TY - JOUR
T1 - Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping
AU - Su, Binbin
AU - Yu, Wenjuan
AU - Liu, Hongbo
AU - Chorti, Arsenia
AU - Poor, H. Vincent
N1 - Funding Information:
The work of Arsenia Chorti was supported in part by the eNiGMA and PHEBE Projects of the CYU Initiative of Excellence and in part by the CNRS IEA Project PEGASUS. The work of H. Vincent Poor was supported in part by the U.S. National Science Foundation under Grant CCF-1908308
Publisher Copyright:
© 2012 IEEE.
PY - 2022/5/1
Y1 - 2022/5/1
N2 - The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers. To address this potential security and reliability flaw, by assuming all users are untrusted, this letter investigates the effective secrecy throughput (EST) for a cooperative NOMA system, where a near user serves as an amplify-and-forward relay to help forward the information of a far user. Considering the inverse power allocation and SIC decoding order, a novel jamming strategy is proposed to enhance the security performance of the far user. Gauss-Chebyshev approximations of ESTs over Nakagami- ${m}$ channels are derived. Asymptotic EST expressions are proposed to provide further insights. Numerical results demonstrate that the proposed jamming strategy and the inverse power allocation and SIC decoding order are both essential for achieving positive secrecy rates for both users.
AB - The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers. To address this potential security and reliability flaw, by assuming all users are untrusted, this letter investigates the effective secrecy throughput (EST) for a cooperative NOMA system, where a near user serves as an amplify-and-forward relay to help forward the information of a far user. Considering the inverse power allocation and SIC decoding order, a novel jamming strategy is proposed to enhance the security performance of the far user. Gauss-Chebyshev approximations of ESTs over Nakagami- ${m}$ channels are derived. Asymptotic EST expressions are proposed to provide further insights. Numerical results demonstrate that the proposed jamming strategy and the inverse power allocation and SIC decoding order are both essential for achieving positive secrecy rates for both users.
KW - Non-orthogonal multiple access
KW - effective secrecy throughput
KW - untrusted internal users
UR - http://www.scopus.com/inward/record.url?scp=85125324132&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85125324132&partnerID=8YFLogxK
U2 - 10.1109/LWC.2021.3098935
DO - 10.1109/LWC.2021.3098935
M3 - Article
AN - SCOPUS:85125324132
SN - 2162-2337
VL - 11
SP - 878
EP - 882
JO - IEEE Wireless Communications Letters
JF - IEEE Wireless Communications Letters
IS - 5
ER -