TY - GEN
T1 - Full-duplex relay assisted secure transmission for NOMA networks
AU - Cao, Yang
AU - Tang, Jie
AU - Zhao, Nan
AU - Chen, Yunfei
AU - Zhang, Xiu Yin
AU - Jin, Minglu
AU - Alouini, Mohamed-Slim
N1 - KAUST Repository Item: Exported on 2020-10-01
Acknowledgements: This research was supported by the National Natural Science Foundation of China (NSFC) under Grant 61871065. The journal version of this paper will be published in [1]
PY - 2019/10/4
Y1 - 2019/10/4
N2 - In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of cell-edge users cannot be guaranteed. On the other hand, the presence of eavesdroppers can severely threaten the secure transmission. Thus, a two-user NOMA system assisted by a multi-antenna decode-and-forward (DF) relay is considered in this paper, and a two-stage jamming scheme, FDJam, is proposed to ensure the secure transmission of NOMA users. In the FDJam scheme, using full-duplex (FD), the relay transmits the jamming signal to the eavesdropper while receiving confidential messages in the first stage, and the base station (BS) generates the jamming signal in the second stage. Furthermore, we eliminate the self-interference and the jamming signal at the relay and the legitimate node, respectively, through relay beamforming. To measure the secrecy performance, analytical expressions for secrecy outage probability (SOP) are derived. Simulation results are presented to show the effectiveness of the proposed scheme.
AB - In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of cell-edge users cannot be guaranteed. On the other hand, the presence of eavesdroppers can severely threaten the secure transmission. Thus, a two-user NOMA system assisted by a multi-antenna decode-and-forward (DF) relay is considered in this paper, and a two-stage jamming scheme, FDJam, is proposed to ensure the secure transmission of NOMA users. In the FDJam scheme, using full-duplex (FD), the relay transmits the jamming signal to the eavesdropper while receiving confidential messages in the first stage, and the base station (BS) generates the jamming signal in the second stage. Furthermore, we eliminate the self-interference and the jamming signal at the relay and the legitimate node, respectively, through relay beamforming. To measure the secrecy performance, analytical expressions for secrecy outage probability (SOP) are derived. Simulation results are presented to show the effectiveness of the proposed scheme.
UR - http://hdl.handle.net/10754/660605
UR - https://ieeexplore.ieee.org/document/8855860/
UR - http://www.scopus.com/inward/record.url?scp=85074098388&partnerID=8YFLogxK
U2 - 10.1109/ICCChina.2019.8855860
DO - 10.1109/ICCChina.2019.8855860
M3 - Conference contribution
SN - 9781728107325
SP - 596
EP - 601
BT - 2019 IEEE/CIC International Conference on Communications in China (ICCC)
PB - IEEE
ER -