Abstract

High-speed railway (HSR) wireless communications are required to ensure strict security. In this work, we study the secrecy performance of a nonorthogonal multiple access- (NOMA-) aided HSR wireless communication system in the case of an eavesdropping user. Specifically, applying NOMA technology to the HSR communication system can effectively improve the data rates. Therefore, we study the secrecy performance of the downlink NOMA system under the HSR wireless communication. In particular, the exact analytical results for the secrecy outage probability (SOP) based on no small-scale channel state information (CSI) are derived. We also provide all of the parameterizations for the proposed channel model. Finally, the correctness of theoretical derivation is verified via simulations. Results show the positive effect of utilizing the NOMA for enhancing wireless systems secrecy performance.

1. Introduction

Recently, the rapid development of HSR has brought great convenience to people’s travel. At the same time, high quality and data rate wireless communication are required for passenger services. The high-speed movement of HSR has brought about problems such as the wireless Doppler effect and signal shielding in train compartments, which will cause a series of phenomena, such as the difficulty of a mobile phone call and poor voice signal quality. Thus, railway transportation communication becomes an interesting topic. Researchers have carried out research on improving the data rate on HSR wireless communication in various aspects [13]. For example, the traditional multiple antenna and beamforming technology are introduced into the HSR scenario for the first time in [1] where the security capacity and SOP are compared and analyzed. In addition to the security requirements, the high broadband services for passengers are required. Therefore, the authors in [2] proposed the tapped delay line model for a MIMO channel in HSR scenarios. Compared with the existing channel model, the MIMO channel model is efficient and yet flexible in the HSR environment. More recently, to satisfy the fifth generation (5G) on HSR, the authors in [3] focus on the study of channel modeling combined with the 5G technology such as multiple-input multiple-output (MIMO) and millimeter-wave (mm wave). Hence, applying 5G technology to HSR wireless communication is to be a significant work for future wireless systems.

As a major technology of 5G, nonorthogonal multiple access (NOMA) can schedule multiple users with the same time-frequency resources. Combined with the successive interference cancellation (SIC) technology, multiple signals can be sent and demodulated at the same time, which can effectively improve the spectrum efficiency [4]. In [5], the performance of downlink NOMA is studied by calculating the BER of perfect and imperfect SIC conditions; compared to the orthogonal multiple access (OMA) techniques, the NOMA technique can provide better performance gains. Thus, the authors in [6] analyzed and compared the performance of different NOMA schemes applied in HSR scenarios and proved that choosing the right NOMA scheme has a great effect on improving the data rate in HSR. However, in practice, it is challenging to ensure the security of data transmission in HSR wireless communication.

In recent years, based on Wyner’s eavesdropping channel model, the main indicators to measure the secrecy of wireless communication systems are secrecy outage probability (SOP) and average secrecy capacity (ASC). In the research of physical layer security, the CSI of each channel affects the secrecy performance of the system. Generally, the sources knew the CSI of the main channel. For the CSI of the eavesdropping channel, if the eavesdropping terminal is active eavesdropping, we use ASC to quantify the security performance of the system. Otherwise, we use SOP to measure communication security [7]. The authors in the literature [8] analyse the secrecy performance of the different systems by calculating SOP and ASC.

In this work, we study the secrecy performance of the downlink NOMA system for HSR. More specifically, we assume that no small-scale CSI of the channels is known; hence, the channels are sorts according to distances between the base station and the legitimate users. Besides, we consider that the system model exists as a static eavesdropper near the base station. To measure the secrecy performance of the system, the paper provides a closed-form expression for the SOP, and the simulation results show the positive effect of applying the NOMA for improving the system secrecy performance for HSR.

2. System Methods

In the HSR scenario, the secure communication mode of the downlink NOMA system is shown in Figure 1. The base station (BS) is located at the track side, and the height of the BS transmitting antenna relative to the horizontal plane is . The legitimate user is the passenger on the HSR. We denote the length of the HSR is , the vertical distance between the base station and HSR is , the distance between the legitimate user and the vertical point of the base station is , and the distance between the legitimate user and the BS transmitting antenna is . HSR runs away from the BS according to the speed from the nearest position to the BS. There is a static eavesdropper at the distance , which attempts to obtain the information from the BS. Also, this paper makes the following assumptions: (1) all users and BS are equipped with a single antenna, and the legitimate users communicate directly with the BS; (2) the legitimate users are fixed on the HSR, and the distance between the two users follows the uniform distribution with mean; and (3) the legitimate channel is composed of Rician fading and large-scale fading [9].

2.1. Main Link

According to the NOMA scheme, the transmitted signal from BS to all of the legitimate users can be expressed aswhere is the power allocation factor with , set , is the transmitting power of the BS, and is the transmission signal of the th user. Then, the signal received by the th legitimate user can be expressed aswhere follows the additive white Gaussian noise (AWGN) with the mean zero and variance . For simplicity, the variance is assumed to . The channel gain between the th legitimate user and the BS can be given by , where and represent small-scale and large-scale fading, respectively, and the expression of is related to the distance . Set ; according to order statistics, the probability density function (PDF) of from the BS to the th nearest legitimate user is given by [9]where . According to the knowledge of the successive interference cancellation (SIC) receiver [10], for the th user, the signal-to-interference-plus-noise ratio (SINR) of the th user can be expressed aswhere is the transmitted power, and is denoted as the average signal-to-noise ratio (SNR). In equation (6), since the small-scale fading channel is the Rician fading channel, we define . Thus, the is the noncentral chi-square random variable with two degree of freedom, and its PDF and cumulative distribution function (CDF) are given as [11]where is the modified Bessel function of the zero kind, and is the first order Marcum Q-function [12]. denotes the Rician factor, and similar to [9], we generally set on HSR scenario. Therefore, the conditional CDF of the can be obtained aswhere , and is the path loss exponent. Since the small-scale fading and the large-scale fading are independent of each other. According to equations (3) and (6), the CDF of can be written as

Unfortunately, evaluating the integrals in equation (7) is very difficult. Thus, by using the Gauss–Chebyshev quadrature [13], equation (7) can be approximated aswhere , , and is the approximate order of Chebyshev, which can be selected according to the accuracy and complexity requirements.

Then, the CDF of can be readily formulated as

2.2. Eavesdropping Link

For the eavesdropper, we assume that the eavesdropper attempts to obtain the signal coming from the direct link, and the eavesdropping link is also a hybrid channel similar to the main link. Moreover, the small-scale fading of eavesdropping link experiences independent Rayleigh distribution, and the received signal of an eavesdropper can be expressed aswhere is the channel gain, represents the large-scale fading, which is related to the distance between the eavesdropper and the BS, and is the AWGN at the eavesdropper. Assuming that the eavesdropper has a strong decoding ability to the transmitted signals, the eavesdropper can decode the mixed signal to obtain separate signals [14]. Hence, the received SNR of the eavesdropper is given bywhere is the average SNR. Similarly, is an exponent distribution random variable with parameter . For simplicity, set . Then, the PDF of can be expressed as

3. Performance Analysis

SOP is a typical performance metrics to analyse the secrecy performance for physical layer secrecy, which is defined that the instantaneous secrecy rate is less than a certain threshold. In this section, we analyse the SOP to determine the security of using NOMA in the HSR scenario. Since the main channel and eavesdropping channel are independent, the SOP of the user can be expressed as [7]where is the target secrecy rate, and . Then, by using the Gauss–Laguerre [13] and substituting (9) and (13) into (14), we can obtain the approximate expression of SOP aswhere is the approximate order terms of Laguerre, is the weight of Laguerre polynomial .

4. Simulation and Analysis

In this section, we present a numerical example to illustrate our analytical results, and the simulation parameters are shown in Table 1 [15].

In Figure 2, we plot the SOP versus transmitted power in the presence of an eavesdropper based on the NOMA scheme on the HSR scenario. It is observed that the analytical results match well with the simulation, which verifies the theoretical derivation. Moreover, increasing the number of results in decreasing SOP for two users. As expected, we note that floors appear at relatively high . Therefore, the SOP of the near user is much better than the far user based on the NOMA scheme. Finally, to improve the performance of SOP, we can increase the transmitting power which is not the only scheme but needs to be optimized together with other schemes to ensure the security of communication.

In Figure 3, we present the SOP curves for the different distances between the eavesdropper and BS. As can be observed, a better secrecy performance will be obtained with the increases of . More specifically, the slopes of performance curves of near users are large than the far users; while , the change trend of SOP is gentle. Thus, the change of the distance between the eavesdropper and BS has a greater impact on the secrecy performance of the near users than on far users.

In Figure 4, we plot the SOP versus for a different power allocation coefficient of near user based on the NOMA scheme. It is clearly shown that increasing near users can significantly improve the near user secrecy performance, and the impact of on near users is greater than that on far users from the slope of the SOP versus. Thus, it is necessary to select an appropriate to ensure secure communication in both near user and far user.

5. Conclusions

In this work, we provide secrecy performance analysis for the HSR scenario in the presence of an eavesdropper with the help of NOMA. More specially, the expression for SOP was derived and verified by simulation. Numerical results showed that the secrecy performance can be improved by choosing the appropriate power allocation coefficient based on the NOMA scheme.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Authors’ Contributions

Wenwu Xie and Xin Peng conceived and designed the study. Xinzhong Liu and Zhihe Yang performed the simulations. Jinxia Yang wrote the paper. All authors reviewed and edited the manuscript. All authors read and approved the final manuscript.

Acknowledgments

This work was in part supported by the National Natural Science Foundation of China (No. 61772195), the Hunan Natural Science Foundation (Nos.2019JJ40043, 2018JJ2154, and 2018JJ2156), the Key Research Foundation of Education Bureau of Hunan Province (No.18A320), the Outstanding Youth Project of Hunan Provincial Education Department (Nos.18B353 and 19K037), the Hunan Emergency Communication Engineering Technology Research Centre (No.2018TP2022), the Hunan Institute of Science and Technology for Postgraduate (No.YCK2020A38), the Hunan Province for Postgraduate (No.CX20201139), and the National College Student Innovation and Entrepreneurship Training Program (s202010543042).