- Research
- Open access
- Published:
Physical layer security analysis of IRS-based downlink and uplink NOMA networks
EURASIP Journal on Wireless Communications and Networking volume 2023, Article number: 105 (2023)
Abstract
In recent years, the development of intelligent reflecting surface (IRS) in wireless communications has enabled control of radio waves to reduce the detrimental impacts of natural wireless propagation. These can achieve significant spectrum and energy efficiency in wireless networks. Non-orthogonal multiple access (NOMA) technology, on the other hand, is predicted to improve the spectrum efficiency of fifth-generation and later wireless networks. Motivated by this reality, we consider the IRS-based NOMA network in the downlink and uplink scenario with a pernicious eavesdropper. Moreover, we investigated the physical layer security (PLS) of the proposed system by invoking the connection outage probability (COP), secrecy outage probability (SOP), and average secrecy rate (ASR) with analytical derivations. The simulation results reveal that (i) it is carried out to validate the analytical formulas, (ii) the number of meta-surfaces in IRS, transmit power at the base station, and power allocation parameters all play an essential role in improving the system performance, and (iii) it demonstrates the superiority of NOMA to the traditional orthogonal multiple access (OMA).
1 Introduction
Future wireless networks are expected to play a pivotal role in society as they will offer access to intelligent applications such as autonomous driving and virtual and augmented reality. [1]. In order to offer ubiquitous services, though, wireless connectivity should be provided for everyone and everywhere [2]. Recently, intelligent reflecting surfaces (IRSs) have been proposed as one of the important technologies to realize wireless communication smart radio environment (SRE) systems [2]. A IRS is specifically made up of a number of small, inexpensive, almost passive reflecting elements (REs) that may be programmed and controlled by the network operator. Moreover, IRS can be modified to reflect and direct incoming signals in the desired directions [3,4,5]. Additionally, the terms reflecting intelligent surfaces (RISs) and large intelligent surfaces (LISs) are also used interchangeably for IRSs in [6]. The IRSs are known to have very significant spectrum efficiency (SE), as well as energy efficiency (EE) with a large number of passive REs in [7]. As a result of the IRS structure’s simpler installation, it is now possible to deploy it more widely across the different urban infrastructures in both indoor and outdoor settings, including factory roofs, street lights, and traffic signal poles as well as residential ceilings and rooftops. As a result, IRS is simple to integrate into the current wireless communication networks [8,9,10].
Furthermore, the increased demand for wireless access has prompted researchers to look beyond the traditional multiple access strategies in which users are multiplexed orthogonally according to time, frequency, or codes. The terms for multiplexing in time, frequency, and code are time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA), respectively. Non-orthogonal multiple access (NOMA) has recently drawn a lot of interest and is now thought to be a strong contender for future wireless networks [11,12,13,14]. It is thought to support vast connectivity in addition to improving spectral efficiency when compared to orthogonal multiple access (OMA). It is possible to support more users than the number of accessible orthogonal resource blocks [15]. The main goal of NOMA is to enable non-orthogonal resource allocation among users in order to achieve multiple access (MA). The superposition coding (SC) technology, in which the signals of several users are multiplexed with varied power levels, served as an inspiration for NOMA in the power domain (PD)-NOMA. The overlaid messages are decoded at receivers using successive interference cancelation (SIC) [16]. Both downlink and uplink transmissions are compatible with NOMA. Users with poor channel conditions are typically given greater power for downlink NOMA so that their signals can be deciphered by treating other users’ signals as noise. The base station must be able to identify signals from all users, which requires a well-designed power control mechanism for uplink NOMA [17].
In recent years, because both IRS and NOMA are extremely promising approaches, IRS was combined with NOMA in [18,19,20,21]. It has been demonstrated that combining IRS and NOMA allows for high data rate transfer while improving system performance. Furthermore, IRS-assisted NOMA improves spectrum resource usage. [22] proposed a simple concept for downlink transmission of IRS-assisted NOMA, in which the IRS is deployed to effectively serve the cell-edge user by aligning the reflected beam from the IRS. In [23], the authors proposed an energy-efficient approach for IRS-assisted NOMA, where the authors explore the tradeoff between the sum rate of NOMA users and total power usage. The authors of [24] provided various strategies to increase system performance for continuous phase shifts and discontinuous phase changes of IRS elements. [25] examined the downlink transmit power minimization problem for an IRS-powered NOMA network. The author in [26] investigated the performance of downlink and uplink IRS Networks. In [27], a IRS-assisted NOMA system was compared to a classic OMA system with/without IRS and a traditional NOMA system without IRS, and simulation results revealed that the IRS-assisted NOMA system outperformed the others in terms of rate performance.
Because electromagnetic transmission has the nature of broadcasting, which makes internet of thing (IoT) communication vulnerable to eavesdropping assaults, communication security, and secret protection are highly important in wireless communication networks [28, 29]. Traditional security approaches rely primarily on authentication and encryption, both of which are implemented at the upper layer of a wireless communication system but are generally independent of the physical layer. However, key management is problematic using classical encryption technologies [30]. From the standpoint of information theory, physical layer security (PLS) technology exploits the indeterminacy and time-variability of the wireless channel to realize secure communication of encrypted links without a key [31] and has established a potential solution for secure wireless communication. In [32], beamforming was employed to decrease the system’s transmitted power under the limitation of secrecy rate. When the eavesdropper’s channel is superior to the user’s and both channels are highly correlated in space, joint beamforming was utilized to improve the user’s secrecy rate in [33]. In [34], the secrecy outage probability (SOP) was calculated in a IRS-aided wireless communication system and the effect of the number of reflectors in the IRS on secrecy performance was investigated. In [35], two techniques were described to improve the PLS of a IRS-aided multiple-input single-output (MIMO) system. In [36], a minimum-secrecy-rate maximization problem was solved to improve the overall system’s secrecy performance when the system has several legitimate users and multiple eavesdroppers. The author in [37] studied the PLS of a multi-user situation for an IRS-NOMA network, providing accurate and asymptotic SOPs. An IRS was used to aid a cell-edge user in [38], where the secrecy performance in the Nakagami-m fading channel was examined. In [39], the secrecy performance and diversity order are analyzed for the IRS-based NOMA network. The SOP and average secrecy capacity (ASC) are studied of IRS-based NOMA network under the Rayleigh fading channel in [40].
1.1 Motivation and contribution
According to the previous study, current IRS research priorities include generic IRS applications, the inherent integration of NOMA and IRS, and the PLS of IRS-aided wireless networks. The author in [40] investigated the PLS of IRS-aided NOMA for a downlink scenario under the Rayleigh fading channel. But the author does not consider for uplink scenario and the Nakagami-m fading channel for direct link. Therefore, to fill this gap, we analyzed the PLS of the IRS-aided NOMA network under the Nakagami-m fading channel for the downlink–uplink scenario. In addition, we have added Table 1 to compare the proposed work with the current literature. The detailed contributions of this study, in particular, can be summarized as follows:
-
We considered the downlink–uplink IRS-based NOMA network, in which a base station (BS) sends and receives the signal from user 1 (\(D_1\)) and user 2 (\(D_2\)), IRS reflects and receives the signals from \(D_2\) in the presence of an eavesdropper.
-
We analyzed the PLS of the proposed system. Specifically, we provide the reliability and security analysis of the downlink–uplink by developing analytical formulas for the connection outage probability (COP), SOP, and ASR for the legitimate user \(D_1\), \(D_2\), an eavesdropper.
-
We offer thorough simulations not only to validate the theoretical analysis results but also to provide some important technical insights. Throughout the numerical results, we emphasize the critical influence of utilizing the IRS. Following that, we demonstrate the effect of the number of IRS elements on the proposed system’s downlink–uplink.
1.2 Organization
The rest of this paper is structured as follows. Section 2 analyzes the system model of IRS-based NOMA networks with the downlink and uplink cases. Section 3 presents the channel model for the system. In Sect. 4, the downlink performance analysis is carried out, and in Section 5, the uplink performance analysis. Section 6 depicts a simulation of the model. Section 7 concludes the paper.
2 Method
2.1 System model
In Fig. 1, we consider the IRS-based downlink and uplink NOMA network, which consists of a BS, an IRS with N reflecting elements, and two receivers, \(D_1\) and \(D_2\). The network is communicating while being intercepted by an eavesdropper (E). In more detail, \(D_1\) is the near user that can be directly communicated with BS, but \(D_2\) is the far user that requires an IRS’s assistance in order to communicate due to the long distance and obstructions. In addition, the reflection-coefficient matrix of IRS is denoted by \({\mathbf {\Phi }} = \text {diag}\left( {{\alpha _1}{e^{j{\varphi _1}}},{\alpha _2}{e^{j{\varphi _2}}}, \ldots ,{\alpha _N}{e^{j{\varphi _N}}}} \right) ,\left( {j = \sqrt{ - 1} } \right)\), where \({\alpha _n} \in \left[ {0,1} \right]\) is the amplitude-reflection coefficient and \({\varphi _n} \in \left[ {0,2\pi } \right)\) is the phase-shift variable of the nth element that can be adjusted by the IRS with \(\left( {n = 1,2, \ldots ,N} \right)\). Furthermore, we assume all wireless links following Nakagami-m fading. Particularly, \({\textbf{h}}_1^d = \left[ {h_{1,1}^d,h_{1,2}^d, \ldots ,h_{1,N}^d} \right]\), \({\textbf{h}}_1^u =\left[ {h_{1,1}^u,h_{1,2}^u,\ldots ,h_{1,N}^u} \right] ^T\), \({\textbf{h}}_2^d = \left[ {h_{2,1}^d,h_{2,2}^d, \ldots ,h_{2,N}^d} \right] ^T\) and \({\textbf{h}}_2^u = \left[ {h_{2,1}^u,h_{2,2}^u,\ldots ,h_{2,N}^u}\right]\) denotes the complex channel coefficient from BS-IRS, IRS-BS, IRS-\(D_2\), \(D_2\)-IRS, respectively. Table 2 lists the primary parameters and functions.
2.2 Signal model of downlink
In this downlink section, the BS sends the superposed signal \(s = \sqrt{{\eta _1}{P_{BS}}} s_1^d + \sqrt{{\eta _2}{P_{BS}}} s_2^d\) to \(D_i\), in which, is the signal of \(D_i\). Please take note that since user \(D_2\) is assumed to be further away than the other user, a larger portion of power must be provided for user \(D_2\), i.e., condition \({\eta _1} < {\eta _2}\) for user fairness and assume fixed power allocation splitting between two users [22]. The received signals at \(D_1\) are given by
The corresponding signal-to-interference-plus-noise ratio (SINR) at \(D_1\) to detect \(s^d_2\) is given by
where \(\psi = \frac{{{P_{BS}}}}{{{N_0}}}\) denotes the transmit signal-to-noise ratio (SNR) of the BS.
After implementing the SIC, the corresponding SNR of \(D_1\) when detecting the own signal is given by
Next, the received signal at \(D_2\) is given by
The corresponding SINR of \(D_2\) to detect the own signal is given by
At the E, the received signal can be expressed as
In this work, like [41] and [42], parallel interference cancelation (PIC) is used at E to distinguish the superimposed mixture. Then, the corresponding SNR at E can be expressed as
where \({\psi _e} = \frac{{{P_{BS}}}}{{{N_e}}}\).
2.3 Signal model of uplink
In the uplink section, the received signal at the BS is written by
The corresponding SINR of BS, when decoded the signal of \(D_1\), is given by
where \({\psi _1} = \frac{{{P_{D_1}}}}{{{N_0}}}\), \({\psi _2} = \frac{{{P_{D_2}}}}{{{N_0}}}\).
Following the completion of the SIC, the corresponding SNR to detect the signal of \(D_2\) is given by
The received signal at E can be expressed as
Similar to (7), we can continue to apply PIC, then the SNR at E can be written by [41, 42]
where \({\psi _{ei}} = \frac{{{P_{D_i}}}}{{{N_e}}}\), \(\left( {i = 1,2} \right)\).
3 Channel model
Based on [43], the channel gain \(g_z\) follows Nakagami-m distribution with fading parameter \(m_{g_z}\) and \({\mathbb {E}}\left[ {{{\left| {{g_z}} \right| }^2}} \right] = {\lambda _{g_z}}\) with \(z = \left\{ {d,u,e,e1,e2} \right\}\). Therefore, the probability density function (PDF) of \({{{\left| g_z \right| }^2}}\) is given by
Next, the cumulative distribution function (CDF) is expressed as
Next, we can rewrite the channel of \(D_2\) as \(\left| {{{\textbf{h}}}_1^v{\mathbf {\Phi h}}_2^v} \right| = \left| {\sum \limits _{n = 1}^N {{\alpha _n}} h_{1,n}^vh_{2,n}^v{e^{j{\varphi _n}}}} \right|\) with \(v = \left\{ {d,u} \right\}\). To obtain the best channel of BS-IRS-\(D_2\), we adjust the phase-shift element of IRS to maximize \(\left| {\sum \limits _{n = 1}^N {{\alpha _n}} h_{1,n}^vh_{2,n}^v{e^{j{\varphi _n}}}} \right|\). Next, by setting the optimal phase-shift \(\varphi _n\), this implies that the phases of all \(h_{1,n}^vh_{2,n}^v{e^{j{\varphi _n}}}\) can be set to be the same. Furthermore, the generalized solution can be obtained as \(\varphi _n = {{\bar{\varphi }}} - \arg (h_{1,n}^vh_{2,n}^v)\), where \({{\bar{\varphi }}} \in [0,2\pi )\) denotes the arbitrary constant. By applying the optimal phase-shift for \(\varphi _n\), we can express as [26]
where \({\alpha _n} = \alpha ,{\forall _n}\). Denote \({X_v} = \frac{{{{\left( {\sum \limits _{n = 1}^N {\left| {h_{1,n}^v} \right| \left| {h_{2,n}^v} \right| } } \right) }^2}}}{{N\left( {1 - {\omega _v}} \right) }}\), in which, \({\lambda _v} = \frac{{N{\omega _v}}}{{1 - {\omega _v}}}\), \({\omega _v} = \frac{1}{{m_{1,n}^vm_{2,n}^v}}{\left( {\frac{{\Gamma \left( {m_{1,n}^v + 1/2} \right) }}{{\Gamma \left( {m_{1,n}^v} \right) }}} \right) ^2}\) \({\left( {\frac{{\Gamma \left( {m_{2,n}^v + 1/2} \right) }}{{\Gamma \left( {m_{2,n}^v} \right) }}} \right) ^2}\), where \(m_{i,n}^v\) are denoted fading parameters of \(h_{i,n}^v\). With N as a large number and applying the central limit theorem (CLT), \(X_v\) follows the noncentral chi-square distribution. Next, the PDF and CDF are given by [26]
and
4 Performance analysis for downlink
In this section, we derive the closed-form of COP, SOP, and ASR for user \(D_i\) with the downlink scenario.
4.1 COP analysis
4.1.1 COP OF \(D_1\)
The COP of user \(D_1\) is defined as the probability of an interruption occurring in the connection of user \(D_1\) when the connection of user \(D_2\) is also interrupted. Therefore, the COP of user \(D_1\) can be expressed by [44, 45]
where \({\gamma _{thi}} = {2^{{R_i}}} - 1\).
Proposition 1
The closed-form expression for COP at \(D_1\) is given by
where \(\varepsilon = \frac{{{m_{{g_d}}}\rho }}{{{\lambda _{{g_d}}}}}\), \(\rho = \max \left( {\frac{{{\gamma _{th2}}}}{{\left( {{\eta _2} - {\gamma _{th2}}{\eta _1}} \right) d_g^{ - \beta }\psi }},\frac{{{\gamma _{th1}}}}{{d_g^{ - \beta }{\eta _1}\psi }}} \right)\).
Proof
From (18), \(COP_{{D_1}}^d\) can be written as
We let \(\rho = \max \left( {\frac{{{\gamma _{th2}}}}{{\left( {{\eta _2} - {\gamma _{th2}}{\eta _1}} \right) d_d^{ - \beta }\psi }},\frac{{{\gamma _{th1}}}}{{d_d^{ - \beta }{\eta _1}\psi }}} \right)\), note that when we set power allocation coefficients, we need to ensure that \({\eta _2} - {\gamma _{th2}}{\eta _1} > 0\). Based on the CDF function of \({{{\left| g_d \right| }^2}}\) from (14), \(COP_{{D_1}}^d\) can be derived as
where \(\varepsilon = \frac{{{m_{{g_d}}}\rho }}{{{\lambda _{{g_d}}}}}\). The proof is now complete. \(\square\)
4.1.2 COP OF \(D_2\)
The COP of \(D_2\) occurs when \(D_2\) cannot detect correctly the own signal. So, the COP of \(D_2\) can be defined by
Proposition 2
The closed-form expression for COP at \(D_2\) is given by
Proof
From (22), \(COP_{{D_2}}^d\) can write as (24), as shown at the top of the next page.
Similar to (20), note that when we set power allocation coefficients, we need to ensure that \({\eta _2} - {\gamma _{th2}}{\eta _1} > 0\). The CDF of \({{{\left( {\sum \limits _{n = 1}^N {\left| {h_{1,n}^d} \right| \left| {h_{2,n}^d} \right| } } \right) }^2}}\) is given by (17). \(COP_{{D_2}}^d\) can be derived as
The proof is now finished. \(\square\)
4.2 SOP analysis
Assume the eavesdropper could decode sensitive information from BS by using multi-user detection techniques. Based on (7) and (14), the closed-form of user \(D_i\) can be given by [44]
where \({\mu _i} = \frac{{{m_{{g_e}}}{\xi _i}}}{{d_{{g_e}}^{ - \beta }{\eta _i}{\psi _e}{\lambda _{{g_e}}}}}\), \({\xi _i} = {2^{{R_i} - {R_{Ei}}}} - 1\).
4.3 ASR analysis
4.3.1 ASR OF \(D_1\)
The ASR of \(D_1\) can be expressed as [46]
where \({\left[ X \right] ^ + } = \max \left\{ {0,X} \right\}\) is to ensure the secrecy capacity strictly positive.
Proposition 3
The closed-form expression for ASR at \(D_1\) is given by
Proof
The details are given in Appendix A. \(\square\)
4.3.2 ASR OF \(D_2\)
The ASR of \(D_2\) can be expressed as [46]
Proposition 4
The closed-form expression for ASR at \(D_2\) is given by (30), as shown at the top of the next page, where \(\Theta = \frac{{{\eta _2}{t_k} + {\eta _2}}}{{2{\eta _1}}}\), \({t_k} = \cos \left[ {\frac{{\left( {2k - 1} \right) \pi }}{{2K}}} \right]\).
\(\square\)
Proof
The details are given in Appendix B. \(\square\)
5 Performance analysis for uplink
In this section, we derive the closed-form of COP, SOP, and ASR for user \(D_i\) with the uplink scenario.
5.1 COP analysis
5.1.1 COP OF \(D_1\)
If \(D_1\) is unable to accurately identify its own signal, the COP of \(D_1\) will occur. As a result, the COP for the uplink of \(D_1\) can be described as [26]
Proposition 5
The closed-form expression for COP at \(D_1\) is given by
where \(\delta = \frac{{{m_{{g_u}}}{\theta _1}{\theta _2}}}{{{\lambda _{{g_u}}}}}\), \({\theta _1} = \frac{{{\gamma _{th1}}}}{{d_g^{ - \beta }{\eta _1}{\psi _1}}}\), \({\theta _2} = \frac{{d_1^{ - \beta }d_2^{ - \beta }{\eta _2}{\psi _2}{\alpha ^2}}}{{N\left( {1 - {\omega _u}} \right) }}\).
Proof
The details are given in Appendix C. \(\square\)
5.1.2 COP OF \(D_2\)
Similarly to (31), when \(D_2\) is unable to appropriately identify its own signal, the COP of \(D_2\) happens. Consequently, the COP of \(D_2\) can be described as follows:
5.2 SOP analysis
The SOP of user \(D_i\) can be given by
where \({\chi _i} = \frac{{{m_{{g_{ei}}}}{\xi _i}}}{{d_{{g_{ei}}}^{ - \beta }{\eta _i}{\psi _{ei}}{\lambda _{{g_{ei}}}}}}\).
5.3 ASR analysis
5.3.1 ASR OF \(D_1\)
The ASR of \(D_1\) can be expressed as
Proposition 6
The closed-form expression for ASR at \(D_1\) is given by (36), as shown at the top of the next page, where \(\phi = \frac{{{m_{{g_u}}}}}{{d_g^{ - \beta }{\eta _1}{\psi _1}{\lambda _{{g_u}}}}}\).
\(\square\)
Proof
The details are given in Appendix D. \(\square\)
5.3.2 ASR OF \(D_2\)
The ASR of \(D_2\) can be expressed as
Proposition 7
The closed-form expression for ASR at \(D_2\) is given by
Proof
The details are given in Appendix E. \(\square\)
6 Simulation results and discussion
In this section, we define sim. and ana. as short for simulation and analytical. Next, we verify our theoretical analysis by using Monte-Carlo simulation.
In Fig. 2, we plot the COP for downlink versus \(\psi\) (dB) with varying the number of elements. First, it can be easily observed that the COP curve corresponds exactly to the Monte Carlo simulation results. The simulation points of \(D_1\) and \(D_2\) correspond well to the analytical results obtained from (19) and (22), respectively. Furthermore, when the \(\psi\) rises, so will the system COP’s performance. In terms of comparing the COPs of \(D_1\) and \(D_2\), the simulation results show that user \(D_2\) has the best scenario because it is assisted by IRS. In addition, the power allocation has a great impact on the COP performance. In addition, NOMA outperforms OMA for two users \(D_1\) and \(D_2\) in all SNR ranges.
Figure 3 illustrates the COP for downlink versus \(\psi\) (dB) with varying the number of elements N, we can see that the COP performance is improved by increasing the number of reflecting meta-surface elements N for \(D_2\). We can observe that the user \(D_2\) supported by IRS has better COP performance than the unsupported user \(D_1\). The research gap between two users \(D_1\) and \(D_2\) increases when N is large. Moreover, in the case without IRS, we can observe the COP performance of \(D_1\) is better than \(D_2\). This can be explained because the distance from BS to \(D_2\) is larger than \(D_1\). In Fig. 4, the impacts of the SOP for the downlink of \(D_1\) and \(D_2\) versus the transmit power \(\psi _E\) (dB) with varying the target data rate of two users. We can see that the SOP increases significantly with increasing \(\psi _E\) (dB). Under the intended parameters, the suggested NOMA method has somewhat lower secrecy outage performance than OMA in high transmission power locations.
Figure 5 depicts the ASR for downlink versus \(\psi\) (dB) varying the path loss \(\beta\), assumed to be K= 100 for the accuracy-complexity tradeoff parameter. First, it is obvious that ASR increases with transmit power \(\psi\) (dB). Second, the variation of \(\beta\) will change the ASR of two users \(D_i\). It means the ASR is decreased when \(\beta\) is increased. Finally, for \(D_2\), when \(\psi\) (dB) is large enough, ASR of \(D_2\) will converge at one point.
In Fig. 6, it plots the COP for uplink versus \(\psi _1 = \psi _2\) (dB) with varying the number of elements N. It is discovered that the simulation points of \(D_1\) and \(D_2\) correspond well to the analytical results obtained from (30) and (31), respectively. Then, we can observe that when the transmit \(\psi _1=\psi _2\) (dB) increases, the COP of \(D_1\) decreases and approaches a floor. Because of the uplink NOMA principle, \(D _2\)’s signal is viewed as interference when decoding \(D_1\)’s signal. Furthermore, when N increase, the performance COP of \(D_2\) is improve significantly.
Figure 7 shows the COP for the uplink of two users \(D_1\) and D with different fading values m = 1 and m = 2. It is apparent that m = 2 leads to a better channel, which is significant in improving the performance of destinations. The fundamental reason for this is those principal SINR and SNR expressions depend on channel gains. As a result, larger channel gains result in higher SINR and SNR, and outage performance can be improved.
Figure 8 shows the SOP for the uplink of two users \(D_1\) and \(D_2\) with different distances from \(D_1\) and \(D_2\) to E. We can see that the wider the distance between two users and E, the secrecy performance of the two users is better. This is because, as the distance increases, the power allocated to user \(D_2\) expands to meet its quality of service (QoS) requirements. As a result, the power assigned to user \(D_1\) will drop. Given a secrecy guard distance, two users perform better at a small distance than a large distance. In Fig. 9, the ASR curves for the uplink network of two users \(D_1\) and \(D_2\) are depicted. We observe that the simulated findings match the relevant analytical results obtained from (34) and (36). Then, we see that the ASR of user \(D_2\) also converges to a ceiling. Moreover, the distance \(d_1\) is large, which leads to a decrease in the ASR.
7 Conclusion
In this paper, we analyzed the secrecy performance for IRS-based downlink and uplink NOMA networks. Based on the proposed system, the closed-form of COP, SOP, and ASR are derived. All analytical results are verified by Monte Carlo simulations. We show numerical results for various secure performances under the influence of several parameters such as transmit SNR at the base station and the number of reflecting elements of IRS setup. In addition, the proposed IRS-based NOMA scheme is compared with OMA. The number of reflecting elements at the IRS and SNR level at the base station, as the major finding, contribute primarily to the improvement of security for IRS-aided NOMA systems.
Availability of data and materials
Please contact the corresponding author for data requests.
Abbreviations
- IRS:
-
Intelligent reflecting surface
- RIS:
-
Reflecting intelligent surface
- LIS:
-
Large intelligent surface
- SE:
-
Spectrum efficiency
- EE:
-
Energy efficiency
- TDMA:
-
Time division multiple access
- FDMA:
-
Frequency division multiple access
- CDMA:
-
Code division multiple access
- NOMA:
-
Non-orthogonal multiple access
- OMA:
-
Orthogonal multiple access
- MA:
-
Multiple access
- SC:
-
Superposition coding
- PD:
-
Power domain
- SIC:
-
Successive interference cancellation
- IoT:
-
Internet of thing
- PLS:
-
Physical layer security
- COP:
-
Connection outage probability
- SOP:
-
Secrecy outage probability
- ASR:
-
Average secrecy rate
- BS:
-
Base station
- AWGN:
-
Additive white Gaussian noises
- SINR:
-
Signal-to-interference-plus-noise ratio
- SNR:
-
Signal-to-noise ratio
- PIC:
-
Parallel interference cancelation
- CLT:
-
Central limit theorem
- PDF:
-
Probability density function
- CDF:
-
Cumulative distribution function
References
Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G.K. Karagiannidis, P. Fan, 6g wireless networks: vision, requirements, architecture, and key technologies. IEEE Veh. Technol. Mag. 14(3), 28–41 (2019). https://doi.org/10.1109/MVT.2019.2921208
M. Di Renzo, A. Zappone, M. Debbah, M.-S. Alouini, C. Yuen, J. de Rosny, S. Tretyakov, Smart radio environments empowered by reconfigurable intelligent surfaces: How it works, state of research, and the road ahead. IEEE J. Sel. Areas Commun. 38(11), 2450–2525 (2020). https://doi.org/10.1109/JSAC.2020.3007211
C. Liaskos, S. Nie, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, I. Akyildiz, End-to-end wireless path deployment with intelligent surfaces using interpretable neural networks. IEEE Trans. Commun. 68(11), 6792–6806 (2020). https://doi.org/10.1109/TCOMM.2020.3012577
E. Basar, M. Di Renzo, J. De Rosny, M. Debbah, M.-S. Alouini, R. Zhang, Wireless communications through reconfigurable intelligent surfaces. IEEE Access 7, 116753–116773 (2019). https://doi.org/10.1109/ACCESS.2019.2935192
M.H. Dinan, N.S. Perović, M.F. Flanagan, Ris-assisted receive quadrature space-shift keying: a new paradigm and performance analysis. IEEE Trans. Commun. 70(10), 6874–6889 (2022). https://doi.org/10.1109/TCOMM.2022.3198117
M. Jung, W. Saad, Y. Jang, G. Kong, S. Choi, Reliability analysis of large intelligent surfaces (liss): rate distribution and outage probability. IEEE Wirel. Commun. Lett. 8(6), 1662–1666 (2019). https://doi.org/10.1109/LWC.2019.2935190
S. Hu, F. Rusek, O. Edfors, Beyond massive mimo: the potential of data transmission with large intelligent surfaces. IEEE Trans. Signal Process. 66(10), 2746–2758 (2018). https://doi.org/10.1109/TSP.2018.2816577
I. Yildirim, A. Uyrus, E. Basar, Modeling and analysis of reconfigurable intelligent surfaces for indoor and outdoor applications in future wireless networks. IEEE Trans. Commun. 69(2), 1290–1301 (2021). https://doi.org/10.1109/TCOMM.2020.3035391
B.C. Nguyen, T. Manh Hoang, A.-T. Le, V.D. Nguyen, P.T. Tran, Performance analysis of intelligent reflecting surface aided full-duplex amplify-and-forward relay networks. Int. J. Commun. Syst. 35(10), 5172 (2022)
N.D. Nguyen, A.-T. Le, M. Munochiveyi, F. Afghah, E. Pallis, Intelligent reflecting surface aided wireless systems with imperfect hardware. Electronics 11(6), 900 (2022)
L. Dai, B. Wang, Z. Ding, Z. Wang, S. Chen, L. Hanzo, A survey of non-orthogonal multiple access for 5g. IEEE Commun. Surv. Tutor. 20(3), 2294–2323 (2018). https://doi.org/10.1109/COMST.2018.2835558
D.-T. Do, A.-T. Le, Noma based cognitive relaying: transceiver hardware impairments, relay selection policies and outage performance comparison. Comput. Commun. 146, 144–154 (2019)
D.-T. Do, A.-T. Le, B.M. Lee, Noma in cooperative underlay cognitive radio networks under imperfect sic. IEEE Access 8, 86180–86195 (2020). https://doi.org/10.1109/ACCESS.2020.2992660
D.-T. Do, A.-T. Le, Y. Liu, A. Jamalipour, User grouping and energy harvesting in uav-noma system with af/df relaying. IEEE Trans. Veh. Technol. 70(11), 11855–11868 (2021). https://doi.org/10.1109/TVT.2021.3116101
Y. Saito, A. Benjebbour, Y. Kishiyama, T. Nakamura, System-level performance evaluation of downlink non-orthogonal multiple access (noma). In: 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 611–615 (2013). https://doi.org/10.1109/PIMRC.2013.6666209
S.M.R. Islam, N. Avazov, O.A. Dobre, K.-s. Kwak, Power-domain non-orthogonal multiple access (noma) in 5g systems: potentials and challenges. IEEE Commun. Surv. Tutor. 19(2), 721–742 (2017). https://doi.org/10.1109/COMST.2016.2621116
H. Qiu, S. Gao, G. Tu, S. Zong, Position information-based noma for downlink and uplink transmission in mobile scenarios. IEEE Access 8, 150808–150822 (2020). https://doi.org/10.1109/ACCESS.2020.3017255
A.S.d. Sena, D. Carrillo, F. Fang, P.H.J. Nardelli, D.B.d. Costa, U.S. Dias, Z. Ding, C.B. Papadias, W. Saad, What role do intelligent reflecting surfaces play in multi-antenna non-orthogonal multiple access? IEEE Wirel. Commun. 27(5), 24–31 (2020). https://doi.org/10.1109/MWC.001.2000061
A.-T. Le, N.-D.X. Ha, D.-T. Do, A. Silva, S. Yadav, Enabling user grouping and fixed power allocation scheme for reconfigurable intelligent surfaces-aided wireless systems. IEEE Access 9, 92263–92275 (2021). https://doi.org/10.1109/ACCESS.2021.3092335
M. Munochiveyi, A.C. Pogaku, D.-T. Do, A.-T. Le, M. Voznak, N.D. Nguyen, Reconfigurable intelligent surface aided multi-user communications: state-of-the-art techniques and open issues. IEEE Access 9, 118584–118605 (2021). https://doi.org/10.1109/ACCESS.2021.3107316
A.-T. Le, D.-T. Do, H. Cao, S. Garg, G. Kaddoum, S. Mumtaz, Spectrum efficiency design for intelligent reflecting surface-aided iot systems. In: GLOBECOM 2022-2022 IEEE Global Communications Conference, pp. 25–30 (2022). https://doi.org/10.1109/GLOBECOM48099.2022.10000937
Z. Ding, H. Vincent Poor, A simple design of irs-noma transmission. IEEE Commun. Lett. 24(5), 1119–1123 (2020). https://doi.org/10.1109/LCOMM.2020.2974196
F. Fang, Y. Xu, Q.-V. Pham, Z. Ding, Energy-efficient design of irs-noma networks. IEEE Trans. Veh. Technol. 69(11), 14088–14092 (2020). https://doi.org/10.1109/TVT.2020.3024005
X. Mu, Y. Liu, L. Guo, J. Lin, N. Al-Dhahir, Exploiting intelligent reflecting surfaces in noma networks: joint beamforming optimization. IEEE Trans. Wirel. Commun. 19(10), 6884–6898 (2020). https://doi.org/10.1109/TWC.2020.3006915
M. Fu, Y. Zhou, Y. Shi, Intelligent reflecting surface for downlink non-orthogonal multiple access networks. In: 2019 IEEE Globecom Workshops (GC Wkshps), pp. 1–6 (2019). https://doi.org/10.1109/GCWkshps45667.2019.9024675
Y. Cheng, K.H. Li, Y. Liu, K.C. Teh, H. Vincent Poor, Downlink and uplink intelligent reflecting surface aided networks: noma and oma. IEEE Trans. Wirel. Commun. 20(6), 3988–4000 (2021). https://doi.org/10.1109/TWC.2021.3054841
G. Yang, X. Xu, Y.-C. Liang, Intelligent reflecting surface assisted non-orthogonal multiple access. In: 2020 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6 (2020). https://doi.org/10.1109/WCNC45663.2020.9120476
Z. Deng, Q. Li, Q. Zhang, L. Yang, J. Qin, Beamforming design for physical layer security in a two-way cognitive radio iot network with swipt. IEEE Internet of Things J. 6(6), 10786–10798 (2019). https://doi.org/10.1109/JIOT.2019.2941873
D.-T. Do, A.-T. Le, N.-D.X. Ha, N.-N. Dao, Physical layer security for internet of things via reconfigurable intelligent surface. Fut. Gener. Comput. Syst. 126, 330–339 (2022)
B. Schneier, Cryptographic design vulnerabilities. Computer 31(9), 29–33 (1998)
A. Mukherjee, S.A.A. Fakoorian, J. Huang, A.L. Swindlehurst, Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16(3), 1550–1573 (2014). https://doi.org/10.1109/SURV.2014.012314.00178
Z. Chu, W. Hao, P. Xiao, J. Shi, Intelligent reflecting surface aided multi-antenna secure transmission. IEEE Wirel. Commun. Lett. 9(1), 108–112 (2020). https://doi.org/10.1109/LWC.2019.2943559
M. Cui, G. Zhang, R. Zhang, Secure wireless communication via intelligent reflecting surface. IEEE Wirel. Commun. Lett. 8(5), 1410–1414 (2019). https://doi.org/10.1109/LWC.2019.2919685
L. Yang, J. Yang, W. Xie, M.O. Hasna, T. Tsiftsis, M.D. Renzo, Secrecy performance analysis of ris-aided wireless communication systems. IEEE Trans. Veh. Technol. 69(10), 12296–12300 (2020). https://doi.org/10.1109/TVT.2020.3007521
X. Yu, D. Xu, R. Schober, Enabling secure wireless communications via intelligent reflecting surfaces. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6 (2019). https://doi.org/10.1109/GLOBECOM38437.2019.9014322
J. Chen, Y.-C. Liang, Y. Pei, H. Guo, Intelligent reflecting surface: a programmable wireless environment for physical layer security. IEEE Access 7, 82599–82612 (2019). https://doi.org/10.1109/ACCESS.2019.2924034
J. Zuo, Y. Liu, E. Basar, O.A. Dobre, Intelligent reflecting surface enhanced millimeter-wave noma systems. IEEE Commun. Lett. 24(11), 2632–2636 (2020). https://doi.org/10.1109/LCOMM.2020.3009158
X. Liu, Y. Liu, Y. Chen, H.V. Poor, Ris enhanced massive non-orthogonal multiple access networks: deployment and passive beamforming design. IEEE J. Sel. Areas Commun. 39(4), 1057–1071 (2021). https://doi.org/10.1109/JSAC.2020.3018823
C. Gong, X. Yue, X. Wang, X. Dai, R. Zou, M. Essaaidi, Intelligent reflecting surface aided secure communications for noma networks. IEEE Trans. Veh. Technol. 71(3), 2761–2773 (2022). https://doi.org/10.1109/TVT.2021.3129075
Z. Tang, T. Hou, Y. Liu, J. Zhang, L. Hanzo, Physical layer security of intelligent reflective surface aided noma networks. IEEE Trans. Veh. Technol. 71(7), 7821–7834 (2022). https://doi.org/10.1109/TVT.2022.3168392
J. Chen, L. Yang, M.-S. Alouini, Physical layer security for cooperative noma systems. IEEE Trans. Veh. Technol. 67(5), 4645–4649 (2018). https://doi.org/10.1109/TVT.2017.2789223
K. Cao, H. Ding, B. Wang, L. Lv, J. Tian, Q. Wei, F. Gong, Enhancing physical layer security for iot with non-orthogonal multiple access assisted semi-grant-free transmission. IEEE Internet of Things J. 1–1 (2022). https://doi.org/10.1109/JIOT.2022.3193189
J. Men, J. Ge, C. Zhang, Performance analysis of nonorthogonal multiple access for relaying networks over nakagami-m fading channels. IEEE Trans. Veh. Technol. 66(2), 1200–1208 (2017). https://doi.org/10.1109/TVT.2016.2555399
Y. Song, W. Yang, Z. Xiang, B. Wang, Y. Cai, Secure transmission in mmwave noma networks with cognitive power allocation. IEEE Access 7, 76104–76119 (2019). https://doi.org/10.1109/ACCESS.2019.2920963
X. Li, M. Zhao, M. Zeng, S. Mumtaz, V.G. Menon, Z. Ding, O.A. Dobre, Hardware impaired ambient backscatter noma systems: reliability and security. IEEE Trans. Commun. 69(4), 2723–2736 (2021). https://doi.org/10.1109/TCOMM.2021.3050503
X. Liu, Average secrecy capacity of the weibull fading channel. In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 841–844 (2016). https://doi.org/10.1109/CCNC.2016.7444897
I.S. Gradshteyn, I.M. Ryzhik, Table of Integrals, Series, and Products. Academic press (2014)
A.M. Mathai, R.K. Saxena, H.J. Haubold, The H-function: Theory and Applications. Springer (2009)
P. Mittal, K. Gupta, An integral involving generalized function of two variables. In: Proceedings of the Indian Academy of Sciences-section A, vol. 75, pp. 117–123 (1972). Springer
Acknowledgements
Not applicable.
Funding
The research was co-funded by the European Union within the REFRESH project - Research Excellence For REgion Sustainability and High-tech Industries ID No. CZ.10.03.01/00/22_003/0000048 of the European Just Transition Fund and by the Ministry of Education, Youth and Sports of the Czech Republic (MEYS CZ) through the e-INFRA CZ project (ID:90254) and also by the MEYS CZ within the project SGS ID No. SP 7/2023 conducted by VSB-Technical University of Ostrava.
Author information
Authors and Affiliations
Contributions
All authors equally contributed to the work. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing Interests
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A
From (27), \(Z_1^d\) can be written by
Next, the formula for \({F_{\gamma _{{D_1}}^{{d,1}}}}\left( x \right)\) is as follows
From (40) into (39), \(Z_1^d\) can be given by
where the Meijer G-function is \(G_{p,1}^{m,n}\left( . \right)\) [47, Eq. (9.301)]. Moreover, we employ the equalities [48, Eq. (2.6)] as
With the extra help of [47, Eq. (7.811.5)], \(Z_1^d\) can be written by
From (27), \(Z_2^d\) can be written by
According to (14), \({F_{\gamma _E^{{d,1}}}}\left( x \right)\) can be given by
From (45) into (44), and base on (42), \(Z_2^d\) can be formulated as
Similar to (43), with the aid of the [47, Eq. (7.811.5)], \(Z_2^d\) can be written by
We can obtain (28) by converting (43) and (47) into (27).
Appendix B
From (29), \(W_1^d\) can be written by
According to (17) and (23), \({F_{\gamma _{{D_2}}^{d,2}}}\left( x \right)\) can be given by
From (49) into (48), and \(W_1^d\) has to meet the requirement that \(x < \frac{{{\eta _2}}}{{{\eta _1}}}\). So, \(W_1^d\) can be expressed as
Applying Gaussian–Chebyshev quadrature [47], \(W_1^d\) is given by
where \(\Theta = \frac{{{\eta _2}{t_k} + {\eta _2}}}{{2{\eta _1}}}\), \({t_k} = \cos \left[ {\frac{{\left( {2k - 1} \right) \pi }}{{2K}}} \right]\).
Similarly, \(Z_2^d\), \(W_2^d\) can be written as
We can obtain (30) by converting (51) and (52) into (29).
Appendix C
From (31), \(COP_{{D_1}}^{u}\) can be given by (53), as shown at the top of the next page, where \({\theta _1} = \frac{{{\gamma _{th1}}}}{{d_g^{ - \beta }{\eta _1}{\psi _1}}}\), \({\theta _2} = \frac{{d_1^{ - \beta }d_2^{ - \beta }{\eta _2}{\psi _2}{\alpha ^2}}}{{N\left( {1 - {\omega _u}} \right) }}\).
Next, the CDF function of \({{{\left| g_u \right| }^2}}\) and the PDF of \({{{\left( {\sum \limits _{n = 1}^N {\left| {h_{1,n}^u} \right| \left| {h_{2,n}^u} \right| } } \right) }^2}}\) are given by (14) and (16), respectively. \(COP_{{D_1}}^{u}\) can be derived as (54), as shown at the top of the next page, where \(\delta = \frac{{{m_{{g_u}}}{\theta _1}{\theta _2}}}{{{\lambda _{{g_u}}}}}\).
Then, using the [47, Eq. (1.111)], \(COP_{{D_1}}^{u}\) may be written by
The equation (32) can be attained from (55) with the aid of the [47, Eq. (3.381.4)].
Appendix D
Like (39) and (35), \(Z_1^{u}\) can be written by
According to (32), the formula for \({F_{\gamma _{{D_1}}^{{u}}}}\left( x \right)\) is as follows
where \(\phi = \frac{{{m_{{g_u}}}}}{{d_g^{ - \beta }{\eta _1}{\psi _1}{\lambda _{{g_u}}}}}\).
As seen at the top of the following page, (58) can provide \(Z_1^{u}\) from (57) into (56).
We employ the equalities [48, Eq. (2.6)] in (58) as
From (58), with the help of the [49, Eq. (2.3)], \(Z_1^{u}\) can be written by (62), as shown at the top of the next page, where \(H\left[ { \cdot , \ldots , \cdot } \right]\) is the multivariable Fox’s H-function whose definition in terms of multiple Mellin–Barnes type contour integral is given in [48].
From (35) and similar (44), \(Z_2^{u}\) can be written by
The formula for calculating \({F_{\gamma _E^{u,1}}}\left( x \right)\) using (14) and (34) is as follows
Based on (42) and (64) into (63), \(Z_2^{u}\) can give by
In a manner similar (47), with the assistance of [47, Eq. (7.811.5)], \(Z_2^{u}\) can be written by
We can obtain (36) by converting (62) and (66) into (35).
Appendix E
From (37) and similar to (48), \(W_1^{u}\) can be written by
Based on (33) \({F_{\gamma _{{D_2}}^{u}}}\left( x \right)\) can be calculated by
Based on (42) and (68) into (67), \(W_1^{u}\) can give by
Similar to (47), with the assistance of the [47, Eq. (7.811.5)], \(W_1^{u}\) can be written by
Similar to \(Z_2^{u}\), \(W_2^{u}\) can write as
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Le, SP., Nguyen, HN., Nguyen, NT. et al. Physical layer security analysis of IRS-based downlink and uplink NOMA networks. J Wireless Com Network 2023, 105 (2023). https://doi.org/10.1186/s13638-023-02309-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638-023-02309-5