A SECURE NOMA METHOD BASED ON PHYSICAL LAYER SECURITY

20240063849 · 2024-02-22

    Inventors

    Cpc classification

    International classification

    Abstract

    Disclosed is a secure scheme that incorporates both internal and external eavesdroppers to secure all users' links in the downlink PD-NOMA. In particular, the proposed scheme implies that the BS induces a phase shift in each user's symbol based on its corresponding instantaneous channel phase. The phase shift of each user is restricted such that the original symbol is moved to the location of another symbol in the constellation diagram. Therefore, as each user is aware of its instantaneous channel phase only, it will be able to recover the actual phase of its corresponding symbol. Thus, the proposed scheme does not only protect the data against eavesdroppers, but it also guarantees confidentiality and privacy against all other users.

    Claims

    1. A secure downlink NOMA method against an unknown internal eavesdropper, comprising: assigning different power levels for each user by a base station based on users' channel conditions, inducing a phase shift on each modulated symbol, merging and sending the superposed signal to the users from the base station, each user performs successive interference cancellation by detecting the other users' symbols starting with the first user until reaching its symbol by subtracting the detected symbol from the received signal at each iteration and carrying the resulting signal to the next iteration, and performing a phase shift to detect the confidential signal.

    2. The method according to claim 1, wherein the base station extracts a specific phase shift for each particular user that will be used to rotate its corresponding symbol.

    3. The method according to claim 2, wherein the phase shift on the symbol of user n, denoted by .sub.n, is given as n = ( [ n 2 / M ] + 1 ) 2 M wherein .sub.n the phase of h.sub.n, and M is the modulation level.

    4. A secure uplink massive machine type communication NOMA method against an external eavesdropper, comprising: each user modulates their symbol to be delivered to a base station, shifting each symbol by a phase value, transmitting user signals according to allocated power to the base station, receiving signals from all the users simultaneously at the base station, detecting the signal of the strongest user and applying a phase shifter to demodulate the strongest user signal, applying iterative successive interference cancellation to detect the rest user signals, and applying a phase shift until detecting all user signals.

    5. The method according to claim 4, wherein the phase shift value on the symbol of user n, denoted by .sub.n, is given as n = ( [ n 2 / M ] + 1 ) 2 M wherein .sub.n is the phase of h.sub.n, and M is the modulation level.

    Description

    BRIEF DESCRIPTION OF THE FIGURES

    [0021] FIG. 1 shows the flowchart of the secure downlink NOMA method against an unknown internal eavesdropper.

    [0022] FIG. 2 shows the flowchart of the secure uplink mMTC-NOMA method against the external eavesdropper.

    DETAILED DESCRIPTION

    [0023] In this invention, a novel secure Non-Orthogonal Multiple Access (NOMA) scheme based on physical layer security concepts is proposed. The proposed scheme exploits the random and independent channel characteristics to induce a different phase shift in each users symbol. Based on the assumption that the instantaneous channel phase between a user and the base station is available only at both ends, other users will not be able to decode the right symbol. The proposed scheme does not impact the performance at users' ends, and at the same time, can guarantee data confidentiality of each user against both internal and external eavesdropping.

    [0024] In the first scenario, a secure downlink NOMA system against an unknown internal eavesdropper is proposed. In the BS, each user signal is modulated to be delivered.

    [0025] Then, different power levels for each user is assigned based on its channel conditions, where the best user (usually the nearest) is allocated the lowest power level, and the highest power level is allocated to the worst user (usually the farthest). Denoting the power coefficient of user n by .sub.n, the allocated power coefficients should satisfy:

    [00001] .Math. n = 1 N n = 1 , and 1 < 2 < .Math. < n . ( 1 )

    [0026] Based on the proposed scheme, the BS induces a phase shift on each symbol before merging the transmitted symbols. Specifically, the BS will exploit its knowledge of the CSI of all users in order to extract a specific phase shift for each particular user that will be used to rotate its corresponding symbol. However, the challenge in NOMA systems is that the BER at a user mainly relies on its ability to correctly detect the other users' symbols. As such, the induced phase shift on a user should be carefully selected not to affect other users' performance.

    [0027] Being a complex value, block fading channel h.sub.n can be expressed as h.sub.n=j.sub.ne.sup.in, where j.sub.n and .sub.n represent the magnitude and the phase of h.sub.n, respectively, and i is the imaginary unit. Accordingly, the phase shift on the symbol of user n, denoted by .sub.n, is given as follows:

    [00002] n = ( [ n 2 / M ] + 1 ) 2 M . ( 2 )

    [0028] It should be noted the phase shift will rotate the corresponding symbol by a multiple of 2/M, and hence, it will appear as another symbol on the constellation diagram. Thus, users (other than the intended user) will detect it as one of the candidate symbols (constellation points), and only the intended user (that is aware of .sub.n) can recover the original phase of the symbol. FIG. 1 illustrates the proposed secure scheme for PD-NOMA systems.

    [0029] Following the proposed scheme, the received signal at the user n is now given by

    [00003] y n = P h n ( .Math. k = 1 N k e - i k S k ) + w n . ( 3 ) [0030] where w.sub.n is denote the additive white Gaussian noise (AWGN) with zero mean and .sup.2 variance w.sub.n, N(0, .sup.2) at the n.sup.th user's. Besides, all links are modeled by large-scale (path-loss) and small-scale fading

    [00004] h n = d n - n 2 f n

    where f.sub.n is modeled by the Rayleigh fading channel gain f.sub.nN(0, .sup.2). And do is the separation distance between the transmitter and the receiver n, and n is the path loss exponent.

    [0031] Accordingly, the SIC detection to accommodate the induced phase as:

    [00005] s ^ n = arg min l = 1 : M .Math. "\[LeftBracketingBar]" y n - P h n ( .Math. k = n + 1 N k s ^ k ) - P n h n e - i n S l .Math. "\[RightBracketingBar]" ( 4 )

    [0032] Each user performs SIC. SIC implies that each user performs an iterative maximum likelihood detection. Specifically, given the power levels order, user n detects the other users' symbols starting with the first user (i.e., user N) until reaching its symbol. At each iteration, the detected symbol is subtracted from the received signal, and the result is passed to the next iteration. This process allows a user to detect only the symbols of the users that have higher power coefficients than its coefficient. In other words, the user N signal is detected and subtracted from the received signal (y.sub.n) to find the user (N1) signal and these procedures are repeated until the indented user detects his signal.

    [0033] In the second scenario, a secure uplink mMTC-NOMA scheme against an external eavesdropper is defined. The mMTC refers to provide a massive connection between a large number of devices that transmit a small amount of data traffic like IoT applications, healthcare sensors, smart homes, etc. In up-link NOMA-based mMTC networks, multiple MTC devices (MTCDs) utilized the subchannel for transmission at the same time but with different power allocation. And each user allocated power due to their channel condition. Thus, the MTCD with the worst channel is allocated more power compare with the MTCD with better channel conditions. By assuming that the allocated power coefficients .sub.1>.sub.2> . . . >.sub.n due to the channel gain condition |h.sub.1|.sup.2<|h.sub.n|.sup.2< . . . <|h.sub.N|.sup.2.

    [0034] As shown in FIG. 2, each MTCD will shift own original phase of the symbol by the amount of phase determined in Eq. (2) then transmit the signal to the BS. the received signals at legitimate BS and Eve-BS will be:

    [00006] y d = .Math. k = 1 N h n n P n s n e - i k + w d , n ( 5 ) y e = .Math. k = 1 N g n P n s n e - i k + w e , n ( 6 )

    where w.sub.d,n and w.sub.e,n are denote the additive white Gaussian noise (AWGN) with zero mean and .sup.2 variance w.sub.d,n, w.sub.e,nN(0, .sup.2) between user n, legitimate BS, and Eve-BS, respectively. Besides, all links are modeled by large-scale (path-loss) and small-scale fading in such a way that h.sub.n and

    [00007] g n = d n - n 2 f n

    where f.sub.n is modeled by the Rayleigh fading channel gain f.sub.nN(0, .sup.2). And do is the separation distance between the MTCD and the BS, and n is the path loss exponent.

    [0035] Both legitimate BS and external eavesdropper exploit the SIC technology to decode the superposed received signals. SIC implies an iterative procedure where a BS first detects the signal of the strongest MTCD. Then subtracts this signal from the received signal until decode all MTCD receiver signals. At each iteration, the BS considers all other strong MTCD received signals as interference while weak MTCD received signals as noise. Since the CSI used to determine the phase shift (.sub.n) and secure the information is available only to the MTCDs and legitimate BS. The external eavesdropper will evaluate differently phase value

    [00008] n = ( [ n 2 / M ] + 1 ) 2 M

    wherein .sub.n, the phase of g.sub.n. Thus, the legitimate BS will correctly detect the information for each user while external eavesdropper will not.

    REFERENCES

    [0036] [1] N. Zhao, D. Li, M. Liu, Y. Cao, Y. Chen, Z. Ding, and X. Wang, Secure transmission via joint precoding optimization for downlink MISO NOMA, IEEE Trans. Veh. Tech., vol. 68, no. 8, pp. 7603-7615, 2019. [0037] [2] H. Bao, C. Zhang, L. Wu, and M. Li, Design of physical layer secure transmission scheme based on SWIPT NOMA systems, in IEEE ICCT, 2017, pp. 6-9. [0038] [3] B. Chen, Y. Chen, Y. Chen, Y. Cao, Z. Ding, N. Zhao, and X. Wang, Secure primary transmission assisted by a secondary full-duplex NOMA relay, IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 7214-7219, 2019. [0039] [4] Z. Qin, Y. Liu, Z. Ding, Y. Gao, and M. Elkashlan, Physical layer security for 5G non-orthogonal multiple access in large-scale networks, in IEEE ICC, 2016, pp. 1-6. [0040] [5] N. Rupasinghe, Y. Yapici, I. Guvenc, H. Dai, and A. Bhuyan, Enhancing physical layer security for NOMA transmission in mmWave drone networks, in 2018 52nd Asilomar Conference on Signals, Systems, and Computers. IEEE, 2018, pp. 729-733. [0041] [6] Y. Yapici, I. Guvenc, H. Dai, A. Bhuyan, and N. Rupasinghe, Physical layer security for mmwave drone links with noma. [0042] [7] Y. Yapici, N. Rupasinghe, I. Guvenc, H. Dai, and A. Bhuyan, \Physical layer security for noma transmission in mmwave drone networks, arXiv preprint arXiv:2001.04863, 2020. [0043] [8] G. Gomez, F. J. Martin-Vega, F. Javier Lopez-Martinez, Y. Liu, and M. Elkashlan, Physical layer security in uplink noma multi-antenna systems with randomly distributed eavesdroppers, IEEE Access, vol. 7, pp. 70422-70435, 2019. [0044] [9] H. Lei, J. Zhang, K.-H. Park, P. Xu, I. S. Ansari, G. Pan, B. Alomair, and M.-S. Alouini, On secure NOMA systems with transmit antenna selection schemes, IEEE Access, vol. 5, pp. 17450-17464, 2017. [0045] [10] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, Enhancing the physical layer security of nonorthogonal multiple access in large-scale networks, IEEE Trans. Wireless Comm., vol. 16, no. 3, pp. 1656-1672, 2017. [0046] [11] L. Lv, Z. Ding, Q. Ni, and J. Chen, Secure MISO-NOMA transmission with articial noise, IEEE Trans. Veh. Tech., vol. 67, no. 7, pp. 6700-6705, 2018. [0047] [12] Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin, Secure beamforming in downlink MISO nonorthogonal multiple access systems, IEEE Trans. Veh. Tech., vol. 66, no. 8, pp. 7563-7567, 2017. [0048] [13] B. M. ElHalawany and K. Wu, Physical-layer security of NOMA systems under untrusted users, in 2018 IEEE GLOBECOM, 2018, pp. 1-6. [0049] [14] Y. Cao, N. Zhao, Y. Chen, M. Jin, Z. Ding, Y. Li, and F. R. Yu, Secure transmission via beamforming optimization for NOMA networks, IEEE Wireless Comm., 2019. [0050] [15] B. M. ElHalawany and K. Wu, Physical-layer security of noma systems under untrusted users, in 2018 IEEE Global Communications Conference (GLOBECOM), 2018, pp. 1-6. [0051] [16] K. Cao, B. Wang, H. Ding, T. Li, and F. Gong, Optimal relay selection for secure noma systems under untrusted users, IEEE Transactions on Vehicular Technology, vol. 69, no. 2, pp. 1942-1955, 2020. [0052] [17] Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin, Secure beamforming in downlink miso nonorthogonal multiple access systems, IEEE Transactions on Vehicular Technology, vol. 66, no. 8, pp. 7563-7567, 2017. [0053] [18] K. Cao, B. Wang, H. Ding, T. Li, J. Tian, and F. Gong, Secure transmission designs for noma systems against internal and external eavesdropping, IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2930-2943, 2020. [0054] [19] R. M. Christopher and D. K. Borah, Physical layer security for weak user in miso noma using directional modulation (nomad), IEEE Communications Letters, vol. 24, no. 5, pp. 956-960, 2020.