Abstract

The physical layer security of downlink nonorthogonal multiple access (NOMA) network is analyzed. In order to improve the secrecy probability, friendly jammers are jointed in the NOMA network. Two jammer schemes are proposed in the NOMA network. All the jammers transmit jamming signal without jammer selection in the first scheme (NO JS scheme). Jammers are selected to transmit jamming signal if their interfering power on scheduled users is below a threshold in the second scheme (JS scheme). A stochastic geometry approach is applied to analyze the outage probability and the secrecy probability. Compared with the NO JS scheme and traditional scheme (without jointing jammers), the jammer selection scheme provides a good balance between the user outage probability and secrecy probability. Numerical results demonstrate that the security performance of the two proposed schemes can be improved by jointing the jammers in the NOMA wireless network.

1. Introduction

The development of mobile internet and Internet of Things brings lots of challenging requirements to fifth-generation (5G) networks, such as increasing high data rate and low latency [13]. The nonorthogonal multiple access has been considered as key promising multiple access candidates for 5G cellular networks. NOMA allows serving multiple users simultaneously using the same frequency/time resources at the cost of increased intracell interference. At the base station side, messages for multiple users are superposed by superposition coding. The successive interference cancellation (SIC) technique is applied to extract the intended message in the receiver side. Security is always an important issue for wireless networks, since the broadcast nature of wireless radio propagation makes it easily be overheard by eavesdroppers.

1.1. Related Works

Recently, NOMA has received remarkable attention both in the world of academia and industry [46]. Power-domain NOMA has been proposed for the 3GPP long-term evolution initiative in [4]. The authors in [5] investigated the performance of NOMA in a cellular downlink scenario with randomly deployed users. It was shown that NOMA can achieve superior ergodic sum rate performance than traditional orthogonal multiple access (OMA) counter parts. Challenges, opportunities, and future research trends for NOMA design are highlighted to provide some insight into the potential future work of researchers in [6]. The security performance of the NOMA networks can be improved by invoking the protected zone and by generating noise at the BS as shown by Liu et al. [7]. The physical layer security of uplink nonorthogonal multiple access is analyzed by Gerardo Gomez et al. [8]. Tao et al. [9] proposed a new reliable physical layer network coding and cascade-computation decoding scheme. The authors in [10] proposed an opportunistic multiple-jammer selection scheme for enhancing the physical layer security. The authors in [11] studied the security-reliability tradeoff analysis for conventional single-hop networks under a single passive eavesdropper attack. The authors in [12] enhanced physical layer security for downlink heterogeneous networks by using friendly jammers and full-duplex users. Recently, stochastic geometry has been used to model some network, such as large-scale HET wireless networks [10], massive MIMO-enabled HetNets [14], cognitive cellular wireless networks [15], multitier millimeter wave cellular networks [16], and NOMA network [17]. It has been succeeded to develop tractable models to characterize and better understand the performance of these networks, and these models have been shown to provide tractable yet accurate performance bounds for these networks.

1.2. Motivations and Contributions

In this paper, we investigate the physical layer security of NOMA with friendly jammers and multiple noncolluding eavesdroppers (EVEs) in large-scale networks with stochastic geometry. For the sake of easy deployment, all nodes in NOMA wireless network are equipped with single antenna, and eavesdroppers are randomly distributed along the whole plane. The jammers are assumed to transmit friendly artificial noise. To enhance the physical layer security, two schemes are proposed with jointing jammers in NOMA network. In order to alleviate the interference from jammers to scheduled users, a jammer selection policy is discussed based on the received jamming power at the user. When the jammer power is below a threshold, the jammer around the scheduled user is active; otherwise, the jammer is idle. Unlike the scheme in [7, 8], the security performance of the NOMA networks can be improved by generating noise at the BS in [7], and physical layer security in uplink NOMA is discussed in [8]. In this paper, friendly jammers will be jointed, which can enhance the physical layer security in downlink NOMA wireless network. The main contributions of this paper are summarized as follows:(1)Two physical layer security schemes are proposed, where friendly jammers are jointed in NOMA wireless network. Jammers transmit friendly artificial noise. A jammer selection policy is discussed based on the received jamming power at user.(2)Using stochastic geometry tools, the downlink NOMA performance is analyzed in terms of outage probability and secrecy probability. In particular, the BSs and user positions are model Poisson point process (PPP) on a 2-D plane. The active jammer positions are model Poisson hole process.(3)All the analytical results are validated by system-level simulations. Our proposed schemes provide a better security performance compared with the traditional scheme.

The rest of the paper is organized as follows. In Section 2, we introduce the system model. In Section 3, the outage probability performance of proposed schemes is investigated. In Section 4, the user secrecy probability performance of proposed schemes is investigated. In Section 5, numerical simulation and analysis are discussed to verify these results. A conclusion is drawn in Section 6.

Notation: the expectation of function with respect to x is denoted as . Cumulative distribution function of is denoted as . The Laplace transform of is denoted by . An exponential distributed random variable with mean 1 is denoted by . Let be a set and be a subset of ; then, denotes the set of elements of that do not belong to .

2. System Model

In this paper, we consider a dense multicell NOMA downlink wireless network in presence of eavesdroppers (EVEs) as shown in Figure 1. All BSs users and EVEs are equipped with one antenna. The BS locations are distributed as an independent homogeneous PPP with density in two-dimensional plane. Without loss of generality, the analysis is performed in a typical cell denoted as . Based on Slivnyak’s Theorem, due to stationarity of , the typical cell can reflect the averaged performance of the entire system. The system assumes a frequency reuse factor 1; hence, the same frequency resources are used in all cells. The radio resources are partitioned into a number of subbands. We assume the bandwidth of each subband is normalized to 1. The UE and EVE locations are distributed as an independent homogeneous PPP and with densities and , respectively. In this paper, the NOMA group includes two users. Existing results have shown that the NOMA group with more than two UEs may provide a better performance gain [18]. In order to process the SIC easily, two user NOMA networks are more practical in the reality system. and consist of a NOMA group. We assume so that a sufficient number of UEs can always be found to form the NOMA group in each cell. To enhance the security performance, friendly jammers are jointed in NOMA network. In the selective jammer scheme, a jammer is selected to be active if its interference power to the scheduler user is below a threshold. Actually, the threshold is the jammer exclusion zone around the scheduler user, i.e., . is the Poisson hole process of active jammer. denotes the point process of scheduled users. is an inhomogeneous PPP, for which the density is . is the distance between the jammer and scheduled users. D is the exclusion zone radius. is denoted as the transmit power of the jammer. a is the pathloss exponent. is the total power of BS on a subband in downlink NOMA. The allocated powers of and can be denoted as and , respectively, where is a NOMA power allocation parameter. is assumed to be with a better normalized channel gain. is assumed to be with a worse normalized channel gain. The two users are selected randomly in NOMA network. denotes the power of jammer. BS-transmitted signals to UE1 and UE2 are expressed as and , respectively. Since UE1 and UE2 form a NOMA group, and are encoded as the composite signal at the [12]:

The received signal at can be expressed aswhere is the Rayleigh fading gain between and , which follows an exponential distribution with mean 1. All are assumed to be i.i.d. is the distance between and . is the additive noise.

3. NOMA User Outage Probability

We assume has a better channel condition. At the receiver side, successive interference cancellation (SIC) is used to decode the intended message. first decodes the signal and removes it from the received composite signal; after that, can further decode its signal . decodes directly by treating as interference. We consider the possible SIC error propagation, which is caused by decoding unsuccessfully in the first step, and thus, error is carried over to the next-level decoding. Let β be the fraction of NOMA interference due to SIC error propagation. Noise can be safely neglected in a dense interference limited wireless system. The signal to interference ratio (SIR) of can be represented as , where denotes the cumulative downlink intercell interference from the all other cells and denotes cumulative downlink interference from the selected jammers. denotes the interference from SIC error propagation. is the Rayleigh fading an exponential distribution with mean 1, . represents the set of all BSs excluding .

The achievable rate of on each subband in NOMA network is given aswhere is the channel gain including pathloss and fast fading normalized by two kinds of interferences. The signal to interference ratio of can be represented as , where is the cumulative downlink intercell interference from all the other cells. denotes cumulative downlink interference from the selective jammers. is the interference from .

The achievable rate of on each subband in NOMA network is given aswhere . We assume that two users are randomly selected among all scheduled users. Two users are marked as and . The normalized channel gains of and are denoted as and , respectively. Let , and , . The CDF of z and ϖ can be represented as [18]. Thus, CDFs of and can be derived as follows:where and denotes the probability of . According to (5) and (6), and can be given as (7) and (8), respectively:

For a given normalized channel gain to or , and can be derived as follows:

In (9), the second term follows from [13].

The Laplace transform of is given bywhere .The Laplace transform of is given by

In step (a), is a hole of radius D centered at , denotes the active jammers location, and is the jammer baseline PPP from which the hole is carved out. In step (b), we only discuss the hole around the . The step (b) follows from the probability generating functional of PPP [13], where is the Gauss hypergeometric function.

When all jammers are active without jammer selection (NO JS scheme), . denotes the Laplace transform of interference from all jammers without selection to in NO JS scheme. We can derive as [13]

By plugging (10) and (11) into (9), with jammer selection in NOMA network is given asWhen a = 4,

The outage probability of UE1 with jammer selection in NOMA network can be evaluated as follows:where denotes the connection probability of , and denote the SIRs of and , respectively. . and are the target rate thresholds for and , respectively. is the rate of decoding signal in the receiver, which must be greater than the QoS requirement of . can ensure that is able to remove ’s signal from interference. . Plugging into (7), we get in (15).

The outage probability of UE2 with jammer selection in NOMA network can be evaluated as follows:

Taking into (8), we can easily get as shown in (16).

4. NOMA User Secrecy Probability

We investigate the secrecy probability of a randomly located NOMA user. In this work, the user secrecy probability corresponds to the probability that a secret message for the schedule user cannot be decoded by any noncolluding eavesdroppers, because and signals are derived by eavesdroppers in the similar way. Here, we only discuss the secrecy performance of . Hence, the secrecy probability can be expressed aswhere of the typical EVE is given bywhere is the target secrecy SIR, is the Rayleigh fading gain between and EVE, and follows an exponential distribution with mean 1. is the distance between and EVE. , where and denote the Laplace transform of and , respectively. is the interference from the other cell BSs to EVE. is the interference from the selective jammers to EVE. The detailed derivation of is provided in Appendix A. We can derive the following:

Inserting (19) into (17), we can easily have the expression of .

When all jammers are active without jammer selection, is given by

5. Simulation Results and Discussion

In this section, we present Monte Carlo simulations to evaluate the performance of the proposed scheme, and analytical results are illustrated and validated with extensive simulations in NOMA network. The default parameters are listed in Table 1 unless otherwise stated.

Our first proposed scheme is that all jammers are active without jammer selection in NOMA network, which is marked as “NO JS scheme.” Our second proposed scheme is that some jammers are active with jammer selection in NOMA network, which is marked “JS scheme.” There are no jammers in the traditional scheme in NOMA network. As expected, our proposed schemes provide a better security performance compared with the traditional scheme. The JS scheme provides a good balance between the user outage probability and the user secrecy probability. Figure 2 shows outage probability and outage probability versus different target rates , where is fixed to 0.1 bits/s/subband.

In Figure 2, “ana” (the dashed curves) and “sim” (the curves with circle marks) are the abbreviation of analysis and simulation, respectively. “UE1 NO JS ana” denotes the analytical result of UE1 outage probability using the first proposed scheme, where all jammers are active. “UE1 NO JS sim” denotes the simulation result of UE1 outage probability. “UE1 JS ana” denotes the analytical result of UE1 in the second proposed scheme, where some selective jammers are active. From Figure 2, we can observe that the analytical results match well with the simulation results, which validate the accuracy of the analysis.

In Figure 2, all jammers are active in the first proposed scheme. Jammers transmit artificial noise to legitimate NOMA users and the eavesdroppers. While transmitting noise to eavesdroppers, the jammer also transmits artificial noise to legitimate NOMA users in the proposed scheme. The noise is the interference for NOMA users. When the interference increases, the SIR decreases. Compared with the traditional scheme without jointing the jammer, the outage probability increases in our proposed scheme with jointing jammers in NOMA network. Compared to the first scheme, the outage probability decreases for the selective jammer scheme. In other words, the user connective performance improves. In Figure 2, we can see that remains constant when bit/s/subband. This is due to the fact that needs to decode the signal intended to first before it can decode the signal for itself. When is below 0.04, the outage is always remained by failing to decode signal. The result also can be explained by the definition of outage probability of ; is related to and . If is fixed, when is quite small, can guarantee and becomes , so is not a function of and it remains constant when is quite small. When , the outage probability reduces as increases. remains constant as increases due to the fact that is not a function of .

Figure 3 shows the outage probability of and when is fixed to bit/s/subband. We can observe remains constant at first and then increases in the same way as shown in Figure 2. When is small, is only a function of , which is not affected by . As continues to increase, both and will affect .

Figure 4 shows that outage probability of in three schemes versus with different ε in NOMA network. The allocation power of increases as ε increases; we can see that while ε increases in these schemes; does not necessarily decrease. This outcome can be explained that more transmit power allocated to also means less power allocated to , so it is difficult for to decode signal . But the lower bound of outage probability of can be improved, which is related by successfully decoding signal .

Figure 5 shows that outage probability of three schemes versus with different ε in NOMA network. We can observe that the outage probability decreases whsen ε is decreasing from 0.5 to 0.3. This is because more power allocated to will result in a better outage performance of .

Figure 6 shows the impact of imperfect SIC of three schemes with different β. From the SIR of , , we can see SIR decreases as β increases. When , compared to perfect SIC , the outage probability of increases.

Figure 7 shows that the secrecy probability of our proposed scheme versus SIR threshold with different D exclusion zone radii. We can see that our proposed scheme has a better performance than the traditional scheme in secrecy probability in NOMA network. “NO JS scheme” will obtain the highest secrecy probability. But the outage probability of “NO JS scheme” is the worst. Secrecy probability of “JS scheme” with small jammer exclusion zone is better. When the exclusion zone radius increases, the small jammers transmit noise to interfere the eavesdropper, so secrecy probability decrease. Our proposed jammer selection scheme provides a good balance between the user outage probability and secrecy probability.

Figure 8 compares the connection probability performance of versus jammer density . We can observe that simply deploying more jammers cannot enhance the connection probability. When jammer density increases, the connection probability of JS scheme increases. But the connection probability of NO JS scheme decreases, as increases. The connection probability of traditional scheme without jointing jammer remains constant. This is because the jammers whose interference on any scheduled user is stronger than a threshold are prevented from being active. When increases, there are more jammers around the eavesdropper, but the interference level suffered by the legitimate user from jammers is mitigated, and the interference level remains low in the jammer selection scheme. When , the performance is the same between our proposed schemes and the traditional scheme.

6. Conclusion

This paper analyzes the outage and secrecy performances of NOMA network using stochastic geometry theory. The analytical expressions of outage and secrecy probabilities are derived. Compared with the “NO JS scheme” and traditional scheme (without jointing jammer), the jammer selection scheme provides a good balance between the user outage probability and secrecy probability. Simulation results show that the expressions can provide sufficient precision to evaluate the system performance. We can optimize jammer selection exclusion zone radius and NOMA power allocation to realize a secrecy transmission in future study.

Appendix

A. Derivation of

To derive the , we use the approach in [20] (see Figure 9).

Point-p is the closest hole location to the EVE as in [20]. V is the distance between the jammer and EVE. Y and have a cosine-law relation: . can be given as

In step ©, denotes the distance between selective jammers with EVE. The final step follows from the probability-generating functional of PPP [13, 19] and cosine-law and some geometry derivation [20]:where

This completes the proof.

Data Availability

The data that support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This study was supported by the Natural Science Foundation of China (Grant nos. 61801006 and 61603003), Key Laboratory of Intelligent Perception and Computing of Anhui Province, Anqing Normal University, China, Key Project on Anhui Provincial Natural Science Study by Colleges and Universities (Grant nos. KJ2017A356 and KJ2018A0361), and Natural Science Foundation of Anhui Province (Grant nos. 1608085 and 1908085MF194).