Abstract

In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of one base station, multinear user, multifar user, and one eavesdropper. To improve the secrecy performance, we propose the users selection scheme, called best-secure-near-user best-secure-far-user (BSNBSF) scheme. The BSNBSF scheme aims to select the best near-far user pair, whose data transmission is the most robust against the overhearing of an eavesdropper. In order to facilitate the performance analysis of the BSNBSF scheme in terms of secrecy outage performance, we derive the exact closed-form expression for secrecy outage probability (SOP) of the selected near user and the tight approximated closed-form expression for SOP of the selected far user, respectively. Additionally, we propose the descent-based search method to find the optimal values of the power allocation coefficients that can minimize the total secrecy outage probability (TSOP). The developed analyses are corroborated through Monte Carlo simulation. Comparisons with the random-near-user random-far-user (RNRF) scheme are performed and show that the proposed scheme significantly improves the secrecy performance.

1. Introduction

To support the 5G-and-beyond-5G communication networks, called future communication networks, nonorthogonal multiple access (NOMA) has been considered as a solution to increase the spectral efficiency by superposing multiple users in resource domain (e.g., time and frequency) [13]. More specifically, the downlink scenario of the multitwo user NOMA networks consisting of one base station, a near user (that has strong channel state information (CSI)), and a far user (that has low CSI) is actively considered. The base station simultaneously transmits message to both users using the superposition coding; then the transmit power of the far user message is allocated more than that of the near user message. Under the NOMA scenario, the near user first subtracts the far user message using the successive interference cancellation (SIC) technique [4]; after that the near user decodes its own message. Different from the near user, the far user directly decodes its own message from the received signal without the interference elimination process since the far user message has allocated higher transmit power than that of the near user message.

The NOMA system can allocate the multiple information on the transmit signal using the superposition coding. Thus, the NOMA system has an advantage in terms of spectrum efficiency compared to that of the OMA system [57]. However, this point is a disadvantage in terms of the security [8, 9]. For example, if the eavesdropper succeeds in the interception of one NOMA signal, then the eavesdropper can obtain multiple user information [10]. Thus, the security issue is more important in the NOMA system. Physical layer security (PLS) is one of the possible solutions against the attack of the malicious user. More specifically, from the information-theoretical aspect, the message can be confidentially transmitted if the main channel (between legitimate users) and the eavesdropper channel (between a legitimate user and an eavesdropper) can be controlled so that the legitimate user can decode the received message successfully while the eavesdropper is not able to decode their intercepted message [11]. It is shown that PLS is on the cutting edge of the technique of security in wireless communication to prevent eavesdropping attacks [1214].

In PLS, the secrecy outage probability is defined as the probability that the achievable system secrecy capacity of the near/far user drops below a predefined target secrecy rate as in [15]. From the secrecy outage probability, we can measure the degree of security on the system. For example, the low secrecy outage probability system means that the system is more robust compared to that of the high secrecy outage probability system in the viewpoints of security. To improve the PLS performance, the CSI-based opportunistic scheduling [16], that is, the source (destination), communicates with one scheduled destination (source) in a certain resource block (e.g., time and frequency). It has been recognized as an attractive scheduling scheme [1719] since the time-varying nature of wireless channels is exploited. Thus, opportunistic scheduling is expected as one of techniques to enhance the secrecy performance on NOMA system.

Indeed, the authors of [20] studied the security performance of single-input-single-output (SISO) NOMA system. The authors confirmed that the secrecy sum rate of SISO NOMA system has better performance than that of the OMA system. Liu [21] compared the multiple-input-multiple-output (MIMO) NOMA system and MIMO OMA system. Additionally, the authors proved that MIMO NOMA system is better than MIMO OMA system in terms of sum channel capacity. In [22], the authors proposed the transmit antenna selection (TAS) scheme to improve the secrecy performance for downlink multiple-input-single-output (MISO) NOMA system. The first proposed antenna selection scheme is the optimal antenna selection scheme for near user and far user, respectively, while the second proposed antenna selection scheme is the suboptimal antenna selection scheme for the main channel performance of the near user and far user, respectively. The authors of [23] addressed the PLS of large-scale NOMA system. This network consisted of the multiple-antenna base station; the legitimate users were uniformly distributed within a disc, and the eavesdroppers were distributed in an infinite two-dimensional plane via a homogeneous Poisson point process (PPP). The authors derived new exact and asymptotic analyses for the secrecy outage probability (SOP). Li [24] optimized the secure beamforming and power allocation design on the MISO NOMA system. From the numerical results, the authors demonstrated that their proposed scheme outperformed that of the conventional OMA system. The authors of [25] designed a secure NOMA system under secrecy constraints where a transmitter sends a signal to multiusers in the presence of an eavesdropper. The authors minimized the total transmit power subject to the QoS and secrecy constraints. The authors of [26] exploited the artificial-noise-aided secure transmission for NOMA full-duplex relay network. The authors proposed the novel joint NOMA and artificial-noise-aided full-duplex relay (NOMA-ANFDR) scheme to enhance the physical security. Specifically, this paper derived the SOP and secrecy throughput. The NOMA-ANFDR outperformed the joint NOMA and artificial-noise half-duplex relay (NOMA-ANHDR) scheme.

Very recently, in [8], the authors proposed the cooperative NOMA system to enhance PLS performance. The authors considered the NOMA system including a base station, two users (near user and far user), a relay, and an eavesdropper. The authors derived the closed-form and asymptotic analysis for security outage probability and strictly positive secrecy capacity, respectively. The authors of [27] designed a secure massive NOMA system with multiclusters. The authors studied the interuser interference in the designed NOMA system and proposed the power control and power allocation algorithm for maximizing the secrecy capacity. In [28], the authors studied the security impact in the multiuser visible lighting communication (VLC) [29] with NOMA system. The authors considered both single eavesdropper and multiple eavesdroppers scenarios when the one transmitter communicates with multiple users. The authors derived the exact secrecy outage probability in this network. The author in [30] proposed the relay-supported cooperative NOMA system. The proposed system helped to transmit data using the multiple antenna equipped with relay. In a certain time block, this system selected the transmitted antenna in the relay based on the legitimate channel state information. The authors derived the exact closed-form expression in the proposed system. Lei [31] proposed the NOMA system consisting of multiple-antenna base station, multidestinations equipped with multiple antennas, and multieavesdroppers equipped with multiple antennas. Then, the authors proposed and analyzed the max-min based transmit antenna selection scheme when the eavesdroppers work independently or collude.

In the related works, the authors proposed the several schemes to improve the PLS performance. However, the opportunistic scheduling in the multitwo user NOMA network was not considered in the literature. Thus, in this paper, we propose a new users selection scheme to improve the PLS performance in downlink multitwo user NOMA system using the opportunistic scheduling in the presence of one eavesdropper. Compared with the aforementioned works, the main contribution and feature of this paper can be summarized as follows.(i)In this paper, we propose a new near/far user selection scheme on the multiple-two user NOMA system. The proposed scheme, denoted by best-secure-near-user best-secure-far-user (BSNBSF) scheme, aims to select the best near-far user pairs, whose data transmission is the most robust combat against the eavesdropper’s attack. More specifically, in a certain resource block, we take into account the main/eavesdropper channel state information to select the received user pairs.(ii)We drive novel expressions for the selected user pairs, respectively, to estimate the secrecy performance achieved by the proposed scheme. The analyses are not reported in the literature. More specifically, for the selected near user case, we derive an exact closed-form expression on the SOP, whereas, for the selected far user case, we obtain a tight approximated closed-form expression on the SOP, respectively.(iii)We present other results, called the asymptotic SOP, for the proposed scheme. These expressions provide the insight into the behavior of the average far user channel power gain ().(iv)We conduct the optimal analysis of the power allocation coefficient (). More specifically, the proposed optimal analysis finds the optimal power allocation coefficient value to make the total SOP minimum on the proposed system based on the descent method.(v)Through the numerical results, we demonstrate that the BSNBSF scheme significantly enhances the secrecy performance on the multitwo user NOMA system compared to that of the benchmarked scheme. More specifically, in the case of the SOP for the selected near user, the floor occurs and the selected far user shows the convex pattern as a function of the transmit SNR. Additionally, the secrecy sum throughput of the BSNBSF scheme shows better performance than that of the RNRF scheme.

The rest of this paper is organized as follows. In Section 2, the proposed system model and user pair selection scheme are described. Section 3 investigates the closed-form and asymptotic analyses of the multitwo user NOMA systems. Section 4 presents the optimal analysis of the power allocation coefficients. Section 5 presents some illustrative numerical results based on the insightful discussion. Monte Carlo simulations are shown to corroborate the proposed analyses. Finally, Section 6 concludes the paper.

Notations:   denotes a circularly symmetric complex Gaussian random variable with zero mean and variance ; is the probability; and represent the probability density function (PDF) and cumulative distribution function (CDF) of the random variable , respectively.

2. System Model

Let us consider a downlink multitwo user NOMA system including a base station (), a set of near users, , and a set of far users, , and an eavesdropper (), as shown in Figure 1. More specifically, the near users can perfectly use the SIC technique to subtract the far [22]. Both the legitimate and the illegitimate receivers are equipped with a single antenna and operate in half-duplex mode. In this paper, and , where , , present the channel coefficient and the corresponding channel gain of , respectively. Assuming that all wireless channels exhibit Rayleigh block fading channel, can be modeled as independent and identically distributed (i.i.d.) complex Gaussian random variable with zero mean and variance . Thus, the corresponding channel gain, , is an exponential random variable with probability density function (PDF), = , if ; otherwise, = 0 as in [3234]. More specifically, the average channel gain can be written as , where is the reference signal power attenuation, denotes the distance between and , presents the reference distance, and is the path-loss exponent [33]. And the channel noise is followed by . We also assume that the source perfectly knows the channel state information (CSI) of all legitimate users and eavesdropper, as in [11, 35].

2.1. Communication Process

In this subsection, we present in detail the communication process in two-user NOMA system. Assuming that and are selected to receive its data from the in a certain time slot. From the principle of NOMA, the messages and that will be allocated to and , respectively, are superposed as and then broadcasted by , where and denote the power allocation coefficients. We suppose that , and set and as in [21].

At the near user, the received signal is given bywhere denotes the transmit power of the . Because of the power allocation coefficient condition, the near user needs to subtract the component, , from the using the SIC process [36]. The signal-to-interference-plus-noise-ratio (SINR) of the eliminated component, , is expressed asAfter the SIC process, the archives its own message, , from the received signal in which signal-to-noise-ratio (SNR) is obtained as

At the far user, the received signal is given byDifferent from the near user, the directly decodes the SINR from the received signal because of the power allocation coefficient condition. The received SINR at to decode is given by

Meanwhile, the eavesdropper can intercept the signal due to the broadcast nature of wireless medium. Thus, the received signal at can be written asDifferent from the legitimate user, we assume that the has enough ability to distinguish each message from the received signal. Thus, the SINRs of the received signal are given byandrespectively.

In physical-layer security, the secrecy capacity means the difference between main channel capacity and eavesdropper channel capacity. Thus, in two-user NOMA system, the secrecy capacities of and are given by [22, 37]respectively, where .

2.2. The Proposed Best-Secure-Near-User Best-Secure-Far-User (BSNBSF) Scheme

The proposed user selection process is conducted through the channel state information (CSI) estimation/calculation system. Thus, this process is carried out before the data communication process as in [11, 35]. In this paper, we propose the BSNBSF user selection scheme to maximize the secrecy capacity at and , respectively. The proposed scheme can be mathematically expressed asand(11) and (12) mean that the selected users are the best secrecy capacity of a certain time slot.

3. Secrecy Outage Performance Analysis

In this section, the performance investigation of the proposed user selection scheme in terms of secrecy outage probability (SOP) is presented. Because the wireless channels undergo i.i.d. Rayleigh fading, for the sake of notational convenience, we assume that , .

We also assume the all nodes have the same noise variance. Let present the transmit SNR as in [11, 22]. The SOP of a user can be defined as the probability that the instantaneous secrecy capacity of the user falls below a predefined target data rate [23]. Thus, the SOPs at and are obtained asandwhere and denote the target data rate at and , respectively.

3.1. The Exact Secrecy Outage Probability

At the selected near user, the SOP of can be expressed asBecause all wireless channels are assumed to be independent, (15) can be rewritten aswhere . As we can observe that the events of the probability in (16) are not mutually exclusive because they include the same components , therefore conditioning on = , the can be further expressed asSince the assumption that all wireless channels are identical, (17) can be further expressed asFor the sake of notational convenience, let ; in (18) can be rewritten asAfter some algebra manipulations, can be obtained asPlugging (20) into (18) and making use of the binomial theorem [38, Eq. ] in (18) can be further expressed asAfter some algebra manipulations and making use of the fact that [38, Eq. ], consequently, the exact closed-form expression for SOP of the selected near user can be obtained as

At the selected far user, the SOP of can be expressed asSimilar to the case of the selected near user, all wireless channels are independent and identical. And the events of the probability in (24) are not mutually exclusive because they include the same components . Therefore, conditioning on = , (24) can be further expressed as

In order to further simplify the integral (25), the following lemma enables us to characterize the SINR at far user and eavesdropper to decode .

Lemma 1. Suppose that ; the cumulative distribution function (CDF) and probability density function (PDF) can be expressed as andrespectively, where ; represents the average channel power gain.

Proof. The CDF of can be written as After some basic manipulations, (28) can be rewritten asif ; otherwise, . After some calculation steps, the PDF of can be obtained as presented in equation (27). This completes the proof of Lemma 1.

For the sake of notational convenience, let . After some algebra manipulations, since is a nonnegative random variable and constants are strictly positive constants, in (25) can be further obtained asBy plugging (27) and (30) into (25), since , the can be further expressed as

Similar to (20), we rely on the binomial theorem [38, eq. ]. Consequently, (31) can be further written asTo the best of the authors’ knowledge, it is very difficult to obtain the exact closed-form expression of (32). Thus, in this paper, we approximate (32) using Gaussian-Chebyshev quadrature [39, eq. ]. First, to utilize the Gaussian-Chebyshev quadrature, the range of (32) can be coordinated aswhere , , . Next, to approximate in (33), (33) can be transformed using the fact thatwhere , , and is the number of terms, respectively. Plugging (33) into (34), and after some manipulations, eventually, the tight approximated closed-form expression for SOP of the selected far user can be obtained as

3.2. The Asymptotic Analysis

In this subsection, we derive the asymptotic SOP in the high SINR regime, which is mathematically described as and [21, 40]. This expression gives insight into the behavior of the secrecy outage for high SINR. Using the Taylor’s series approximation of the term, that is, , and after some algebraic manipulations, the asymptotic SOP of the selected near user can be obtained asSimilar to the asymptotic SOP for the selected near user, the asymptotic SOP for selected far user can be expressed as

4. Optimal Analysis of the Power Allocation Coefficients

In this section, we carry out the optimal analysis of the power allocation coefficient . Specifically, using the descent algorithm [41], we propose a descent-based algorithm (Algorithm 1) for finding the optimal point of , denoted as , which results from the minimum value of the total secrecy outage probability (TSOP) as follows.

Input: system parameters such as , , , , , , , ; and the given optimization parameters
 such as step size, = , search length, =
Output:
(1) Assign iteration index to the initial:
(2) Choose a starting point of the searching optimal value:
(3) while do
(4) Update the searching optimal value: ,
(5) end while
(6) return

In our paper, the optimization algorithm is applied to obtain the optimal power allocation coefficient of that minimizes the TSOP. The process of the proposed optimization algorithm can be explained as follows.(i)At the starting point , we determine a descent direction satisfying , where presents the index of the iteration.(ii)We update the searching optimal value, that is, , where means the step size. If , we can obtain ; otherwise is optimal.(iii)As we can see, when is its optimal value, becomes the smallest value. Therefore, the iteration process of updating will be stopped when .

Please note that the proposed algorithm is operated on the system parameters collected through CSI estimation process before data transmission process.

5. Numerical Results

In this section, we present the representative numerical results to illustrate the achievable performance of the proposed scheme. Monte Carlo simulation results are generated to validate the developed analysis. In simulation setting, we assume that positions of the source , the cluster of near users, the cluster of far users, and the eavesdropper are randomly deployed satisfying some given distance constraints. Specifically, we set that the distance between and the cluster near users is m, the distance between and the cluster of far users is m, and the distance between and eavesdropper is m, respectively. It is noted that although multiple near or far users are located at the same location, their channel characteristics are different from one to another. The power allocation coefficients of the near user () and far user () are and , respectively. Additionally, the reference distance m, and power degradation at is (dB), the path-loss exponent .

Figure 2 presents the performance comparison of the BSNBSF scheme and random near user and random far user (RNRF) scheme, in which the number of the near users is 3, and the number of the far users is 3, respectively. As can be seen in Figure 2, the SOP of the BSNBSF scheme is lower than that of random selection scheme. The reason is that the proposed scheme considers the secrecy channel capacity to select the near user and far user, respectively. When the transmit power increases, the SOP of the selected near user is increased until it reaches a performance floor. Different from the case of the selected near user, the SOP of the selected far user is plotted as in convex pattern with respect to the transmit SNR.

Next, we investigate the TSOP of the proposed scheme and RNRF scheme, which can be mathematically defined as [23]Figure 3 illustrates the impact of the transmit SNR and the number of near and far users on the performance of the proposed scheduling scheme. As can be seen in Figure 3, increasing the number of near and far users does not improve the performance of the RNRF while the performance of the proposed scheme is improved when the number of the near and far users is higher. The reason is that the BSNBSF scheme exploits the difference in channel conditions between users to select the best near and far users pair.

In Figure 4, we plot the SOP as a function of the transmit SNR with different numbers of the near user and the far user, respectively. As can be observed in Figure 4, the SOP decreases when the number of the near user increases. The reason is that the security performance increases when more nodes take into account the data transmission. In contrast to the case of near user, when the number of the far user increases, the secrecy performance is impacted a little bit. One of possible reasons is that the channel condition of the far user is not so much stronger than that of near user. Thus, security performance does not have much effect on the number of far participants. Additionally, we can observe that the results of the asymptotic analysis tightly approximate the closed-form analysis as a function of the increase of average far user channel power gain.

Figure 5 illustrates the TSOP as a function of the distance between the base station and eavesdropper with different numbers of the near users and the far users. As can be seen in Figure 5, when the distance between the base station and eavesdropper increases, the TSOP decreases. The reason is that, when the distance between the base station and eavesdropper increases, it is difficult for the eavesdropper to intercept the information between the legitimate users. Additionally, we can observe that the proposed scheme has better secrecy performance than the benchmarked scheme with the same transmit power.

Figure 6 presents the TSOP as a function of the secrecy target data rate, (bps/Hz), with different numbers of the near users and the far users. As can be seen in Figure 6, the total secrecy outage probability increases when the secrecy target data rate increases. This means that if the base station is allowed to transmit with a higher secrecy data rate (in order to obtain higher secrecy throughput), the data transmission will be vulnerable to the eavesdropper.

We investigate the effect on power allocation mechanism on the secrecy performance of the proposed scheduling scheme as shown in Figure 7, where the total secrecy outage probability of the selected user pair is plotted as a function of the transmit power and power allocation coefficient of the near user, . It is noted that . As can be observed, the TSOP poses a complicated convex characteristic with respect to . More specifically, the total secrecy outage probability is a convex function with respect to when the transmit SNR is less than 30 dBm or greater than 45 dBm under our setting, while it is not a convex function when the transmit power is in the range from 30 dBm to 45 dBm. Hence, we apply the optimization algorithm for finding the minimum power allocation coefficient of the near user, , when the transmit SNR is less than 30 dBm.

Figure 8 illustrates the TSOP with different transmit SNR as a function of the power allocation coefficient of the near user, denoted as . When the transmit SNR increases, the TSOP decreases. Additionally, there is the optimal value of where the TSOP is minimum as presented in Figure 8. It is noted that the minimum TSOPs are obtained using the proposed descent-based search method.

Finally, we investigate the secrecy performance improvements of the proposed scheme in terms of the secrecy sum throughput as a function of the transmit SNR. The secrecy sum throughput can be defined as [42]As can be observed in Figure 9, comparing the proposed scheme with the RNRF scheme, the proposed scheme significantly improves the secrecy sum throughput. More specifically, when the number of the near and far users increases, the secrecy sum throughput increases. Different from the proposed scheme, the RNRF scheme does not affect the number of the near and far users. The reason is that, when the near and far users are selected in the proposed system, we consider the channel condition of the main channel and eavesdropper channel. However, the benchmarked scheme does not consider that condition to select the near and far users, respectively.

6. Conclusion

In this paper, we propose the opportunistic scheduling scheme to enhance the secrecy performance in multitwo user NOMA system. The proposed BSNBSF scheme aims to improve the physical layer security of the considered NOMA system. Specifically, the BSNBSF scheme selects the user pair by estimating both main channel and eavesdropper channel characteristics to select the most robust near and far users, respectively. The exact closed-form expression for the SOP of the selected near user and the tight approximated closed-form expression for the SOP of the selected far user are presented. In order to get more insightful results, the asymptotic results for the SOP of the selected near user and the selected far user are obtained. Moreover, we propose the optimization algorithm, called the descent-based search algorithm, to find the optimal value of that minimizes the TSOP when the transmit SNR is less than 35 dBm. The obtained results are verified by the computer simulation. From the numerical results, the proposed scheme provides better secrecy performance compared to that of the RNRF scheme. Additionally, the increasing number of participant near and/or far users improves the robustness of the BSNBSF scheme. The descent-based search algorithm has been proposed to find out the optimal value of that minimizes the secrecy performance. The BSNBSF scheme can also support better performance than the RNRF scheme in terms of the secrecy sum throughput.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Disclosure

This article is the extended version based on International Conference on Ubiquitous and Future Networks (ICUFN 2018), Prague, Czech Republic, July 2018 [43].

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (Grant no. 2016R1D1A1B03934898) and by the Leading Human Resource Training Program of Regional Neo Industry through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and future planning (Grant no. 2016H1D5A1910577).