMO NOMA based cognitive radio network,” IEEE Commun. Lett., vol. 22, no. 8, pp. 1708–1711, Aug. 2018.##
[9]      Z. Yang, J. A. Hussein, P. Xu, Z. Ding, and Y. Wu, “Power allocation study for non-orthogonal multiple access networks with multicastunicast transmission,” IEEE Trans. Wireless Commun., vol. 17, no. 6, pp. 3588–3599, Jun. 2018.##
[10]  L. Lv, Z. Ding, Q. Ni, and J. Chen, “Secure MISO-NOMA transmission with artificial noise,” IEEE Trans. Veh. Technol., vol. 67, no. 7, pp. 6700–6705, Jul. 2018.##
[11]  Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656– 1672, Mar. 2017.##
[12]  X. Chen, Z. Zhang, C. Zhong, D. W. K. Ng, and R. Jia, “Exploiting inter-user interference for secure massive      non-orthogonal multiple access,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 788–801, Apr. 2018.##
[13]  M. F. Hanif, Z. Ding, T. Ratnarajah, and G. K. Karagiannidis, “A minorization-maximization method for optimizing sum rate in the downlink of non-orthogonal multiple access systems,” IEEE Trans Signal Process, vol. 64(1), pp. 76-88, 2016.##
[14]  Y. Zhang, H.-M. Wang, T.-X. Zheng, and Q. Yang, “Energy-efficient transmission design in non-orthogonal multiple access. IEEE Trans Veh Technol,” vol. 66(3), pp. 2852-2857,  2017.##
[15]  Ming Zeng, Man-Phong Nguyen, A. Dobre Octavia, H. Vincent Poor, “Securing Downlink Massive MIMO-NOMA Networks With Artificial Noise,” IEEE Journal of Selected Topics in Signal Processing, vol. 13, Issue 3, June 2019.##
[16]  Pooja Singh and Aditya Trivedi, “NOMA and massive MIMO assisted physical layer security using artificial noise precoding,” Physical Communication, vol. 39, April 2020.##
[17]  S. M. Riazul Islam, Nurilla Avazov, Octavia A. Dobre, and Kyung-Sup Kwak, “Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges,” IEEE Communications Surveys & Tutorials vol. 19, Issue 2, 2017.##
 
Volume 9, Issue 2 - Serial Number 34
Serial No. 34, Summer Quarterly
June 2021
Pages 135-142
  • Receive Date: 20 September 2020
  • Revise Date: 07 February 2021
  • Accept Date: 11 January 2021
  • Publish Date: 22 June 2021