On the performance of physical layer security in virtual full-duplex non-orthogonal multiple access system

This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a trusted decode-and-forward (DF) HD relay is used in this system to improve the spectral efficiency. In order to prevent the untrusted relay from eavesdropping, a simple and practical cooperative jamming scheme is designed to confuse the untrusted relay. The exact expressions of effective secrecy throughput (EST) for NOMA users and approximate expression of EST for non-NOMA user are derived. All theoretical results are validated by numerical simulations which demonstrate that the proposed VFD-NOMA scheme is superior to existing HD-NOMA scheme in cooperative system and jamming plays an important role for obtaining acceptable EST. In addition, simulation results shows that the best secrecy performance highly depends on the system parameters such as transmit powers and jamming signal power.

the relay isolates the transmit and receive signals in two orthogonal time slots or frequency channels.To avoid this issue, full-duplex (FD) is proposed as a promising technique for the next generation wireless systems, because it can double the spectrum efficiency by realizing transmission and reception on the same carrier frequency, simultaneously [4].Two main types of FD relay techniques, namely FD amplify-and-forward (AF) relaying and FD decode-and-forward (DF) relaying, have been discussed in [5,6].The authors in [7] propose an energy-efficient oriented algorithm for FD cooperative NOMA systems and demonstrate both significant energy-efficient and throughput enhancements over the HD cooperative NOMA and the prefixed FD cooperative NOMA regime.However, the significant amount of self-interference (SI) between transmitting and receiving radio frequency chains means that the performance of FD relay is degraded by the residual SI [8].In [9], the authors provide a characterization of the distribution of the self-interference before and after active cancellation mechanisms.In [10], the author analyzed the outage probability, ergodic rate and energy efficiency of FD user relaying with imperfect SI cancellation.
Alternatively, we may instead consider a distributed version of a FD system, called virtual FD (VFD), where a pair of HD relays receive and transmit signals successively to imitate the operation of FD relay.This idea inherits the benefits of the FD system, while each relay requires only a single antenna, and the physical separation between the two HD relays eliminates the SI problem perfectly [8].The combination of NOMA and VFD will further improve the spectrum efficiency.In [11], the authors found that VFD-NOMA system achieves a lower outage probability and a higher ergodic rate than the existing successive relaying OMA system and ideal FD-NOMA system.However, secrecy transmission of VFD cooperative NOMA system still remains unexplored.
In future networks, the ubiquitous connectivity makes our privacy and secrecy expose to radio space.Security becomes a major concern when designing communication systems.Due to the broadcast nature of radio propagation, wireless communication is vulnerable to be eavesdropped [12].In relay-assisted NOMA networks, when the relay is untrusted, it may exploit these weaknesses to its benefit and behave as a passive eavesdropper who tries to listen in on an ongoing transmission [13].Cooperative jamming has been become a promising technique to protect the transmission in untrusted relay OMA networks [14].Authors in [15] describe the evolution of cooperative jamming transmission strategies from point-to-point channels to multiple antenna systems, followed by generalizations to larger multiuser networks.Choi and Lee [16] proposed a new cooperative jamming technique for an AF relay network with multiple relays, and the simulation results showed that the network with the proposed technique provides lower secrecy outage probability than a conventional scheme.The internal jamming strategy is employed in [17], where the legitimate user is enlisted as a jammer to distract the untrusted relay and adopts SI cancellation to eliminate the jamming.Yuan et al. [18] analyzed cooperative NOMA scheme, where the source actively sends jamming signals, while the relay is forwarding, thereby enhancing the security of intended communication links.In [19], a two-stage FD jamming scheme is proposed to ensure the secure transmission of cooperative NOMA users.Although beamforming of relay was designed in this paper to cancel the SI, when the estimation error of the channel state information (CSI) cannot be ignored, or the number of antennas at the relay is not enough to perform the beamforming, the residual self-interference channel still has to be considered.In this case, VFD-NOMA system is more practical because physical separation of relays eliminates the SI problem perfectly.But until now, there are few studies on the security performance of VFD-NOMA system.
According to the above references, this paper studies the cooperative VFD-NOMA transmission and investigated its secrecy performance with the presentence of an untrusted relay.The VFD system consists an untrusted AF relay and a trusted DF relay.Two users are served by the trusted relay using cooperative NOMA, and only one user is served by the untrusted relay because the untrusted relay is an eavesdropper.We assume that the untrusted relay can obtain messages of all users.A new cooperative jamming strategy is adopted to secure the transmission of untrusted relay link.The jamming signal transmitted by only one user is utilized to confuse the untrusted relay.The exact effective secrecy throughput (EST) expressions for NOMA users and approximate EST expression for non-NOMA user are derived, which shows that the jamming is indispensable for achieving nonzero EST.Our principal motivations and contributions are summarized as follows.
• As mentioned above, the combination of NOMA and VFD can improve the frequency efficiency and eliminate the residual SI of FD relaying simultaneously, but when we use VFD in a NOMA system, a pair of relays must be employed to form a VFD system and one of the relays may be an eavesdropper.There is still a paucity of research contributions on investigating the security issues of NOMA in a VFD system, which is the motivation of this paper.In order to improve the spectral efficiency, eliminate the residual SI of FD relaying and prevent untrusted relay eavesdropping simultaneously, we integrate NOMA, VFD and untrusted relay together and introduce a VFD relaying NOMA scheme in this study.The application scenario of this study is that multiple relays with one antenna can be employed to forward information, but some relays have poor credibility and could be eavesdroppers.We assume that in VFD relay system, one relay is trusted and the other is untrusted.To guarantee the secure transmission, a new cooperative jamming strategy is adopted to distract the untrusted relay.It is differing from [20] where jamming is transmitted by both the two users and our scheme saves the jamming power.• The novelty of this study is that a novel cooperative jamming strategy is adopted to secure the untrusted relay VFD-NOMA networks and the EST expressions are derived to obtain further insights into parameters on system performance, which shows that there exist the optimal values of source power, relay power and jamming power.These findings are of great theoretical value for practical secure communication.
The rest of this paper is organized as follows.In Sect.2, we introduce the system model.The closed-form expressions of EST are derived in Sect.3. Numerical and simulations results are presented in Sect.4, and conclusions are drawn in Sect. 5.

System model
As shown in Fig. 1, we consider a cooperative VFD-NOMA system, which consists of a source (S), a trusted DF relay (R), an untrusted AF relay (E) and three users (m, n, p).m is close to n, but they are far away from p.We assume that there do not exist direct links between S and users.R and E are willing to help the transmission.R can forward the information for m and n using NOMA, but it cannot forward information for p because they are too far apart.E is closer to p than R and can forward the information for p.But E is untrusted and can be regarded as potential Eves, so there is risk of leaking information of all users to E. and h Ep 2 are assumed to be exponentially distribution, and the corresponding instantaneous signal-to-noise ratios (SNRs) P S h SR 2 /N 0 , /N 0 and P E h Ep 2 /N 0 are also expo- nential random variables with parameters 1 , 2 , 3 , 4 , 5 and 6 , , respectively.P S , P R and P E are the transmission power at S, R and E, respectively.We also assume that with- out loss of generality, channel gains are sorted as h Rm 2 < h Rn 2 .The protocol of the VFD-NOMA scheme is divided into three equal time slots which is stated as follows.
During the first time slot, S broadcasts a superimposed mixture where x m and x n are the signals for m and n, respectively, and E x 2 m = E x 2 n = 1.( E(•) denotes the expectation of a random variable.)Based on well-known Wyner secrecy code theorem [21], x m and x n are coded as τ m,t , τ m,s and τ n,t , τ n,s , respectively, where τ m,t and τ n,t are the codeword rates, and τ m,s and τ n,s are secrecy rates.a m and a n are the power split factors of signals x m and x n , respectively.Note that a m + a n = 1 and a m > a n according to the principle of NOMA.In order to reduce the risk of leaking the information of m and n to E, at the same time, p is chosen to transmit a jamming signal to confuse E which is shown in the first part of Fig. 1.The observations at R and E are given by (1) x s = a m P S x m + a n P S x n , where n R and n E are the additive white Gaussian noises, x 0 is the jamming signal, and P I is the power of the received jamming at E. (The setting of P I in our model is the same as [22].We can also set an jamming transmission power at p and then consider the impacts of jamming power and jamming channel fading on the performance, but it will increase analysis complexity and we will discuss this setting in the future.In the numerical results part of this paper, we will investigate the impact of different values of P I on the system performance.)As p and R are too far apart, there is no jamming signal in (2).
R is assumed to have the ability to apply successive interference cancellation (SIC).According to the principle of SIC, x m is demodulated with the interference of x n , because x m is allocated more power, and when x m is demodulated successfully, x n can be directly demodulated after subtracting the interference of x m [23].The received signal-to-interfer- ence-and-noise ratio (SINR) for decoding x m at R can be written as After R successfully demodulates the signal of m, the interference from m can be eliminated by SIC.The SINR for decoding x n at R can be written as We consider the worst case that E has the ability to apply SIC and can always eliminate the interference from x m while demodulating x n .The SINRs of E wiretapping the mes- sage of m and n in first time slot can be written as During the second time slot, R re-encodes x m and x n and forwards it to m and n.The observations at m and n are given by When m and n demodulate the message of m, the SINRs can be expressed as (2) After n successfully demodulates the signal of m, the received SINR at n to decode its own signal is When R forwards the messages to m and n in this time slot, S transmits a new signal x p of p to E with transmission power of P S at the same time.Based on Wyner secrecy code theorem, x p is coded as τ p,t , τ p,s , where τ p,t is the codeword rate and τ p,s is secrecy rate.E can also receive the signal from R at this phase which is shown in the second part of Fig. 1.Similar to the first time slot, p also transmits the jamming signal x 0 to E at this time slot.The observation at E is given by With this SINR, E can wiretap the message of m, n and p. x p is decoded first because it has the most power, then x m is decoded, and x n is decoded at the end.The SINRs of E wiretapping the messages in this time slot can be written as We assume that x 0 is known by m and n and the corresponding term related to the jam- ming signal can be eliminated in ( 8) and ( 9).(This is a common assumption in the jamming literature [24][25][26][27] where the pre-defined jamming signal can be generated by using some pseudorandom codes that are known to m and n but not available to the curious untrusted relay.(17) y p = Gh Ep y E,2 + n 0 .
Following the principle of SIC, the jamming signal is demodulated and deducted from superposition signal by p completely, before it demodulates its intended messages.The SINR for p to decode its own message is given by Remarks: (1) From the above description of the proposed protocol, we can see that in order to complete a secure communication, R needs to decode twice and recode once, m and p need to decode once and n needs to decode twice.The computational complexity of the proposed protocol is not very high.
(2) In our protocol, the source is responsible for the algorithm design.As there are only two relays in our system, common training processes of individual channels from source to relay and then to destination can be used to acquire the required CSI [28][29][30].In addition, we use jamming not encryption in our protocol and no routing is required, so there is no overhead other than training processes.

Security performance analysis
In this section, we adopt EST as the metric of secrecy performance which considers the reliability performance and secrecy performance holistically.The exact EST expressions of m and n and approximate EST expression of p are derived in the following parts.The EST of m is expressed as where Pr (•) represents the probability that the expressions in brackets hold and γ E→m is expressed as (20) indicates that the SINR of E wiretapping the message of m is the maximum eavesdropping SINR of the first time slot and the second time slot.Substituting ( 4), ( 6), (10) and ( 15) into (19), we can obtain where θ 1 = 2 3τ m,t − 1 and θ 2 = 2 3(τ m,t −τ m,s) − 1 .Following the channel assumption pre- viously, we can get (18) where ρ I = P I /N 0 .We have to notice that a m − θ 1 a n > 0 must be satisfied, if not, η m will be zero.Submitting ( 22) into ( 19), we can get the closed-form EST expression of m which can be written as Similarly, the EST of n is expressed as where γ E→n = max γ E→n,1 , γ E→n,2 .Similar to the analysis above, ( 24) can be expressed as where g = max θ 1 (a m −θ 1 a n ) , θ 3 a n , θ 3 = 2 3τ n,t − 1 and θ 4 = 2 3(τ n,t −τ n,s) − 1.

Numerical results and discussion
In this section, computer simulations are performed to validate the above theoretical analysis.We introduce the channel model Figure 2 illustrates the performance of the proposed scheme and HD-NOMA versus P S with P R = −18 dB , P I = 24 dB and P E = 15 dB .The HD-NOMA system with two relays requires a total of 4 equal orthogonal time slots which is similar to [32].The transmission detail of HD-NOMA is shown in Table 1.It can be observed that simulation and theoretical results match very well with each other for m and n and the approximate analysis for is accurate because Y is very large in our setting which is very consistent with the actual communication scenario.Significantly, the EST of all users first increases and then decreases due to the increase of P S , which demon- strates that increasing P S cannot always improve EST as high P S increases the risk (35) of eavesdropping.It also shows that there exists an optimal P S of our scheme to maximize EST for all users and this optimal value can easily be obtained by a onedimensional exhaustive search.Compared with HD-NOMA, the user p attains worse performance for any P S , but one time slot can be saved in our scheme and this perfor- mance gap narrows when the optimal value of P S is obtained.In addition, our scheme outperforms HD-NOMA for users m and n when P S is small.All of the above state- ments illustrate the practical feasibility of our scheme.Figure 3 shows the EST of users versus P R with P S = −6 dB , P I = 24 dB and P E = 15 dB .For m and n of VFD-NOMA, it is shown that the analytical curves per- fectly match the Monte Carlo simulation results and EST of m and n first increases and then decreases as high P R increases the risk of eavesdropping for both two schemes.The optimal value of P R to maximize the EST of m and n can also easily be by a one-dimensional exhaustive search.For p, Fig. 3 confirms the close agreement between the simulation and approximate analytical results.We can also see that the performance of p in HD-NOMA does not affect by P R , but the perfor- mance of p in our scheme decreases as P R increases which is because P R is considered as interference when E forwards the information of p.In addition, it is seen that when  P R is small, the change of P R does not affect the performance of p in our scheme.
Although the existing HD-NOMA outperforms our protocol in some cases, our scheme can save one time slot and this performance gap is acceptable in actual communication scenario.Since the theoretical analyses agree well with the simulations, we will only plot the analytical results in the remaining figure.Figure 4 plots the performance of our scheme and HD-NOMA versus P I with P S = −6 dB , P R = −18 dB and P E = 15 dB .We can observe that for m and n, increas- ing P I can improve the EST, but 28dB is enough and no more power is needed.This result can help us saving interference signal power in actual communication scenario.We can also find that for p, increasing P I cannot always improve EST as high P I reduces the efficiency of the amplifier and the optimal value of P I for p is basically the same as m and n.

Conclusion
In this paper, we studied the secrecy performance in VFD-NOMA networks.A VFD relaying scheme with an untrusted AF-HD relay and a trusted DF-HD relay is used in this system to improve the spectral efficiency where cooperative jamming is designed to confuse the untrusted relay.The exact and approximate expressions for EST are derived which shows that jamming is necessary for secure transmission and the powers of S, R and jamming should be carefully considered to improve secrecy performance and save the system energy consumption.From the simulation results, we can see that the proposed VFD-NOMA scheme is more practical than existing HD-NOMA scheme.As future work, the imperfect SIC receiver and adaptive power split factors can be further investigated.
Fig. 3 The EST of users m, n and p versus P R

Fig. 1
Fig. 1 Illustration of a VFD-NOMA network in the presence of the security threat from untrusted relay
where d ij is the distance between node i and j, and α = 3 is the path loss exponent.The other parameters are set as follows: d SR = 20 m, d SE = 30 m, d RE = 20 m, d Rm = 40 m, d Rn = 20 m, d Ep = 40 m, R m,t = R n,t = 0.8 bits/s/Hz, R p,t = 0.4 bits/s/Hz, R m,s = R n,s = 0.4 bits/s/Hz, R p,s = 0.2 bits/s/Hz, a m = 9/10 , a n = 1/10 and N 0 = −50 dB.

Fig. 2
Fig.2The EST of users m, n and p versus P S All nodes are configured with one antenna and operate in HD mode.The channels between any transmitter and receiver are assumed to experience independent block Rayleigh fading, and the additive white Gaussian noise of all links has a zero mean and equal variance N 0 .The channel coefficients between nodes are known as follows: h SR denotes channel coefficient between S and R, h SE denotes channel coef- ficient between S and E, h RE denotes channel coefficient between R and E, h Sm denotes channel coefficient between R and m, h Sn denotes channel coefficient between R and n, h Ep and denotes channel coefficient between E and p.The channel power gains of those hops h SR 2 , h SE 2 , h RE 2 , h Rm 2 , h Rn 2 = h SE P S x p + h RE a m P R x m + a m P R x n + P I x 0 + n 0 .
Transmission of the jamming signal from p to m and n can be accomplished by implementing the destination-based cooperative jamming technique.)Duringthethirdtime slot, E relays y E,2 to p using AF protocol with amplifying coefficientG = P E / P S h SE 2 + P R h RE 2 + P I + N 0 .The received signal at p can be written as

Table 1
Transmission of HD-NOMA