 Research
 Open access
 Published:
Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system
EURASIP Journal on Wireless Communications and Networking volume 2021, Article number: 144 (2021)
Abstract
Aiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multiuser wiretap network, we propose a useraided cooperative nonorthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting (EH) technologybased SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation (SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise (AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve the above nonconvex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.
1 Introduction
Highspeed transmission rates of smart terminals in fifthgeneration (5G) wireless communication systems require vast spectrum resources [1, 2]. Traditional orthogonal multiple access (OMA) approaches are difficult to meet the needs of highspeed, realtime and widebandwidth in 5G. Researchers proposed NOMA technique, one of the key technologies of 5G, to provide higher spectral efficiency (SE) of multiple users. Keypoint of NOMA is multiple nonorthogonal access of power domain. Thus, multiple users can be served by the same resource block (time domain, frequency domain and code domain). However, due to mutual interference of nonorthogonal signal, the receiver has to use the SIC technique to extract desired information from received signal [3,4,5].
For the purpose of improving the performance of NOMA, the mode of effectively combining NOMA and cooperative technique has been attracted great attentions. The existing cooperative NOMA mainly can be divided into two types including the userassisted and the relayassisted. For example, J. Men and J. Ge explored the outage probability of the cooperative NOMA relay network by deriving a closedform expression [6]. A twostage relay selection scheme was presented to research the outage performance of the cooperative NOMA system in [7,8,9]. Z. Ding proposed a halfduplex useraided cooperative NOMA scheme to achieve the maximum diversity gain, and the simulation results indicate that the proposed cooperative NOMA scheme could improve the outage probability [10]. S. L. Talbot and B. FarhangBoroujeny presented a cooperative beamforming NOMA scheme which performed intrabeam superposition coding of a multiuser signal at the transmitter and the spatial filtering of interbeam interference followed by the intrabeam SIC at the destination [11].
In addition, energy efficiency (EE) is another concern of 5G. Since radio frequency (RF) signals can carry information and transmit energy simultaneously, they can be used not only for information vehicle but also for energy collection of the system. At present, a technology which can effectively extend the service life of energylimited device called SWIPT has been proposed [12]. Different from traditional EH technologies, such as solar and wind, SWIPT provides stable and controllable energy for wireless applications while transmitting the necessary information contained in RF signal. For this reason, there are many relevant studies on SWIPT that have been appeared in the recent several years. Early studies on SWIPT have assumed that the entire signal can transmit both information and energy, exposing a fundamental tradeoff between power and information transfer [13]. But this simultaneous transfer is unrealistic, since the EH operation employed in the RF domain destroys the information content. In order to practically achieve SWIPT, the received signal has to be allocated into two distinct parts, one for information decoding and another for EH [14]. Specifically, Zhang proposed two practical receiver architectures to handle the technical limitations of existing circuit designs, namely timeswitching (TS) receiver and PS receiver. If TS is performed, the receiver switches in time between EH and information decoding. In this case, signal allocating is employed in the time domain. So, the entire signal received in one time slot is used either for EH or information decoding. The TS scheme allows for a simple hardware implementation at the receiver but requires accurate time synchronization. The PS scheme has higher receiver complexity compared to TS and requires the optimization of the PS factor [15]. However, Krikidis and Timotheou indicated that the PS technology achieves lower outage probability and higher gain than those of TS for applications with delay constraints. It is intuitive since the signal received in one time slot is used for both power transfer and information decoding when the PS protocol is performed. [14]. In order to further meet practical scenario, in contrast to the most of existing works which apply an ideally linear EH model, Zhou and Chu adopted the practical nonlinear EH model to capture the nonlinear characteristics of EH circuits and designed the resource allocation schemes for SWIPT networks[16].
Motivated by the requirements of 5G and the advantages of NOMA and SWIPT, using SWIPT to enhance SE and EE in NOMA system which contains energylimited devices is a hotspot today [17].Liu and Ding introduce SWIPT into NOMA system to extend selfsustaining time of system. This strategy employs the near users as EH relays to improve communication quality of far users. Outage rates with respect to three kinds of relay selection schemes are evaluated in singleinput singleoutput (SISO) scenario. The analytical results demonstrate that SWIPT technology can effectively enhance EE of conventional NOMA systems without jeopardizing its diversity gain [18]. Xu and Ding proposed a SWIPT NOMA cooperative transmission strategy to design a joint beamformer and powerdistribution in multiinput singleoutput (MISO) scene with the perfect channel state information (CSI) model [19]. Furthermore, a joint design of the PS ratio and beamformer was studied in the imperfect CSI model [20]. However, the security of cooperative transmission is not involved in their work. Thus, the private information is easily intercepted and eavesdropped from open wireless channel [21, 22]. To overcome this issue, the cooperative jamming (CJ) technique can be introduced for transmitting AN to degrade the quality of the wiretap link. The existing CJ technique mainly can be classified into three different types including the sourceaided CJ, relayaided CJ and the destinationaided CJ. The sourceaided CJ refers to combining information bearing signal with AN injected by the source [23]. In order to improve security of network, Moradikia et al. employed the AN which is injected by the idle transmitter in the scene of untrusted relays and passive eavesdroppers existing [24]. The relayaided CJ describes the relay nodes of the system chosen to work as a jammer [25]. Liu Y combined cooperative relay with CJ technique to interfere eavesdropper. The research shows that their method can effectively improve the secrecy rate [26]. Zhou and Chu used AN technique to improve the information security of users in the SWIPT NOMA system which has an untrusted energy harvesting receiver [27]. The destinationaided CJ considers the AN transmitted by the destination [28]. A novel cooperative secure unmanned aerial vehicleassisted propagation protocol has been presented by M. Tatar Mamaghani. For the purpose of enhancing physicallayer security and propagation reliability, they employed destinationassisted CJ as well as SWIPT at the unmanned aerial vehicle mounted relay [29]. Furthermore, Hu Z explored physical layer security of SWIPT relay network with imperfect the CSI model. An algorithm is presented to optimize secret rate of SWIPT network in the constraints of relay forward power and eavesdroppers SINR [30]. Cao and Wang studied the security transmission of uplink NOMA with the aid of the EH receivers. One of the EH receivers is selected as a friendly jammer that adopts the energy harvested from the RF signals to transmit the AN for interfering the eavesdropper [31]. However, the collaboration secrecy scheme of SWIPT and NOMA is not involved in their work. Thus, it motivates us to use ANaided cooperative strategy to enhance physicallayer security of MISO SWIPT NOMA system. The main contributions of this paper are summarized as follows.

We propose a sourceaided CJ SWIPT NOMA strategy, where the near user serves as an EH relay to help the far user to improve the secrecy rate. By applying the PS protocol, the near user can simultaneously receive information and harvest energy used for the forwarding stage. In addition, multiple antennas and ANaided techniques are exploited to protect the private information.

The above scheme can be described as the problem of minimizing transmitted power from BS subject to secrecy rate of each user. To tackle this problem, we need to jointly optimize beamforming vector, AN covariance matrix and PS ratio. Unfortunately, it is NPhard. So, variable slack technique is combined with SCA method to get suboptimal solution of the original problem. The simulation results verify the proposed scheme which not only guarantees information security but also reduces BS’s energy consumption.
The paper is organized as follows. In Sect. 2, we first introduce the system model and the problem formulation of the cooperative SWIPT NOMA in MISO system. Next, an SCAbased iterative algorithm is proposed to solve the joint ANaided beamforming design and power splitting control problem. Then, we present numerical results on the performance of different schemes in Sect. 3. Finally, we conclude the paper in Sect. 4.
Notations: Boldface capital letters and boldface lowercase letters denote matrices and vectors, respectively. \(\mathbb {C}\) represents the complex domain. \(\mathbb {E}\cdot \) denotes the expectation operator. The superscript \((\cdot )^{T}\) and \((\cdot )^{H}\) denote the transpose and (Hermitian) conjugate transpose, respectively. \({{\mathrm{Tr}}(\cdot )}\) represents the trace of a matrix. \(\cdot \) denotes the magnitude of a complex number. \(\mathcal {CN}(\mathbf {0},\mathbf {X})\) denotes the circularly symmetric complex Gaussian distribution with mean vector \(\mathbf {0}\) and covariance matrix \(\mathbf {X}\).
2 Methods/experimental
2.1 System model and problem formulation
Consider a downlink in an MISO system is depicted in Fig. 1. BS is equipped with \({N}_t\) antennas. Two users and a passive eavesdropper are equipped with a single antenna, respectively. For simplicity, supposing eavesdropper and user 2 do not have a direct link, and the eavesdropper is distributed outside the security area center on user 2 near from BS (eavesdropper in the security will be detected by user 2). Similar to reference [32], we assume that some handshaking mechanisms are introduced in the medium access control (MAC) protocol of user 1 and user 2 to inhibit the interception occurring in the security area center on user 2. Specifically, user 1 and user 2 can employ a particular MAC protocol to exchange data while the eavesdropper without MAC protocol may only intercept the data from the BS without MAC protocol. Assume that the channel quality of the user 2 and the eavesdropper is better than that of user 1, respectively. For example, consider an indoor sensor communication scenario where user 2 and eavesdropper are closer to the BS than user 1.
Cooperative SWIPT NOMA transmission scheme is divided into two phases. In the first phase, the eavesdropper intercepts the transmitted signal from BS, and user 1 receives the transmitted signal from BS while user 2 performs SWIPT technique based on PS protocol. The PS protocol achieves SWIPT by allocating the received radio frequency signal at the user 2 into two streams of different power levels using a PS factor: one signal stream is converted to baseband for information decoding, and the other is sent to the rectenna circuit for EH. Assume that the harvested energy at the user 2 is only used for information forwarding at the second stage, while the energy for maintaining circuit, signal processing, etc., is neglected. When the harvested energy is more than the energy needed to information forwarding at user 2, there is an energy buffer at the secondary transmitter to store the excess energy. In the second phase, user 2 uses harvested energy in phase 1 to forward the message received in phase 1 to user 1, while user 1 employs maximalratio combination (MRC) criterion to accumulate and decode the messages received in two phases. Since the eavesdropper is distributed outside the security area center on user 2 near from BS, eavesdropper cannot receive the transmitted signal from user 2. Details of the process are presented next.
In the first transmission phase, in order to improve the security of the BS’s transmitted signal and reduce the risk of information leakage, an AN vector \(\mathbf {v}\in \mathbb {C}^{{N}_{t}}\) is added to the transmitted signal. Therefore, the transmitted signal from the BS is described as \(\mathbf {s}=\mathbf {w}_{1}{s}_{1}+\mathbf {w}_{2}{s}_{2}+\mathbf {v}\), where \({s}_{1},{s}_{2}\in \mathbb {C}\) are information bearing messages for user 1 and user 2, respectively. And \(\mathbf {w}_{1},\mathbf {w}_{2}\in \mathbb {C}^{{N}_{t}}\) are the corresponding transmitted beamformers. We assume that the power of the transmitted symbol is normalized, i.e., \(\mathbb {E}{s}_{1}^{2}=\mathbb {E}{s}_{2}^{2}=1\), and the AN vector \(\mathbf {v}\sim \mathcal {CN}(\mathbf {0},\mathbf {S})\), where \(\mathbf {S}\) is the covariance matrix of AN to be designed. Then, the signal received at user 1 is given by
where \(\widetilde{\mathbf {h}}_{1}^{H}\in \mathbb {C}^{{N}_{t}}\) is the channel impulse response vector between the BS and user 1, and \({n}_{1}^{(1)}\sim \mathcal {CN}(0,\sigma _{1}^{2})\) represents the additive Gaussian white noise (AWGN) at user 1. Then, the signaltointerferenceplusnoiseratio (SINR) received by user 1 for \({s}_{1}\) can be expressed as
by defining \(\mathbf {h}_1=\widetilde{\mathbf {h}}_1/\sigma _1\), (2) is transformed as
As shown in Fig. 2, the power splitting architecture with respect to user 2, is introduced to perform SWIPT. Hence, the received signal for information decoding at user 2 can be described as
where \(\rho \in [0,1]\) is the PS ratio of energy harvesting to be optimized later, \(\widetilde{\mathbf {h}}_{2}^{H}\in \mathbb {C}^{{N}_{t}}\) is the channel impulse response vector between the BS and user 2, \({n}_{2}^{(1)}\sim \mathcal {CN}(0,\sigma _{2}^{2})\) represents the AWGN.
According to the NOMA principle, SIC is performed at user 2. Specifically, user 2 first decodes user 1’s message (i.e., \({s}_{1}\)) and then subtracts this message from the received signal to decode its own message [33]. Therefore, the SINR received at user 2 to decode \({s}_{1}\) can be expressed as
where \(\mathbf {h}_2=\widetilde{\mathbf {h}}_2/\sigma _2\).
Then, user 2 subtracts \({s}_{1}\) from \(y_{2}^{(1)}\) to further decode its own message \({s}_{2}\). The corresponding SINR can be described as
On the other hand, the energy harvested by user 2 is modeled as [34]
where \(\eta\) is the ratio of the first phase in a transmission time slot, and we assume that the two phases have the same transmission duration, then \(\eta =0.5\).
Thus, in the second phase, the transmitted power of user 2 related to forwarding messages is
In addition, the signal received at the eavesdropper can be expressed as
where \(\widetilde{\mathbf {f}}^{H}\in \mathbb {C}^{{N}_{t}}\) is the channel impulse response vector between the BS and eavesdropper, and \({n}_{e}^{(1)}\sim \mathcal {CN}(0,\sigma _{e}^{2})\) represents the AWGN at eavesdropper. Then, the SINR received by eavesdropper for the message \({s}_1\) can be expressed as
where \(\mathbf {f}=\widetilde{\mathbf {f}}/\sigma _{e}\).
The eavesdropper then performs the SIC, subtracts \({s}_1\) from its signal to further decode the other message \({s}_2\). The corresponding SINR can be described as
In the second phase, user 2 forwards the message to user 1 with the harvested energy. At this point, the signal received at user 1 is
where \({g}_{1}\in \mathbb {C}\) is the channel coefficient from user 2 to user 1, and \({n}_{1}^{(2)}\sim \mathcal {CN}(0,\sigma _{1}^{2})\) is the AWGN at user 1. Note that we consider the case of \(\sigma _{1}^{2}=\sigma _{2}^{2}\) for the simplicity of exposition. Thus, the SINR received by user 1 for \(s _{1}\) can be given by
where \({g}={g}_1^2\).
In communication systems, MRC usually be performed following synchronization, channel estimation and channel equalization (in the sampling domain). Since synchronization, channel estimation and channel equalization are not main concerns in this paper, similar as reference[19] and[35], we assume each channel has been completely synchronized before performing the MRC. So, user 1 can combine the signals received from the BS and the user 2 to jointly decode the message. The equivalent SINR at user 1 can be written as
Therefore, according to the SINR of the legitimate user and the eavesdropper, the secrecy rate \({R}_1\) and secrecy rate \({R}_2\) of the user 1 and the user 2 are defined as follows
we want to minimize the transmitted power of the BS while guaranteeing the level of secrecy rates related to users. The optimization problem can be expressed as follow
where \(\gamma _1\) and \(\gamma _2\) represent the minimum required secret rate thresholds with respect to user 1 and user 2, respectively. The constraint C0 is to ensure \({s}_1\) can be successfully decoded at user 2 meanwhile guarantee the SINR requirement of user 1 satisfied, and the constraint C1 ensures the secure transmission of message \({s}_2\) at user 2. Observing equ (15.a) and equ (15.b), we can find that \(\rho\), \(\mathbf {w}_1\) and \(\mathbf {w}_2\) are coupled together in the \({R}_1\) and \({R}_2\). Thus, P1 is a nonconvex problem and is difficult to solve. In the following, we will firstly employ SDR technique to reformulate P1 and then approximately solve the reformulated problem with an SCAbased iterative algorithm.
2.2 ANaided beamforming design and power splitting control
Let \({\mathbf {W}_1}={\mathbf {w}_1}{\mathbf {w}_1^H}\), \({\mathbf {W}_2}={\mathbf {w}_2}{\mathbf {w}_2^H}\) and drop rankone constraints \(\mathrm rank({\mathbf {W}_1})=1\), \(\mathrm rank({\mathbf {W}_2})=1\). P1 can be relaxed to P2, given as
where \({{\mathbf {H}}_1} \triangleq {{\mathbf {h}}_1}{\mathbf {h}}_1^H\), \({{\mathbf {H}}_2} \triangleq {{\mathbf {h}}_2}{\mathbf {h}}_2^H\) and \({{\mathbf {F}}} \triangleq {{\mathbf {f}}}{\mathbf {f}}^H\). Moreover, \({R}_{1,s_1}\) and \({R}_{2,s_1}\) represent the secrecy rates of message \(s_1\) at user 1 and user 2, respectively. \({R}_{2,s_2}\) represents that of message \(s_2\) at user 2(c.f. (17)). Due to the constraints C4, C5 and C6 are still nonconvex, they are converted to the following equivalent by introducing exponential auxiliary variables [36]. The constraint C4 is equivalently expressed as
where \(x_1\), \(y_1\), \(y_2\) are exponential auxiliary variables. Here, only (19b) and (19c) remain as nonconvex constraints. By using the firstorder Taylor expansion approximation, the nonconvex constraint (19b) can be approximated as
where \(\widetilde{x}_1\) is an approximate value, and it is equal to \({x}_1\), when the corresponding constraints are tight.
Furthermore, by introducing an auxiliary variable \({x_2} \geqslant 0\), constraint (19c) can be equivalently expressed as
For constraint (21a), an approximate convex constraint is produced by using the arithmeticgeometric mean (AGM) inequality \(xy \leqslant z\). That is, for any nonnegative variable x, y and z, if and only if \(a = \sqrt{y/x}\), the following formula holds
Therefore, constraint (21a) is approximated by a convex constraint as follows
where \(\widetilde{a}_1\) is an approximate value, which is updated after each iteration by the following formula
Using epigraph reformulation [37], the constraint (21b) can be transformed into a nonconvex quadratic constraint and a convex LMI constraint as below
And then, the nonconvex quadratic inequality constraint (25a) is still approximated by Taylor expansion as
where \(\widetilde{u}\) is an approximate value.
Similar to C4, constraint C5 is approximated as
where \({\widetilde{x}_3}\), \({\widetilde{x}_4}\), \({\widetilde{t}}\) and \({\widetilde{a}_2}\) are approximate values. In addition, \({\widetilde{a}_2}\) is updated after each iteration by the following formula
Similar to C5, constraint C6 is approximated as
where \({\widetilde{x}_5}\), \({\widetilde{x}_6}\), \({\widetilde{q}}\) and \({\widetilde{a}_3}\) are approximate values. Moreover, \({\widetilde{a}_3}\) is updated after each iteration by the following formula
Therefore, P2 can be approximated as P3 as follows
where \(i \in \left\{ {1,2,3,4,5,6} \right\}\). We can see that P3 is a standard convex optimization problem. According to the solution of P3, an iterative algorithm using SCA can be developed to solve P1, the specific solution process is shown in Table 1. In addition, if the solution \((\mathbf {W}_1^*,\mathbf {W}_2^*)\) yielded by SDR is rankone, then the optimal beamforming vectors \(\mathbf {w}_1^*\) and \(\mathbf {w}_2^*\) are obtained by eigenvaluedecomposition of \(\mathbf {W}_1^*\) and \(\mathbf {W}_2^*\), respectively. Otherwise, the suboptimal solution can be yielded by using Gaussian randomization procedure [38].
3 Results and discussion
In this section, some simulation results are shown to demonstrate the performance of the proposed ANaided cooperate SWIPT NOMA transmission scheme. Consider that two legitimate users and a passive eavesdropper (located outside of the “security zone”) are randomly deployed in an \(5m \times 6m\) area, and the BS is fixed at the edge with a coordinate \(\left( {0m,2.5m} \right)\). This scenario is suitable for an indoor sensor communication scenario. \(\tilde{h_1}\) is the standard Rayleigh fading coefficient. The distancedependent path loss is modeled by \({P_L} = {10^{  3}}{d^{  \alpha }}\), in which d and \(\alpha\) denote the Euclidean distance and path loss exponent, respectively. Using the Rician fading channel model, the downlink channels are modeled as
where K denotes the Rician factor, \({\mathbf {h}}_2^{{\text {LOS}}}\), \({\mathbf {f}}^{{\text {LOS}}}\) and \(g_1^{{\text {LOS}}}\) are the lineofsight (LOS) deterministic components, \({\mathbf {h}}_2^{{\text {NLOS}}}\), \({\mathbf {f}}^{{\text {NLOS}}}\) and \(g_1^{{\text {NLOS}}}\) are the Rayleigh fading components. The detailed simulation parameters are given in Table 2.
We introduce some other transmission strategies, namely the ANaided NOMA strategy, NonAN SWIPT NOMA strategy and ANaided time division multiple access (TDMA) strategy.

In the ANaided NOMA strategy, the system still performs the NOMA strategy. However, SWIPT is not executed at user 2, i.e., the cooperative transmission stage is removed in the system. So, in this strategy, power splitting is not to be considered.

In the NonAN SWIPT NOMA strategy, we do not add an AN to transmitted signal from the BS in the system. Therefore, AN covariance matrix optimizing is not to be considered in this strategy.

In the ANaided TDMA strategy, the system performs the time division multiple access (TDMA) mode, i.e., the BS transmits information to user 1 or user 2 at different dynamic time intervals.
Figure 3 describes minimum transmission power of the BS with respect to the number iterations of the proposed algorithm. The minimum required secrecy rate of user 1 is set to be 0.5 Bits/s/Hz. The minimum required secrecy rate of user 2 is set to be 0.3 Bits/s/Hz, 0.5 Bits/s/Hz or 0.7 Bits/s/Hz, respectively. It can be found that only few iterations are required to achieve the minimum transmission power of the BS in all case, which indicates that the proposed algorithm is effective.
Figure 4 shows minimum transmission power of the BS with respect to secrecy rate of user 1 and secrecy rate of user 2, respectively. It can be found that in all cases, NOMA transmission strategies are superior to the TDMA transmission strategy, indicating the advantage of NOMA in improving the system SE. Moreover, our strategy obtains smaller transmission power of the BS than that of other NOMA strategies.
Since user 1 far from BS while user 2 near from BS, their secrecy rates have different impacts on transmission power. Firstly, we analyze the influence of user 1’s secrecy rate on transmission power when the secrecy rate of user 2 was fixed. Again, we analyze the influence of user 2’s secrecy rate on transmission power when the secrecy rate of user 1 was fixed.
Figure 5 describes the minimum transmission power of the BS versus the secrecy rate of user 1, where the secrecy rate of user 2 is fixed by 0.5 Bits/s/Hz. Compared with that of other transmission strategies, the transmission power of the proposed ANaided SWIPT NOMA strategy is the lowest, which demonstrates that the collaboration between SWIPT and NOMA is effective. It is also found that the power of the proposed scheme is slightly lower than that of the NonAN NOMA SWIPT transmission strategy.
Figure 6 shows the minimum transmission power of the BS versus the secrecy rate of user 2, where the secrecy rate of user 1 is fixed by 0.5 Bits/s/Hz. We observe that the curves of the three NOMA transmission strategies are more smooth than that of TDMA transmission strategy. This indicates that the NOMA transmission strategies are robust with respect to the near user rate, i.e., under the same transmitted power constraint and far user secrecy rate, the NOMA can significantly increase the secrecy rate of the near user compared to that of TDMA. On the other hand, we find that gap of transmission power between ANaided SWIPT NOMA strategy and ANaided NOMA strategy decreases gradually with increasing secrecy rate requirement. Moreover, gap of transmission power between ANaided and NonAN strategies decreases gradually with increasing the secrecy rate. It clearly demonstrates that gain of user in BS caused by SWIPTcooperative and ANaided techniques decrease gradually with the increasing of secrecy rate.
Figure 7 describes the minimum transmission power of the BS with respect to the number of BS’s antennas, where the secrecy rate of user 1 and the secrecy rate user 2 are fixed by 0.5 Bits/s/Hz. We can find that the transmission power of all methods reduces with the number of BS’s antenna. It is intuitive since the diversity gain of system can be enhanced by increasing the number of BS’s antennas. Compared with that of TDMA transmission scheme, the transmission power of other three NOMA schemes are lower. This shows that the NOMA transmission schemes are robust. Similar to Fig. 5, it is also found that the power of the proposed scheme is slightly lower than that of the NonAN NOMA SWIPT transmission strategy.
Table 3 shows the relationship among the PS ratio, the secrecy rate of user 1 and the secrecy rate of user 2. It can be seen that the PS ratio decreases sharply with the user 2’s secrecy rate increasing, but increases slowly with the user 1’s secrecy rate increasing. This is because the power related to the information decoding of the user 2 is completely determined only by \(1\rho\). Higher secrecy rate requirement of user 2, more power needs to be allocated. Different from that of user 2, the secrecy rate of user 1 is determined by two parts (the transmission signal of the BS and user 2), and thus is less sensitive to the PS ratio than that of user 2.
4 Conclusions
To promote the physicallayer security of the downlink in the MISO system, we propose an ANaided cooperate SWIPT NOMA strategy. In the scene of one SICcapable eavesdropper, we explore a cooperative transmission scheme based on multiantenna, ANaided, and PS techniques to minimize transmitted power of the BS while satisfying secrecy rate of all legitimate users. This NPhard problem needs to jointly optimize the beamforming vector of multiantenna, the covariance matrix of ANaided and the PS ratio. Thus, we design a suboptimal algorithm by using SDR and SCA techniques to tackle the above NPhard problem. Simulation studies verify the effectiveness of the proposed transmission scheme.
Availability of data and materials
Data sharing not applicable to this paper since no datasets were analyzed during current study.
Abbreviations
 NOMA:

Nonorthogonal multiple access
 SWIPT:

Simultaneous wireless information and power transfer
 CSI:

Channel state information
 SIC:

Successive interference cancellation
 BS:

Base station
 SDR:

Semidefinite relaxation
 SCA:

Successive convex approximation
 PS:

Power splitting
 AN:

Artificial noise
 5G:

Fifthgeneration
 OMA:

Orthogonal multiple access
 SE:

Spectral efficiency
 EE:

Energy efficiency
 RF:

Radio frequency
 EH:

Energy harvesting
 TS:

Timeswitching
 CJ:

Cooperative jamming
 SISO:

Singleinput singleoutput
 MISO:

Multipleinput singleoutput
 MRC:

Maximalratio combination
 AWGN:

Additive Gaussian white noise
 SINR:

Signaltointerferencenoiseratio
 LOS:

Lineofsight
 TDMA:

Time division multiple access
References
Z. Wei, D. N, J. Yuan, H. Wang, Optimal resource allocation for powerefficient MCNOMA with imperfect channel state information. IEEE Trans. Commun. 65(9), 3944–3961 (2017)
F. Zhou, N.C. Beaulieu, Z. Li, J. Si, P. Qi, Energyefficient optimal power allocation for fading cognitive radio channels: ergodic capacity, outage capacity, and minimumrate capacity. IEEE Trans. Wirel. Commun. 15(4), 2741–2755 (2016)
D. Tse, P. Viswannath, Fundamentals of Wireless Communication (2005)
Z. Ding, Z. Yang, P. Fan, H.V. Poor, On the performance of nonorthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Process. Lett. 21(12), 1501–1505 (2014)
Z. Ding, P. Fan, H.V. Poor, Impact of user pairing on 5G nonorthogonal multipleaccess downlink transmissions. IEEE Trans. Veh. Technol. 65(8), 6010–6023 (2016)
J. Men, J. Ge, Nonorthogonal multiple access for multipleantenna relaying networks. IEEE Commun. Lett. 19(10), 1686–1689 (2015)
Z. Yang, Z. Ding, Y. Wu, P. Fan, Novel relay selection strategies for cooperative NOMA. IEEE Trans. Veh. Technol. 66(11), 10114–10123 (2017). https://doi.org/10.1109/TVT.2017.2752264
P. Xu, Z. Yang, Z. Ding, Z. Zhang, Optimal relay selection schemes for cooperative NOMA. IEEE Trans. Veh. Technol. 6, 16 (2018)
Z. Ding, H. Dai, H. Vincent, Relay selection for cooperative NOMA. IEEE Wirel. Commun. Lett. 5(4), 416–419 (2016)
J. Li, Y. Zhao, Radio environment mapbased cognitive doppler spread compensation algorithms for highspeed rail broadband mobile communications. EURASIP J. Wirel. Commun. Netw. 263, 2012 (2012)
S.L. Talbot, B. FarhangBoroujeny, Timevarying carrier offsets in mobile OFDM. IEEE Trans. Commun. 57(9), 2790–2798 (2009)
Z. Zhu, Z. Chu, Z. Wang, L. Lee, Outage constrained robust beamforming for secure broadcasting systems with energy harvesting. IEEE Trans. Wirel. Commun. 15(11), 7610–7620 (2016)
P. Grover, A. Sahai, Shannon meets tesla: Wireless information and power transfer, in IEEE International Symposium on Information Theory (2010)
I. Krikidis, S. Timotheou, S. Nikolaou, G. Zheng, D.W.K. Ng, R. Schober, Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag. 52(11), 104–110 (2014)
R. Zhang, C.K. Ho, MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans. Wirel. Commun. 12(5), 1989–2001 (2013)
F. Zhou, Z. Chu, H. Sun, R.Q. Huang, L. Hanzo, Artificial noise aided secure cognitive beamforming for cooperative misonoma using swipt. IEEE J. Sel. Areas Commun. 36(4), 918–931 (2018)
J. Xu, L. Liu, R. Zhang, Multiuser MISO beamforming for simultaneous wireless information and power transfer. IEEE Trans. Signal Process. 62(18), 4798–4810 (2014)
Y. Liu, Z. Ding, M. Elkashlan, H.V. Poor, Cooperative nonorthogonal multiple access with simultaneous wireless information and power transfer. IEEE J. Sel. Areas Commun. 34(4), 938–953 (2016)
Y. Xu, C. Shen, Z. Ding, X. Sun, S. Yan, G. Zhu, Z. Zhong, Joint beamforming and powersplitting control in downlink cooperative SWIPT NOMA systems. IEEE Trans. Signal Process. 65(18), 4874–4886 (2017)
Y. Yuan, P. Xu, Z. Yang, Z. Ding, Q. Chen, Joint robust beamforming and powersplitting ratio design in SWIPTbased cooperative NOMA systems with CSI uncertainty. IEEE Trans. Veh. Technol. 68(3), 2386–2400 (2019)
F. Zhou, Z. Li, J. Cheng, Q. Li, J. Si, Robust ANaided beamforming and power splitting design for secure MISO cognitive radio with SWIPT. IEEE Trans. Wirel. Commun. 16(4), 2450–2464 (2017)
H. Wang, X. Xia, Enhancing wireless secrecy via cooperation: signal design and optimization. IEEE Commun. Mag. 53(12), 47–53 (2015)
Y. Ju, H. Wang, T. Zheng, Q. Yin, Secure transmissions in millimeter wave systems. IEEE Trans. Commun. 65(5), 2114–2127 (2017)
M. Moradikia, H. Bastami, A. Kuhestani, H. Behroozi, L. Hanzo, Cooperative secure transmission relying on the optimal power allocation in the presence of untrusted relays, a passive eavesdropper and hardware impairments. IEEE Access 7, 116942–116964 (2019)
C. Wang, H.W. Ming, X. Xia, Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans. Wirel. Commun. 14(2), 589–605 (2015)
Y. Liu, H. Chen, L. Wang, Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun. Surv. Tutor. 19(1), 347–376 (2017)
F. Zhou, Z. Chu, Y. Wu, N.AIDhahir, P. Xiao, Enhancing PHY security of MISO NOMA SWIPT systems with a practical nonlinear EH model, in 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1–6 (IEEE, 2018)
D. Chen, Y. Cheng, W. Yang, J. Hu, Y. Cai, Physical layer security in cognitive untrusted relay networks. IEEE Access 6, 7055–7065 (2018)
M.T. Mamaghani, Y. Hong, On the performance of lowaltitude UAVenabled secure af relaying with cooperative jamming and SWIPT. IEEE Access 7, 153060–153073 (2019)
Z. Hu, D. Xie, M. Jin, L. Zhou, J. Li, Relay cooperative beamforming algorithm based on probabilistic constraint in SWIPT secrecy networks. IEEE Access 8, 173999–174008 (2020)
K. Cao, B. Wang, H. Ding, L. Lv, R. Dong, T. Cheng, F. Gong, Improving physical layer security of uplink noma via energy harvesting jammers. IEEE Trans. Inf. Forensics Secur. 16, 786–799 (2021)
A. Hasan, J.G. Andrews, The guard zone in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 6(3), 897–906 (2007)
Y. Zhang, H. Wang, Q. Yang, Z. Ding, Secrecy sum rate maximization in nonorthogonal multiple access. IEEE Commun. Lett. 20(5), 930–933 (2016)
Q. Shi, C. Peng, W. Xu, M. Hong, Y. Cai, Energy efficiency optimization for MISO SWIPT systems with zeroforcing beamforming. IEEE Trans. Signal Process. 64(4), 842–854 (2016)
Z. Ding, I. Krikidis, B. Sharif, H.V. Poor, Wireless information and power transfer in cooperative networks with spatially random relays. IEEE Trans. Wirel. Commun. 13(8), 4440–4453 (2014)
Z. Chu, Z. Zhu, M. Johnston, S.Y. LeGoff, Simultaneous wireless information power transfer for MISO secrecy channel. IEEE Trans. Veh. Technol. 65(9), 6913–6925 (2016)
S. Boyd, L. Vandenberghe, Convex Optimization (2004)
Z. Luo, W. Ma, M. So, Y. Ye, S. Zhang, Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 27(3), 20–34 (2010)
Acknowledgements
Not applicable.
Funding
This work was supported by the National Science Foundation Council of China (61771006, 61976080), Key research projects of university in Henan Province of China (19A413006, 20B510001), Firstclass Discipline Training Foundation of Henan University (2018YLTD04), the Programs for Science and Technology Development of Henan Province (192102210254), the Talent Program of Henan University (SYL19060110).
Author information
Authors and Affiliations
Contributions
Y.J was responsible for investigating the ANaided beamforming design and power splitting control method that are suitable to be implemented. Z.H conceived and designed the study. D.X drafted the manuscript and revised it critically. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Consent for publication
Not applicable.
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Jin, Y., Hu, Z., Xie, D. et al. Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system. J Wireless Com Network 2021, 144 (2021). https://doi.org/10.1186/s13638021020203
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638021020203