Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios

Ahmed Arafa, Wonjae Shin, Mojtaba Vaezi, H. Vincent Poor

Research output: Contribution to journalArticle

Abstract

A downlink single-input single-output non-orthogonal multiple access setting is considered, in which a base station (BS) is communicating with two legitimate users in two possible scenarios of unsecure environments: existence of an external eavesdropper and communicating through an untrusted relay. For the first scenario, a number of trusted cooperative half-duplex relays is employed to assist with the BS's transmission and secure its signals from the external eavesdropper. Various relaying schemes are proposed and analyzed for that matter: cooperative jamming, decode-and-forward, and amplify-and-forward. For each scheme, secure beamforming signals are devised at the relays to maximize the achievable secrecy rate regions. For the second scenario, with the untrusted relay, achievable secrecy rate regions are derived for two different relaying schemes, compress-and-forward and amplify-and-forward, under two different modes of operation. In the first mode, coined passive user mode, the users receive signals from both the BS and the untrusted relay and combine them to decode their messages. In the second mode, termed the active user mode, the users transmit a cooperative jamming signal simultaneously with the BS's transmission to further confuse the relay. Focusing on half-duplex nodes, the users cannot receive the BS's signal while jamming the relay, i.e., while being active, and rely only on the signals forwarded to them by the relay. It is shown that the best relaying scheme highly depends on the system parameters, in particular the distances between the nodes, and also on the part of the secrecy rate region at which the system is to operate.

Original languageEnglish (US)
Article number8691580
Pages (from-to)210-222
Number of pages13
JournalIEEE Transactions on Information Forensics and Security
Volume15
Issue number1
DOIs
StatePublished - Jan 1 2020

Fingerprint

Jamming
Base stations
Beamforming

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Keywords

  • Non-orthogonal multiple access
  • amplify-and-forward
  • compress-and-forward
  • cooperative jamming
  • decode-and-forward
  • physical layer security
  • trusted relays
  • untrusted relays

Cite this

@article{b47115930d0e4225acedbefc0d52ca3f,
title = "Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios",
abstract = "A downlink single-input single-output non-orthogonal multiple access setting is considered, in which a base station (BS) is communicating with two legitimate users in two possible scenarios of unsecure environments: existence of an external eavesdropper and communicating through an untrusted relay. For the first scenario, a number of trusted cooperative half-duplex relays is employed to assist with the BS's transmission and secure its signals from the external eavesdropper. Various relaying schemes are proposed and analyzed for that matter: cooperative jamming, decode-and-forward, and amplify-and-forward. For each scheme, secure beamforming signals are devised at the relays to maximize the achievable secrecy rate regions. For the second scenario, with the untrusted relay, achievable secrecy rate regions are derived for two different relaying schemes, compress-and-forward and amplify-and-forward, under two different modes of operation. In the first mode, coined passive user mode, the users receive signals from both the BS and the untrusted relay and combine them to decode their messages. In the second mode, termed the active user mode, the users transmit a cooperative jamming signal simultaneously with the BS's transmission to further confuse the relay. Focusing on half-duplex nodes, the users cannot receive the BS's signal while jamming the relay, i.e., while being active, and rely only on the signals forwarded to them by the relay. It is shown that the best relaying scheme highly depends on the system parameters, in particular the distances between the nodes, and also on the part of the secrecy rate region at which the system is to operate.",
keywords = "Non-orthogonal multiple access, amplify-and-forward, compress-and-forward, cooperative jamming, decode-and-forward, physical layer security, trusted relays, untrusted relays",
author = "Ahmed Arafa and Wonjae Shin and Mojtaba Vaezi and Poor, {H. Vincent}",
year = "2020",
month = "1",
day = "1",
doi = "https://doi.org/10.1109/TIFS.2019.2911162",
language = "English (US)",
volume = "15",
pages = "210--222",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "1",

}

Secure Relaying in Non-Orthogonal Multiple Access : Trusted and Untrusted Scenarios. / Arafa, Ahmed; Shin, Wonjae; Vaezi, Mojtaba; Poor, H. Vincent.

In: IEEE Transactions on Information Forensics and Security, Vol. 15, No. 1, 8691580, 01.01.2020, p. 210-222.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Secure Relaying in Non-Orthogonal Multiple Access

T2 - Trusted and Untrusted Scenarios

AU - Arafa, Ahmed

AU - Shin, Wonjae

AU - Vaezi, Mojtaba

AU - Poor, H. Vincent

PY - 2020/1/1

Y1 - 2020/1/1

N2 - A downlink single-input single-output non-orthogonal multiple access setting is considered, in which a base station (BS) is communicating with two legitimate users in two possible scenarios of unsecure environments: existence of an external eavesdropper and communicating through an untrusted relay. For the first scenario, a number of trusted cooperative half-duplex relays is employed to assist with the BS's transmission and secure its signals from the external eavesdropper. Various relaying schemes are proposed and analyzed for that matter: cooperative jamming, decode-and-forward, and amplify-and-forward. For each scheme, secure beamforming signals are devised at the relays to maximize the achievable secrecy rate regions. For the second scenario, with the untrusted relay, achievable secrecy rate regions are derived for two different relaying schemes, compress-and-forward and amplify-and-forward, under two different modes of operation. In the first mode, coined passive user mode, the users receive signals from both the BS and the untrusted relay and combine them to decode their messages. In the second mode, termed the active user mode, the users transmit a cooperative jamming signal simultaneously with the BS's transmission to further confuse the relay. Focusing on half-duplex nodes, the users cannot receive the BS's signal while jamming the relay, i.e., while being active, and rely only on the signals forwarded to them by the relay. It is shown that the best relaying scheme highly depends on the system parameters, in particular the distances between the nodes, and also on the part of the secrecy rate region at which the system is to operate.

AB - A downlink single-input single-output non-orthogonal multiple access setting is considered, in which a base station (BS) is communicating with two legitimate users in two possible scenarios of unsecure environments: existence of an external eavesdropper and communicating through an untrusted relay. For the first scenario, a number of trusted cooperative half-duplex relays is employed to assist with the BS's transmission and secure its signals from the external eavesdropper. Various relaying schemes are proposed and analyzed for that matter: cooperative jamming, decode-and-forward, and amplify-and-forward. For each scheme, secure beamforming signals are devised at the relays to maximize the achievable secrecy rate regions. For the second scenario, with the untrusted relay, achievable secrecy rate regions are derived for two different relaying schemes, compress-and-forward and amplify-and-forward, under two different modes of operation. In the first mode, coined passive user mode, the users receive signals from both the BS and the untrusted relay and combine them to decode their messages. In the second mode, termed the active user mode, the users transmit a cooperative jamming signal simultaneously with the BS's transmission to further confuse the relay. Focusing on half-duplex nodes, the users cannot receive the BS's signal while jamming the relay, i.e., while being active, and rely only on the signals forwarded to them by the relay. It is shown that the best relaying scheme highly depends on the system parameters, in particular the distances between the nodes, and also on the part of the secrecy rate region at which the system is to operate.

KW - Non-orthogonal multiple access

KW - amplify-and-forward

KW - compress-and-forward

KW - cooperative jamming

KW - decode-and-forward

KW - physical layer security

KW - trusted relays

KW - untrusted relays

UR - http://www.scopus.com/inward/record.url?scp=85072156830&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85072156830&partnerID=8YFLogxK

U2 - https://doi.org/10.1109/TIFS.2019.2911162

DO - https://doi.org/10.1109/TIFS.2019.2911162

M3 - Article

VL - 15

SP - 210

EP - 222

JO - IEEE Transactions on Information Forensics and Security

JF - IEEE Transactions on Information Forensics and Security

SN - 1556-6013

IS - 1

M1 - 8691580

ER -