1. Introduction
Any eavesdropper is able to disturb the signal easily due to the broadcasting environment of wireless communication. At the application layer (i.e., highest layer), encryption methodology using cryptography is conventionally implemented to assurance the secure information transmission. Nevertheless, to tackle with situation of speedy growth of computer networks, these procedures and secure keys become ineffective ways, especially in increasing computing capability [
1]. Additionally, great encounters in secure communications include the security of key transmission, the complexity of key management, and distribution [
2]. Consequently, physical layer security (PLS) is an effective way to fight eavesdropping and diminish the overhearing information and it is considered as an extra data fostering key encryption technology as in [
3,
4].
To provide a network access technique for the next generation of wireless communications, an emerging multiple access scheme, namely, non-orthogonal multiple access (NOMA) transmission was proposed in many works such as [
5]. The power domain and channel quality are acquired to exploit different performance of NOMA users regarding multiple access. As a main characterization, a significantly strengthened performance results from NOMA users with good channels, while relatively poor performance is seen in NOMA users with bad channel conditions [
6]. Combining NOMA with cooperative communication [
7,
8,
9], cooperative NOMA (C-NOMA) transmission scheme is proposed as a possible solution to generate a unique system in which users with better channel circumstances assist forwarding signal to distance users who are affected in situations of worse channels [
7,
10].
To achieve an advantage of the diversity related to wireless channels in relaying networks, a relay selection scheme has been broadly implemented and considered as improving the quality of the transmission [
11]. Especially, a relay network is introduced in some technical deployment snapshots of the IoT devices of SmartBridge, SmartDIMES, and SmartSenSysCalLab [
12]. Two policies in energy harvesting architecture inclusing time switching (TS) relaying, power splitting (PS) relaying are empoyed with NOMA and it is considered as suitable deployment of wireless powered IoT relay systems [
13]. In a practical scenario, main technologies for wireless communication systems (for example LTE) are required to deploy multiuser selection or scheduling schemes. In addition, the relay selection scheme under NOMA networks is introduced and analysed in recent works [
14,
15,
16]. A great improvement in the QoS of the system is resulted from a system model which combines cooperative relay and NOMA. In particular, a two-stage relay selection is proposed and derived with respect to closed-form expressions on outage probability and they are obtained in cooperative systems using decode-and-forward as in [
14]. The approximate and asymptotic expressions on average sum rate are examined as combining relay selection and amplify-and-forward (AF) assisted NOMA [
15]. Moreover, by analyzing the outage probability and its asymptotic results, a partial relay selection scheme is studied in [
16]. The fixed and adaptive power allocations (PAs) at the relays are introduced in cooperative NOMA to consider two optimal relay selection schemes, namely as the two-stage weighted-max-min (WMM) and max-weighted-harmonic-mean (MWHM) schemes [
17]. On the orther hand, to improve the performance in throughput and coverage, new model is exploited as combining the orthogonal frequency division multiple access (OFDMA) and cooperative multicast (CM) technology to perform the intra-cooperation of multicast group (MG) [
18]. In other systems, relay selection (RS) non-orthogonal multiple access (NOMA) is studied in terms of the diversity orders by deployment of RS schemes for full-duplex /half-duplex communications [
19].
Furthermore, power allocation and user scheduling are discussed as the other encounters in NOMA networks [
20]. To improve the NOMA’s performance, power distribution therein shows a major characterization affecting different user’s performance since certain power partitions which are allocated for multiple superposed users, and this topic fascinates a lot of study. For instance, fixed power allocation scheme is deploy to serve two NOMA users and its performance is evaluated by employing the closed-form expression of outage probability and ergodic sum-rate in [
21]. In addition, a general two-user power allocation algorithm is proposed by overcoming the drawbacks of fixed power distribution in NOMA network [
22]. On the other hand, fairness performance of NOMA network is resulted by varying power allocation factors as investigation in [
23]. While sum rate maximization and proportional fairness criteria under impact of the power allocation algorithms is studied for two user NOMA networks in [
24].
On the other hand, stochastic geometry networks are exploited regarding the physical layer security to apply to 5G NOMA networks in [
25]. To enhance the secrecy performance for single antenna and multiple-antenna stochastic geometry networks two dissimilar schemes were considered as extended work of [
25] and detailed contribution can be observed in [
26]. Furthermore, the optimal decoding order, power allocation and transmission rates are important metrics to evaluate and exhibit a new design of NOMA under secrecy considerations [
27]. A single-input single-output (SISO) system serving NOMA scheme was investigated in terms of secure performance in [
28]. In such system, optimal power allocation policy is proposed to highlight advantage of secrecy performance of NOMA compared with that in the conventional OMA [
28]. The authors in [
29] exploited physical layer security in downlink of NOMA systems [
29] and both the exact and asymptotic secrecy outage probability (SOP) were investigated to examine secure performance of the SISO and MISO NOMA systems. In other trend of research, two transmit antenna selection (TAS) schemes were proposed to perform secure performance evaluation in cooperative NOMA networks in [
30], and then the closed-form formula of the ergodic secrecy rate was achieved. To the best of the authors’ knowledge, there are few works related to the analysis of the physical layer security in relay selection NOMA systems. Thus, this is the main motivation of this work.
From the above analysis, it is worth noting that a few studies have considered the technical design of NOMA relaying architecture against the unwanted eavesdropper with appropriate secrecy. This paper aims to exploit the advantage of relay selection to improve system performance of IoT deploying NOMA. In particular, this motivates us to design secure NOMA schemes for the practical IoT scenario where the relay is selected to forward signal with enhanced performance at NOMA receivers. In this scenario, we use the secrecy probability to measure the secrecy performance of the system since the perfect secrecy rate is usually not obtained, and hence, it can not be evaluated as the secrecy metric. We highlight that the SOP and SPSC are appropriate secrecy metrics for security consideration in the NOMA systems.
The primary contributions of the paper are summarized as follows:
Targeting the secrecy outage constraint, we comprehensively study the design of NOMA-assisted IoT system against the external eavesdropper. The transmit signal to noise ratio (SNR) at the base station (BS), transmission rates, and power allocated factors to each user are considered as main parameters. These values need be determined in design of RS-NOMA. For the first time, we analytically prove that the relay selection provides improved secure performance at higher number of relay for RS-NOMA.
For Decode-and-Forward (DF) mode, we show that the outage behavior of RS- NOMA scheme is superior to that of OMA scheme in the specific SNR region. Furthermore, we confirm that the RS-NOMA scheme depends on how strong the eavesdropper channel is. In fact, SOP and SPSC of far user depend on the number of relay selected.
Both analytically and numerically, the exactness of derived expressions is verified and we compare the performance of the NOMA scheme with that of the OMA scheme in the studied problems with the secrecy outage constraint.
The remainder of this paper is organized as follows. In
Section 2, the system model is introduced. The detailed analysis in terms of SOP metric is proposed in
Section 3. In
Section 4, we derive an exact expression of SPSC in RS-NOMA.
Section 5 presents the benchmark of OMA scheme for further evaluation. Numerical results are presented in
Section 6. Concluding remarks are given in
Section 7.
The main notations of this paper are shown as follows: denotes expectation operation; and stand for the probability density function (PDF) and the cumulative distribution function (CDF) of a random variable X.
2. System Model of Secure Analysis for DF Relay Selection
Figure 1 represents the considered RS-NOMA assisted IoT system including a base station (BS), multiple relays (i.e.,
K relays), two main sensors (D1, strong user, and D2, poor user), and an eavesdropper (E) in an IoT network. In such a system model, the BS is located in the cell-center, strong user D1 and E are located near with the BS while the poor user D2 is very close to the cell-edge. In this situation, it is assumed that there is no direct links between BS and the poor user due to high obstructions or deep fading. However, quality of transmission from the BS to D2 will be improved by employing relay selection scheme. We further assume that single antenna is equipped at all nodes in the RS-NOMA network and each link employing channels associated with independent Rayleigh fading. As most expectations in the literature, it is assumed that E can acquire the signals transmitted from the BS.
The channel coefficients from the BS to relay and the eavesdropper are denoted by and , respectively. Next, the channel coefficient from the BS to near NOMA user is , while is denoted as channel coefficient between relay k and D2. These channels are normalized as Rayleigh fading channel. We assume the quasi-static block fading model adopted; it means the channel coefficients are kept constant during the transmission of one message, which includes a block of symbols, and adjust independently of one block to the next block. We call is transmit power at the BS, , are power allocation factors for two NOMA users and they satisfy . It is noted that , are simultaneous transmissions from the BS to serve two NOMA users D1, D2 respectively. In addition, we denote as Additive white Gaussian noise (AWGN) term at node U.
As a fundamental principle of RS-NOMA, the transmitter is enabled to simultaneously assist multiple users. To perform this task, the superposition coding (SC) is deployed in the transmitter to conduct a linear combination of multiple signals to serve the users. The composed signal
is transmitted from the BS to all relays and two NOMA users in the first phase, which is shown as
The received signal at D1 in the direct link is expressed by
Here, it is AWGN noise and variance of .
The received signal at
is given by
In this paper, it is assumed that users are not arranged by their channel conditions. Under such considered RS-NOMA scheme,
can be detected at user 1 before using successive interference cancellation (SIC) [
6]. Therefore, the received instantaneous signal-to-interference-noise ratio (SINR) of the user D1 can be given as SNR to detect
as
The SIC is carried out at D1 to remove the signal for D2, therefore the instantaneous rate for D1 detect the signal
is given by
where
.
In this situation, it is possible to apply fixed power allocation coefficients in two NOMA users in such relay selection mode. To improve the performance of the relay selection schemes, reasonable power optimization can be further studied, and this concern may be considered in our future work.
At relay,
can be detected before using SIC and as employing SIC,
will be regarded as interference eliminated before decoding signal
. It is assumed that these relays can not harm D1 and there is no detection on
. Firstly, the expression of SNR must be computed to decode
transmitted from the BS to relay as
At the cell-edge user, the received signal can be obtained at D2 from the relay as
Therefore, calculating SNR to detect
, which is transmitted in the second hop from the
kth relay to user D2, is given as
where
.
The received signal at D2 which forwarded by D1 is expressed as
The received SINR at D2 to get
for link is given by
Regarding computation of the received signal to interference plus noise ratio (SINRs) at the eavesdropper, here, we overestimate the eavesdropper’s capability. A worst-case assumption from the legitimate user’s perspective is made here. That is,
E is equipped capability of the multiuser detection. In more detailed consideration, user E performs parallel interference cancellation (PIC) to distinguish the superimposed mixture. In such a scenario, the eavesdropper knows the decoding order and the power allocation factors. Thus, we have to adopt the worst-case assumption from the legitimate user’s perspective due to the conservativeness mandated by the security studies. It is worth noting that this assumption has been adopted in previous work on the secrecy of NOMA systems [
25,
26]. It is shown that the received signal at
E is
Therefore, SNR is computed to overhear
at
E as
where
, Here, AWGN noise term at E has variance of
.
And then, SNR related to overhearing signal
at E is given by
In this RS-NOMA scheme, the best relay node is selected by the following criterion. Firstly, the end-to-end SNR following DF mode can be computed by [
31]
where
stands for SNR at the first hop from the BS transmitting signal to the
kth relay
.
The index
in group of relay in considered criteria is determined by
The secrecy capacity for D1 is obtained as
where
. It is worth noting that D2 employs Maximum ratio combining (MRC) principle to process mixture signal as existence of both D1-D2 link and Source-Selected Relay-D2 link. As a result, the secrecy capacity for D2 is obtained as [
16]
6. Numerical Results
In this section, we provide numerical examples to evaluate the secrecy performance of RS-NOMA under impact of eavesdropper based on two system metrics including SOP and SPSC. Specifically, we investigate these metrics by considering the effects of transmit SNR, fixed power allocation factors, the number of relays, channel gains.
As an important parameter of NOMA, the impact of different threshold rates on the SOP performance of user D1 is simulated in
Figure 2. The reason for such observation is that the threshold rate is the limited secure capacity as performing probability calculation. At high threshold rate, the performance gap between NOMA and OMA can be observed clearly. In addition, asymptotic evaluation shows that outage behavior is constant because such outage does not depend on
. This observation can be seen in the following experiments.
Another observation is that the impact of the number of relays selected to forward signal to user D2. As a further development,
Figure 3 plots the SOP of NOMA scheme versus a different number of relays. As observed from the figure, we can see that the higher number of selected relays also strongly affect secure performance of RS-NOMA scheme compared with small variations at OMA. The most important thing is that the RS-NOMA furnishes with
relay providing remarkable improvement in secure outage performance. This is due to the fact that there are more chances to achieve improved signal to serve far NOMA user. This observation confirms a role of relay selection to enhanced secure performance in the considered RS-NOMA.
Figure 4 plots the outage probability of RS-NOMA and OMA schemes versus SNR for simulation settings with
,
dB,
,
. Obviously, the outage probability curves match precisely with the Monte Carlo simulation results. In this observation, the performance gap between NOMA and OMA is small as changing channel gain of link S-D1. This is in contrast with
Figure 4, which shows larger a performance gap between NOMA and OMA for secure consideration at D2.
In
Figure 5, the SOP performance of the RS-NOMA and OMA schemes with different threshold rates at D2 are compared to provide an impact of the required rates on secure performance. We setup the main parameters as
,
dB,
. It can be seen from both figures that the proposed RS-NOMA scheme can remarkably enhance the secure performance compared to the OMA scheme. Performance gaps between NOMA and OMA can be seen clearly at higher threshold rate
.
In
Figure 6, we compare the secure performance for the RS-NOMA and OMA schemes with different strong levels of eavesdroppers. To perform the simulation, the required parameters are summarized as
,
,
. It can be evidently seen that SOP in the OMA is better than that in the RS-NOMA scheme. The main reason for this is that the cooperative NOMA network is sensitive to the relation between the target data rates and power allocation. In a similar trend, we see the performance gap at user D2 as in
Figure 7. In this situation, the simulated parameters are shown in this case as
,
,
. To provide more insights, the secure performance of the whole system needs be considered. In
Figure 8, the curves of SOP are illustrated to show performance gaps among these cases including User D1, User D2 and the whole NOMA system.
In
Figure 9, an optimal value of power allocation factor, i.e.,
can be checked by a numerical method. It can be confirmed that our derivation in an approximate manner is similar to numerical value obtained. This is the guideline for designing NOMA to achieve the lowest outage performance.
In
Figure 10, further simulation is performed for consideration at D1; the SPSC performance versus transmit SNR is presented. As can be seen, at lower SNR regime, SPSC performance between OMA and NOMA is similar. This observation will change at higher SNR. The strong characterization of eavesdropper leads to varying SPSC performance. As seen in other simulations, this result verifies the exactness of the analytical computations presented in the previous section.
In
Figure 11, the curves of SPSC versus transmit SNR at D2 are presented. As can be seen, the analytical results can match the simulations very well. Obviously, by varying channel gains of the eavesdropper, the SPSC will be changed. Meanwhile, the performance gap between OMA and NOMA in such SPSC is linear in the range of SNR from −20 dB to 5 dB and it does not exist if the SNR is greater than 10 dB. Like previous simulations, this result coincides with the analysis in analytical computations presented in the previous section.