 Research
 Open access
 Published:
On the performance of physical layer security in virtual fullduplex nonorthogonal multiple access system
EURASIP Journal on Wireless Communications and Networking volumeÂ 2021, ArticleÂ number:Â 137 (2021)
Abstract
This paper investigates physical layer security analysis of cooperative nonorthogonal multiple access (NOMA) communication system. A virtual fullduplex (VFD) relaying scheme with an untrusted amplifyandforward (AF) halfduplex (HD) relay and a trusted decodeandforward (DF) HD relay is used in this system to improve the spectral efficiency. In order to prevent the untrusted relay from eavesdropping, a simple and practical cooperative jamming scheme is designed to confuse the untrusted relay. The exact expressions of effective secrecy throughput (EST) for NOMA users and approximate expression of EST for nonNOMA user are derived. All theoretical results are validated by numerical simulations which demonstrate that the proposed VFDNOMA scheme is superior to existing HDNOMA scheme in cooperative system and jamming plays an important role for obtaining acceptable EST. In addition, simulation results shows that the best secrecy performance highly depends on the system parameters such as transmit powers and jamming signal power.
1 Introduction
As one of the promising key techniques of the fifthgeneration (5G) wireless networks, nonorthogonal multiple access (NOMA) has been applied in various areas [1, 2]. NOMA utilizes the power domain to achieve multiple access strategies, which is unlike the conventional orthogonal multiple access (OMA) structures. Since the NOMA technique exploits the new dimension of the power domain, it has the potential to be integrated with existing MA paradigms. On the other hand, the technique of cooperative transmission can form a virtual multipleinput multipleoutput (MIMO) scheme to process data cooperatively, which can enhance the communication reliability for the users who are in poor channel conditions. It is reasonable to integrate NOMA into relaying networks. The authors in [3] proposed a new cooperative NOMA scheme and analyzed the outage probability and diversity gain of the system.
In the above references, all the relays are in halfduplex (HD) mode which requires additional bandwidth or time slot and reduces spectral efficiency of the system because the relay isolates the transmit and receive signals in two orthogonal time slots or frequency channels. To avoid this issue, fullduplex (FD) is proposed as a promising technique for the next generation wireless systems, because it can double the spectrum efficiency by realizing transmission and reception on the same carrier frequency, simultaneously [4]. Two main types of FD relay techniques, namely FD amplifyandforward (AF) relaying and FD decodeandforward (DF) relaying, have been discussed in [5, 6]. The authors in [7] propose an energyefficient oriented algorithm for FD cooperative NOMA systems and demonstrate both significant energyefficient and throughput enhancements over the HD cooperative NOMA and the prefixed FD cooperative NOMA regime. However, the significant amount of selfinterference (SI) between transmitting and receiving radio frequency chains means that the performance of FD relay is degraded by the residual SI [8]. In [9], the authors provide a characterization of the distribution of the selfinterference before and after active cancellation mechanisms. In [10], the author analyzed the outage probability, ergodic rate and energy efficiency of FD user relaying with imperfect SI cancellation.
Alternatively, we may instead consider a distributed version of a FD system, called virtual FD (VFD), where a pair of HD relays receive and transmit signals successively to imitate the operation of FD relay. This idea inherits the benefits of the FD system, while each relay requires only a single antenna, and the physical separation between the two HD relays eliminates the SI problem perfectly [8]. The combination of NOMA and VFD will further improve the spectrum efficiency. In [11], the authors found that VFDNOMA system achieves a lower outage probability and a higher ergodic rate than the existing successive relaying OMA system and ideal FDNOMA system. However, secrecy transmission of VFD cooperative NOMA system still remains unexplored.
In future networks, the ubiquitous connectivity makes our privacy and secrecy expose to radio space. Security becomes a major concern when designing communication systems. Due to the broadcast nature of radio propagation, wireless communication is vulnerable to be eavesdropped [12]. In relayassisted NOMA networks, when the relay is untrusted, it may exploit these weaknesses to its benefit and behave as a passive eavesdropper who tries to listen in on an ongoing transmission [13]. Cooperative jamming has been become a promising technique to protect the transmission in untrusted relay OMA networks [14]. Authors in [15] describe the evolution of cooperative jamming transmission strategies from pointtopoint channels to multiple antenna systems, followed by generalizations to larger multiuser networks. Choi and Lee [16] proposed a new cooperative jamming technique for an AF relay network with multiple relays, and the simulation results showed that the network with the proposed technique provides lower secrecy outage probability than a conventional scheme. The internal jamming strategy is employed in [17], where the legitimate user is enlisted as a jammer to distract the untrusted relay and adopts SI cancellation to eliminate the jamming. Yuan et al. [18] analyzed cooperative NOMA scheme, where the source actively sends jamming signals, while the relay is forwarding, thereby enhancing the security of intended communication links. In [19], a twostage FD jamming scheme is proposed to ensure the secure transmission of cooperative NOMA users. Although beamforming of relay was designed in this paper to cancel the SI, when the estimation error of the channel state information (CSI) cannot be ignored, or the number of antennas at the relay is not enough to perform the beamforming, the residual selfinterference channel still has to be considered. In this case, VFDNOMA system is more practical because physical separation of relays eliminates the SI problem perfectly. But until now, there are few studies on the security performance of VFDNOMA system.
According to the above references, this paper studies the cooperative VFDNOMA transmission and investigated its secrecy performance with the presentence of an untrusted relay. The VFD system consists an untrusted AF relay and a trusted DF relay. Two users are served by the trusted relay using cooperative NOMA, and only one user is served by the untrusted relay because the untrusted relay is an eavesdropper. We assume that the untrusted relay can obtain messages of all users. A new cooperative jamming strategy is adopted to secure the transmission of untrusted relay link. The jamming signal transmitted by only one user is utilized to confuse the untrusted relay. The exact effective secrecy throughput (EST) expressions for NOMA users and approximate EST expression for nonNOMA user are derived, which shows that the jamming is indispensable for achieving nonzero EST. Our principal motivations and contributions are summarized as follows.

As mentioned above, the combination of NOMA and VFD can improve the frequency efficiency and eliminate the residual SI of FD relaying simultaneously, but when we use VFD in a NOMA system, a pair of relays must be employed to form a VFD system and one of the relays may be an eavesdropper. There is still a paucity of research contributions on investigating the security issues of NOMA in a VFD system, which is the motivation of this paper. In order to improve the spectral efficiency, eliminate the residual SI of FD relaying and prevent untrusted relay eavesdropping simultaneously, we integrate NOMA, VFD and untrusted relay together and introduce a VFD relaying NOMA scheme in this study. The application scenario of this study is that multiple relays with one antenna can be employed to forward information, but some relays have poor credibility and could be eavesdroppers. We assume that in VFD relay system, one relay is trusted and the other is untrusted. To guarantee the secure transmission, a new cooperative jamming strategy is adopted to distract the untrusted relay. It is differing from [20] where jamming is transmitted by both the two users and our scheme saves the jamming power.

The novelty of this study is that a novel cooperative jamming strategy is adopted to secure the untrusted relay VFDNOMA networks and the EST expressions are derived to obtain further insights into parameters on system performance, which shows that there exist the optimal values of source power, relay power and jamming power. These findings are of great theoretical value for practical secure communication.
The rest of this paper is organized as follows. In Sect.Â 2, we introduce the system model. The closedform expressions of EST are derived in Sect.Â 3. Numerical and simulations results are presented in Sect.Â 4, and conclusions are drawn in Sect.Â 5.
2 System model
As shown in Fig.Â 1, we consider a cooperative VFDNOMA system, which consists of a source (S), a trusted DF relay (R), an untrusted AF relay (E) and three users (m, n, p). m is close to n, but they are far away from p. We assume that there do not exist direct links between S and users. R and E are willing to help the transmission. R can forward the information for m and n using NOMA, but it cannot forward information for p because they are too far apart. E is closer to p than R and can forward the information for p. But E is untrusted and can be regarded as potential Eves, so there is risk of leaking information of all users to E. All nodes are configured with one antenna and operate in HD mode. The channels between any transmitter and receiver are assumed to experience independent block Rayleigh fading, and the additive white Gaussian noise of all links has a zero mean and equal variance \({N_0}\). The channel coefficients between nodes are known as follows: \({h_{SR}}\) denotes channel coefficient between S and R, \({h_{SE}}\) denotes channel coefficient between S and E, \({h_{RE}}\) denotes channel coefficient between R and E, \({h_{Sm}}\) denotes channel coefficient between R and m, \({h_{Sn}}\) denotes channel coefficient between R and n, \({h_{Ep}}\) and denotes channel coefficient between E and p. The channel power gains of those hops \({\left {{h_{SR}}} \right ^2}\), \({\left {{h_{SE}}} \right ^2}\), \({\left {{h_{RE}}} \right ^2}\), \({\left {{h_{Rm}}} \right ^2}\), \({\left {{h_{Rn}}} \right ^2}\)and \({\left {{h_{Ep}}} \right ^2}\) are assumed to be exponentially distribution, and the corresponding instantaneous signaltonoise ratios (SNRs) \({{{P_S}{{\left {{h_{SR}}} \right }^2}}/ {{N_0}}}\), \({{{P_S}{{\left {{h_{SE}}} \right }^2}}/ {{N_0}}}\), \({{{P_R}{{\left {{h_{RE}}} \right }^2}} / {{N_0}}}\), \({{{P_R}{{\left {{h_{Rm}}} \right }^2}} / {{N_0}}}\), \({{{P_R}{{\left {{h_{Rn}}} \right }^2}} / {{N_0}}}\) and \({{{P_E}{{\left {{h_{Ep}}} \right }^2}} / {{N_0}}}\) are also exponential random variables with parameters \({\lambda _1}\), \({\lambda _2}\), \({\lambda _3}\), \({\lambda _4}\), \({\lambda _5}\) and \({\lambda _6},\), respectively. \(P_S\), \(P_R\) and \(P_E\) are the transmission power at S, R and E, respectively. We also assume that without loss of generality, channel gains are sorted as \({\left {{h_{Rm}}} \right ^2} < {\left {{h_{Rn}}} \right ^2}\). The protocol of the VFDNOMA scheme is divided into three equal time slots which is stated as follows.
During the first time slot, S broadcasts a superimposed mixture
where \({x_m}\) and \({x_n}\) are the signals for m and n, respectively, and \({\text{E}}\left( {x_m^2} \right) = {\text{E}}\left( {x_n^2} \right) = 1.\) (\({\text{E}}\left( \cdot \right)\) denotes the expectation of a random variable.) Based on wellknown Wyner secrecy code theorem [21], \({x_m}\) and \({x_n}\) are coded as \(\left( {{\tau _{m,t}},{\tau _{m,s}}} \right)\) and \(\left( {{\tau _{n,t}},{\tau _{n,s}}} \right)\), respectively, where \({\tau _{m,t}}\) and \({\tau _{n,t}}\) are the codeword rates, and \({\tau _{m,s}}\) and \({\tau _{n,s}}\) are secrecy rates. \(a_m\) and \(a_n\) are the power split factors of signals \({x_m}\) and \({x_n}\), respectively. Note that \({a_m} + {a_n} = 1\) and \({a_m} > {a_n}\) according to the principle of NOMA. In order to reduce the risk of leaking the information of m and n to E, at the same time, p is chosen to transmit a jamming signal to confuse E which is shown in the first part of Fig.Â 1. The observations at R and E are given by
where \(n_R\) and \(n_E\) are the additive white Gaussian noises, \(x_0\) is the jamming signal, and \(P_I\) is the power of the received jamming at E. (The setting of \(P_I\) in our model is the same as [22]. We can also set an jamming transmission power at p and then consider the impacts of jamming power and jamming channel fading on the performance, but it will increase analysis complexity and we will discuss this setting in the future. In the numerical results part of this paper, we will investigate the impact of different values of \(P_I\) on the system performance.) As p and R are too far apart, there is no jamming signal in (2).
R is assumed to have the ability to apply successive interference cancellation (SIC). According to the principle of SIC, \(x_m\) is demodulated with the interference of \(x_n\), because \(x_m\) is allocated more power, and when \(x_m\) is demodulated successfully, \(x_n\) can be directly demodulated after subtracting the interference of \(x_m\) [23]. The received signaltointerferenceandnoise ratio (SINR) for decoding \(x_m\) at R can be written as
After R successfully demodulates the signal of m, the interference from m can be eliminated by SIC. The SINR for decoding \(x_n\) at R can be written as
We consider the worst case that E has the ability to apply SIC and can always eliminate the interference from \(x_m\) while demodulating \(x_n\). The SINRs of E wiretapping the message of m and n in first time slot can be written as
During the second time slot, R reencodes \(x_m\) and \(x_n\) and forwards it to m and n. The observations at m and n are given by
When m and n demodulate the message of m, the SINRs can be expressed as
After n successfully demodulates the signal of m, the received SINR at n to decode its own signal is
When R forwards the messages to m and n in this time slot, S transmits a new signal \({x_p}\) of p to E with transmission power of \(P_S\) at the same time. Based on Wyner secrecy code theorem, \(x_p\) is coded as \(\left( {{\tau _{p,t}},{\tau _{p,s}}} \right)\), where \({\tau _{p,t}}\) is the codeword rate and \({\tau _{p,s}}\) is secrecy rate. E can also receive the signal from R at this phase which is shown in the second part of Fig.Â 1. Similar to the first time slot, p also transmits the jamming signal \(x_0\) to E at this time slot. The observation at E is given by
With this SINR, E can wiretap the message of m, n and p. \(x_p\) is decoded first because it has the most power, then \(x_m\) is decoded, and \(x_n\) is decoded at the end. The SINRs of E wiretapping the messages in this time slot can be written as
We assume that \(x_0\) is known by m and n and the corresponding term related to the jamming signal can be eliminated in (8) and (9). (This is a common assumption in the jamming literature [24,25,26,27] where the predefined jamming signal can be generated by using some pseudorandom codes that are known to m and n but not available to the curious untrusted relay. Transmission of the jamming signal from p to m and n can be accomplished by implementing the destinationbased cooperative jamming technique.)
During the third time slot, E relays \({y_{E,2}}\) to p using AF protocol with amplifying coefficient \(G = \sqrt{{{{P_E}} / {\left( {{P_S}{{\left {{h_{SE}}} \right }^2} + {P_R}{{\left {{h_{RE}}} \right }^2} + {P_I} + {N_0}} \right) }}}\). The received signal at p can be written as
Following the principle of SIC, the jamming signal is demodulated and deducted from superposition signal by p completely, before it demodulates its intended messages. The SINR for p to decode its own message is given by
Remarks:
(1) From the above description of the proposed protocol, we can see that in order to complete a secure communication, R needs to decode twice and recode once, m and p need to decode once and n needs to decode twice. The computational complexity of the proposed protocol is not very high.
(2) In our protocol, the source is responsible for the algorithm design. As there are only two relays in our system, common training processes of individual channels from source to relay and then to destination can be used to acquire the required CSI [28,29,30]. In addition, we use jamming not encryption in our protocol and no routing is required, so there is no overhead other than training processes.
3 Security performance analysis
In this section, we adopt EST as the metric of secrecy performance which considers the reliability performance and secrecy performance holistically. The exact EST expressions of m and n and approximate EST expression of p are derived in the following parts. The EST of m is expressed as
where \(\Pr \left( \cdot \right)\) represents the probability that the expressions in brackets hold and \({\gamma _{E \rightarrow m}}\) is expressed as
(20) indicates that the SINR of E wiretapping the message of m is the maximum eavesdropping SINR of the first time slot and the second time slot. Substituting (4), (6), (10) and (15) into (19), we can obtain
where \({\theta _1} = {2^{3{\tau _{m,t}}}}  1\) and \({\theta _2} = {2^{3\left( {{\tau _{m,t}}  {\tau _{m,s}}} \right) }}  1\). Following the channel assumption previously, we can get
where \({\rho _I} = {{{P_I}} / {{N_0}}}\). We have to notice that \({a_m}  {\theta _1}{a_n} > 0\) must be satisfied, if not, \({\eta _m}\) will be zero. Submitting (22) into (19), we can get the closedform EST expression of m which can be written as
Similarly, the EST of n is expressed as
where \({\gamma _{E \rightarrow n}} = \max \left( {{\gamma _{E \rightarrow n,1}},{\gamma _{E \rightarrow n,2}}} \right)\). Similar to the analysis above, (24) can be expressed as
where \(g = \max \left( {\frac{{{\theta _1}}}{{\left( {{a_m}  {\theta _1}{a_n}} \right) }},\frac{{{\theta _3}}}{{{a_n}}}} \right)\), \({\theta _3} = {2^{3{\tau _{n,t}}}}  1\) and \({\theta _4} = {2^{3\left( {{\tau _{n,t}}  {\tau _{n,s}}} \right) }}  1\).
3.1 Approximate expression of p
The EST of p is expressed as
Before deriving the approximate expression of p, we set \(X = {{{P_S}{{\left {{h_{SE}}} \right }^2}} / {{N_0}}}\), \(Y = {{{P_E}{{\left {{h_{Ep}}} \right }^2}} / {{N_0}}}\) and \(Z = {{{P_R}{{\left {{h_{RE}}} \right }^2}} / {{N_0}}}\). According to (14) and (18), (26) can be rewritten as
where \({\theta _5} = {2^{3{\tau _{p,t}}}}  1\) and \({\theta _6} = {2^{3\left( {{\tau _{p,t}}  {\tau _{p,s}}} \right) }}  1\). The first part in the brackets of (27) can be written as
We have to notice that \(Y  {\theta _5} > 0\) must be satisfied, if not, \({\eta _p}\) will be zero. The second part in the brackets of (27) can be written as
With (28) and (29), we can get the bounds of X and according to the bounds, \(\frac{{{\theta _5}\left( {Y + YZ + {\rho _I} + 1} \right) }}{{Y  {\theta _5}}} < {\theta _6}\left( {Z + {\rho _I} + 1} \right)\) must be satisfied which can be rewritten as
As \(\left( {\left( {{\theta _5}  {\theta _6}} \right) Y + {\theta _5}{\theta _6}} \right) > 0\) is always satisfied, we can get the bounds of Z as
It is noticed that \(\left( {{\theta _6}\left( {{\rho _I} + 1} \right)  {\theta _5}} \right) Y  \left( {{\theta _5}{\theta _6} + {\theta _5}} \right) \left( {{\rho _I} + 1} \right) > 0\) must be satisfied, if not, \({\eta _p}\) will be zero. Then, we can get the bounds of Y as
Compared (32) with the previous bound \(Y  {\theta _5} > 0\), we can easily get that (32) is the bond of Y. It is noticed that \({\theta _6}\left( {{\rho _I} + 1} \right)  {\theta _5} > 0\) must be satisfied in (32), or \({\eta _p} = 0\); this inequality holds easily when \({\rho _I}\) is large enough. Submitting the bounds expressions of (28), (29), (31) and (32) into (27), we can get the probability in (27) as
Following the channel assumption previously, we can get
When Y is large enough (in most cases, Y is very large because of the large jamming power), we can get \({{\left( {\left( {{\lambda _3} + {\lambda _2}{\theta _5}} \right) y  {\lambda _3}{\theta _5}} \right) } / {y  {\theta _5}}} \approx \left( {{\lambda _3} + {\lambda _2}{\theta _5}} \right)\) and \(\frac{{\left( {{\theta _6}\left( {{\rho _I} + 1} \right)  {\theta _5}} \right) y  \left( {{\theta _5}{\theta _6} + {\theta _5}} \right) \left( {{\rho _I} + 1} \right) }}{{\left( {{\theta _5}  {\theta _6}} \right) y + {\theta _5}{\theta _6}}} \approx {{\left( {{\theta _6}\left( {{\rho _I} + 1} \right)  {\theta _5}} \right) } / {\left( {{\theta _5}  {\theta _6}} \right) }}\). Thus, invoking those two approximations into (34) and with the help of [31, Equation (3.352.2)], (34) can be expressed as
where \({{\mathrm{Ei}}}\left( \cdot \right)\) denotes the exponential integral function [31, Equation (8.211. 2)]. Submitting (35) into (27), we can get the approximate EST expression of p which can be expressed as
4 Numerical results and discussion
In this section, computer simulations are performed to validate the above theoretical analysis. We introduce the channel model \({\text{E}}\left( {{{\left {{h_{ij}}} \right }^2}} \right) = d_{ij}^{  \alpha }\), where \({d_{ij}}\) is the distance between node i and j, and \(\alpha = 3\) is the path loss exponent. The other parameters are set as follows: \({d_{SR}} = 20\) m, \({d_{SE}} = 30\) m, \({d_{RE}} = 20\) m, \({d_{Rm}} = 40\) m, \({d_{Rn}} = 20\) m, \({d_{Ep}} = 40\) m, \({R_{m,t}}={R_{n,t}}=0.8\) bits/s/Hz, \({R_{p,t}}=0.4\) bits/s/Hz, \({R_{m,s}}={R_{n,s}}=0.4\) bits/s/Hz, \({R_{p,s}}=0.2\) bits/s/Hz, \({a_m}=9/10\), \({a_n}=1/10\) and \({N_0}=50\) dB.
FigureÂ 2 illustrates the performance of the proposed scheme and HDNOMA versus \(P_S\) with \({P_R} =  18\,{\text{dB}}\), \({P_I} = 24\,{\text{dB}}\) and \({P_E} = 15\,{\text{dB}}\). The HDNOMA system with two relays requires a total of 4 equal orthogonal time slots which is similar to [32]. The transmission detail of HDNOMA is shown in TableÂ 1. It can be observed that simulation and theoretical results match very well with each other for m and n and the approximate analysis for p is accurate because Y is very large in our setting which is very consistent with the actual communication scenario. Significantly, the EST of all users first increases and then decreases due to the increase of \(P_S\), which demonstrates that increasing \(P_S\) cannot always improve EST as high \(P_S\) increases the risk of eavesdropping. It also shows that there exists an optimal \(P_S\) of our scheme to maximize EST for all users and this optimal value can easily be obtained by a onedimensional exhaustive search. Compared with HDNOMA, the user p attains worse performance for any \(P_S\), but one time slot can be saved in our scheme and this performance gap narrows when the optimal value of \(P_S\) is obtained. In addition, our scheme outperforms HDNOMA for users m and n when \(P_S\) is small. All of the above statements illustrate the practical feasibility of our scheme.
FigureÂ 3 shows the EST of users versus \(P_R\) with \({P_S} =  6\,{\text{dB}}\), \({P_I} = 24\,{\text{dB}}\) and \({P_E} = 15\,{\text{dB}}\). For m and n of VFDNOMA, it is shown that the analytical curves perfectly match the Monte Carlo simulation results and EST of m and n first increases and then decreases as high \(P_R\) increases the risk of eavesdropping for both two schemes. The optimal value of \(P_R\) to maximize the EST of m and n can also easily be obtained by a onedimensional exhaustive search. For p, Fig.Â 3 confirms the close agreement between the simulation and approximate analytical results. We can also see that the performance of p in HDNOMA does not affect by \(P_R\), but the performance of p in our scheme decreases as \(P_R\) increases which is because \(P_R\) is considered as interference when E forwards the information of p. In addition, it is seen that when \(P_R\) is small, the change of \(P_R\) does not affect the performance of p in our scheme. Although the existing HDNOMA outperforms our protocol in some cases, our scheme can save one time slot and this performance gap is acceptable in actual communication scenario. Since the theoretical analyses agree well with the simulations, we will only plot the analytical results in the remaining figure.
FigureÂ 4 plots the performance of our scheme and HDNOMA versus \(P_I\) with \({P_S} =  6\,{\text{dB}}\), \({P_R} =  18\,{\text{dB}}\) and \({P_E} = 15\,{\text{dB}}\). We can observe that for m and n, increasing \(P_I\) can improve the EST, but 28dB is enough and no more power is needed. This result can help us saving interference signal power in actual communication scenario. We can also find that for p, increasing \(P_I\) cannot always improve EST as high \(P_I\) reduces the efficiency of the amplifier and the optimal value of \(P_I\) for p is basically the same as m and n.
5 Conclusion
In this paper, we studied the secrecy performance in VFDNOMA networks. A VFD relaying scheme with an untrusted AFHD relay and a trusted DFHD relay is used in this system to improve the spectral efficiency where cooperative jamming is designed to confuse the untrusted relay. The exact and approximate expressions for EST are derived which shows that jamming is necessary for secure transmission and the powers of S, R and jamming should be carefully considered to improve secrecy performance and save the system energy consumption. From the simulation results, we can see that the proposed VFDNOMA scheme is more practical than existing HDNOMA scheme. As future work, the imperfect SIC receiver and adaptive power split factors can be further investigated.
Availability of data and materials
Not available online. Please contact corresponding author for data requests.
Abbreviations
 NOMA:

Nonorthogonal multiple access
 VFD:

Virtual fullduplex
 AF:

Amplifyandforward
 HD:

Halfduplex
 DF:

Decodeandforward
 EST:

Effective secrecy throughput
 OMA:

Orthogonal multiple access
 MIMO:

Multipleinput multipleoutput
 FD:

Fullduplex
 SI:

Selfinterference
 CSI:

Channel state information
 SNR:

Signaltonoise ratio
 SIC:

Successive interference cancellation
 SINR:

Signaltointerferenceplusnoise ratio
References
B. Selim, M.S. Alam, J.V.C. Evangelista, G. Kaddoum, B.L. Agba, NOMAbased IoT networks: impulsive noise effects and mitigation. IEEE Commun. Mag. 58, 69â€“75 (2020)
M.S. Ali, E. Hossain, D.I. Kim, Coordinated multipoint transmission in downlink multicell NOMA systems: models and spectral efficiency performance. IEEE Wirel. Commun. 25, 24â€“31 (2018)
Z. Ding, H. Dai, H.V. Poor, Relay selection for cooperative NOMA. IEEE Wirel. Commun. Lett. 5, 416â€“419 (2016)
X. Pei, H. Yu, M. Wen, S. Mumtaz, S.A. Otaibi, M. Guizani, NOMAbased coordinated direct and relay transmission with a halfduplex/fullduplex relay. IEEE Trans. Commun. 68, 6750â€“6760 (2020)
Q. Wang, Y. Dong, X. Xu, X. Tao, Outage probability of fullduplex AF relaying with processing delay and residual selfinterference. IEEE Commun. Lett. 19, 783â€“786 (2015)
T. Kwon, S. Lim, S. Choi, D. Hong, Optimal duplex mode for DF relay in terms of the outage probability. IEEE Trans. Veh. Technol. 59, 3628â€“3634 (2010)
Z. Wei, X. Zhu, S. Sun, J. Wang, L. Hanzo, Energyefficient fullduplex cooperative nonorthogonal multiple access. IEEE Trans. Veh. Technol. 67, 10123â€“10128 (2018)
J. Jose, P. Shaik, V. Bhatia, VFDNOMA under imperfect SIC and residual interRelay interference over generalized nakagamim fading channels. IEEE Commun. Lett. 25, 646â€“650 (2021)
M. Duarte, C. Dick, A. Sabharwal, Experimentdriven characterization of fullduplex wireless systems. IEEE Trans. Wirel. Commun. 11, 4296â€“4307 (2012)
X. Yue, Y. Liu, S. Kang, A. Nallanathan, Z. Ding, Exploiting full/half duplex user relaying in NOMA systems. IEEE Trans. Commun. 66, 560â€“575 (2017)
Q. Liau, C. Leow, Z. Ding, Amplifyandforward virtual fullduplex relayingbased cooperative NOMA. IEEE Wirel. Commun. Lett. 7, 464â€“467 (2018)
Y. Zou, J. Zhu, X. Wang, L. Hanzo, A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104, 1727â€“1765 (2016)
J.T. Lim, K. Lee, Y. Han, Secure communication with outdated channel state information via untrusted relay capable of energy harvesting. IEEE Trans. Veh. Technol. 69, 11323â€“11337 (2020)
A. Kuhestani, A. Mohammadi, P.L. Yeoh, Optimal power allocation and secrecy sum rate in twoway untrusted relaying networks with an external jammer. IEEE Trans. Commun. 66, 2671â€“2684 (2018)
M. Mukherjee, S.A.A. Fakoorian, J. Huang, A.L. Swindlehurst, Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16, 1550â€“1573 (2018)
Y. Choi, J.H. Lee, A new cooperative jamming technique for a twohop amplifyandforward relay network with an eavesdropper. IEEE Trans. Veh. Technol. 67, 12447â€“12451 (2018)
F. Ding, H. Wang, Y. Zhou, C. Zheng, Impact of relayâ€™s eavesdropping on untrusted amplifyandforward networks over Nakagamim fading. IEEE Wirel. Commun. Lett. 7, 102â€“105 (2018)
C. Yuan, X. Tao, N. Li, W. Ni, R. Liu, P. Zhang, Analysis on secrecy capacity of cooperative nonorthogonal multiple access with proactive jamming. IEEE Trans. Veh. Technol. 68, 2682â€“2696 (2019)
Y. Cao, N. Zhao, G. Pan, Y. Chen, L. Fan, M. Jin, M. Alouini, Secrecy analysis for cooperative NOMA networks with multiantenna fullduplex relay. IEEE Trans. Commun. 67, 5574â€“5587 (2019)
A. Arafa, W. Shin, M. Vaezi, H.V. Poor, Secure relaying in nonorthogonal multiple access: trusted and untrusted scenarios. IEEE Trans. Inf. Forensics Secur. 15, 1â€“29 (2018)
A.D. Wyner, The wiretap channel. Bell Syst. Tech. J. 54, 1355â€“1387 (1975)
Z. Xiang, W. Yang, G. Pan, Y. Cai, X. Sun, Secure transmission in nonorthogonal multiple access networks with an untrusted relay. IEEE Wirel. Commun. Lett. 8, 905â€“908 (2019)
Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, L. Hanzo, Enhancing the physical layer security of nonorthogonal multiple access in largescale networks. IEEE Trans. Wirel. Commun. 16, 1656â€“1672 (2017)
Z. Han, N. Marina, M. Debbah, A. Hjrungnes, Physical layer security game: interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wirel. Commun. Netw. 2009, 1â€“10 (2009)
D. Fang, N. Yang, M. Elkashlan, P.L. Yeoh, J. Yuan, Cooperative jamming protocols in two hop amplifyandforward wiretap channels, in Proceedings of IEEE International Conference on Communications (ICC), June 9â€“13 2013; Budapest, Hungary, pp. 2188â€“2192 (2013)
H. Zhang, H. Xing, J. Cheng, A. Nallanathan, V.C.M. Leung, Secure resource allocation for OFDMA twoway relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Ind. Informat. 12, 1714â€“1725 (2016)
R. Zhang, L. Song, Z. Han, B. Jiao, Physical layer security for twoway untrusted relaying with friendly jammers. IEEE Trans. Veh. Technol. 61, 3693â€“3704 (2012)
F. Gao, T. Cui, A. Nallanathan, Optimal training design for channel estimation in decodeandforward relay networks with individual and total power constraints. IEEE Trans. Signal Process. 56, 5937â€“5949 (2008)
S. Zhang, F. Gao, C. Pei, X. He, Segment training based individual channel estimation in oneway relay network with power allocation. IEEE Trans. Wirel. Commun. 12, 1300â€“1309 (2013)
G. Dou, X. He, R. Deng, J. Gao, Z. Cui, Individual channel estimation for AFbased relaying systems using inband pilots. IEEE Commun. Lett. 20, 2201â€“2204 (2016)
I. Gradshteyn, I. Ryzhik, Table of Integrals, Series and Products (Academic Press, San Diego, 1994)
J.B. Kim, I.H. Lee, Nonorthogonal multiple access in coordinated direct and relay transmission. IEEE Commun. Lett. 19, 2037â€“2040 (2015)
Acknowledgements
None.
Funding
None.
Author information
Authors and Affiliations
Contributions
WG proposed the system model, analyzed the performance and drafted the paper. YL participated in the simulations and helped to draft the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
Not applicable.
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Guo, W., Liu, Y. On the performance of physical layer security in virtual fullduplex nonorthogonal multiple access system. J Wireless Com Network 2021, 137 (2021). https://doi.org/10.1186/s1363802102009y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363802102009y