This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices

Sapna Thapar,  Deepak Mishra,  and
Ravikant Saini
S. Thapar and R. Saini are with the Department of Electrical Engineering, Indian Institute of Technology Jammu, Jammu, Jammu &\& Kashmir 181 221, India (e-mail: [email protected]; [email protected]). D. Mishra is with the School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia (e-mail: [email protected]).This research work was supported by the Science and Engineering Research Board, DST, India under Grant CRG/2021/002464.
Abstract

The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a non-orthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing the resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation (SIC), we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate an interesting observation that the conventional decoding order and assigning more power allocation to the weak device, as presumed in many works on NOMA, is not an optimal strategy from the secrecy fairness viewpoint. Also, the average percentage gain of about 22.75%22.75\%, 50.58%50.58\%, 94.59%94.59\%, and 98.16%98.16\%, respectively, is achieved by jointly optimized solution over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation).

Index Terms- Non-orthogonal multiple access, physical layer security, secrecy fairness, imperfect SIC, joint optimization.

I Introduction

The adoption of the Internet of Things (IoT) in the industrial domain, i.e., the industrial IoT (IIoT), is rapidly becoming essential in creating hyper-connected cyber-physical networks in several verticals such as electricity, transportation, automation, healthcare, and manufacturing [1], [2]. IIoT is a network of industrial devices connected to the Internet using state-of-the-art information and communications technologies to create a system that can capture, analyze, monitor, and exchange real-time data. However, due to the constraints of the scarce spectrum, connecting billions of IIoT devices in a wireless network is a challenge. Also, due to the broadcast nature of wireless transmission, the security of confidential information associated with IIoT devices is a severe concern [3], [4].Consequently, there has been an increase in research interest in secure data transmission from academia and industry in various scenarios, including multiple input multiple output (MIMO), [5], non-orthogonal multiple access (NOMA) [6], intelligent reflecting surface [7], unmanned aerial vehicle assisted mobile edge computing networks [8], [9], etc.

As a favourable solution to realize massive connectivity over limited resources in IIoT, NOMA has recently drawn an increasing amount of research efforts [6]. It allows multiple devices to share the same resource block (i.e., same time, frequency, and code), alleviating the spectrum shortage problem. For information confidentiality in wireless transmissions, physical layer security (PLS) techniques are recently emerging as a promising solution. The basic concept of PLS is to exploit the randomness of wireless channels and interference to enhance the signal reception at legitimate devices while reducing the signal reception at eavesdropping devices [10], [11]. Thus, by incorporating NOMA and PLS, a spectrally-efficient and secure wireless communication network can be envisioned for IIoT.

I-A Related Works

Recently, many works have utilized NOMA to ensure massive connectivity requirements in different scenarios for IIoT [12], [13], [14]. However, because of the broadcast nature of the wireless transmission channel, potential adversaries can cause a security risk to communication in NOMA-enabled IIoT networks. Many existing works have considered PLS techniques to protect NOMA networks in different scenarios. For example, in [15], the authors optimized the resource allocation in terms of decoding order, power allocation, and data rate to protect the information associated with the intended device. In [16], the authors derived the optimal power allocation to maximize the achievable secrecy sum rate at devices for a single-input single-output NOMA network. In [17], a novel beamforming scheme that exploits artificial noise to improve the secrecy performance at devices in a multiple-input single-output network was proposed. In [18], a NOMA-assisted secure computation offloading was investigated under an eavesdropping attack, where a wireless user is paired with an edge-computing user to provide cooperative jamming to the eavesdropper while gaining the opportunity to transmit its data. In addition to eavesdropping, other attack modes like jamming were investigated in [19], where intelligent learning-based algorithms, such as Q-learning algorithms, were used to counter the intelligent attackers. Also, in [20], an artificial noise-aided beamforming approach was proposed to achieve secure communication in a large-scale NOMA network with randomly dispersed devices.

The studies cited above [15]-[20] were limited to the security issue of multiplexed NOMA devices against external eavesdropping devices. However, the multiplexed devices sharing the same resource block also can be potential eavesdroppers intercepting the confidential information of each other [21], [22]. Therefore, we should consider an antagonistic network in which each device is assumed to be untrusted. An untrusted scenario is a hostile but realistic situation in which no device trusts others and wants to safeguard its own confidential information. As a result, it becomes essential to allocate resources in the network in such a way that the secrecy of each device is ensured against the other multiplexed untrusted devices, which is a relatively more complex problem.

Assuming the strong device (with better channel gain) as trusted and the weak device (with poorer channel gain) as untrusted for a two-device NOMA network, the authors derived the secrecy outage probability (SOP) for the strong device in [21]. Similarly, [23] analyzed the sum secrecy rate of the strong devices against weak devices for a multiple-input single-output network. In [24], the SOP was investigated for the strong device against the untrusted weak device for a friendly jammer relay scenario. In contrast, [25] considered the strong device as untrusted, and analyzed the optimal power allocation for a secure NOMA network by adjusting the order of successive interference cancellation (SIC) and utilizing a cooperative jammer. Likewise, in [26], a directional demodulation based method was proposed to secure the data of the weak device against the strong device. Furthermore, to safeguard the data of each NOMA device from the other, the authors proposed a linear precoding approach in [27]. Similarly, to obtain a positive secrecy rate for each device against the other device in a two-device NOMA-enabled network, an optimal decoding order was explored in [22], and SOP and its optimization over power allocation were derived for each device. In [28], the ergodic secrecy rate performance was analyzed for each possible decoding order in an untrusted NOMA network, and then, the optimal decoding order was identified.

I-B Research Gap and Motivation

Notwithstanding the gainful results in handling secrecy issues among untrusted devices in NOMA-enabled networks, several works, e.g. [21], [23]-[27], over-optimistically considered that the devices could perform perfect SIC. According to this ideal setup, the interference from previously decoded devices is fully subtracted when the signal associated with the later devices is decoded. Thus, the decoded devices do not interfere with other devices. This strong assumption makes the system model simple and might not be realistic. In a practical scenario, the devices are resource-constrained to perform perfect SIC due to various practical implementation issues in IIoT networks, such as hardware limitation, inaccurate calibration, estimation error, multiple types of noise, and complexity scaling [29]. Consequently, imperfect SIC, where the residual interference (RI) from the formerly imperfectly decoded devices inevitably abides while decoding the signals of subsequent devices [29], should be taken at receivers while doing any investigation on NOMA.

In the literature of NOMA, some research works considered the RI as a particular constant value [30], [31], referred to as the Constant RI Model. In contrast, many other works took the RI as a linear function of the power assigned to the interfering signal [29], [32], referred to as the Linear RI Model. Nevertheless, there seem to be fewer studies that have considered the impact of RI while handling the secrecy issue in untrusted NOMA networks. The authors in [22] analyzed the secrecy performance of devices in an untrusted NOMA network with imperfect SIC but considered the constant RI model. However, the RI obtained from decoded devices may not be a constant value in practice. The constant RI is a strong and unrealistic assumption that over-simplifies the model and leads to prediction errors. In contrast, realistic influence of imperfect SIC may be observed with the linear RI model since decoders’ performance significantly depends on the interfering signal’s power. Motivated by this solid observation, in this work, we mainly focus on obtaining a secure NOMA-enabled IIoT network in the presence of untrusted devices, considering the effect of imperfect SIC at receivers with a linear RI model.

Note that [28] explored a secure NOMA network with a linear RI model, but the investigation was carried out for maximizing ergodic secrecy performance for each device. However, this article fills a significant gap in the literature by optimizing resources to maximize secrecy fairness among devices, which has not yet been studied in the literature. Note that fairness is an important performance metric in order to guarantee the achievable rates for weak devices, as considered in many works in the literature [22], [33]. It is because focusing exclusively on the sum rate may result in substantial rate loss for weak devices, as the system tends to allocate most of the communication resources to strong devices when the sum rate is maximized. The weak devices may even be unable to be served in some extreme cases. Thus, in this work, the fundamental basis for studying secrecy fairness is that weak devices may also obtain enough communication resources similar to strong devices so that there is no loss in the achievable secrecy rate performance for weak devices. Therefore, by following [22], [33], we in this work focus on maximizing secrecy fairness between devices, where we maximize the minimum secrecy rate between devices.

To optimize the network’s secrecy fairness performance, the decoding order and power allocation to the multiplexed devices are the two key parameters. In the literature, many research works are limited to the conventional decoding order of NOMA. However, we may change the decoding sequence for each device [22], [28], [34]. The fact is that SIC is a physical layer capability that allows receiving ends to extract the superimposed signal. Thus, any device can decode a signal of itself or others at any stage resulting in various decoding orders. Besides, most existing literature assumes that NOMA is based on more power allocation to the device with weaker channel conditions, which is not true [35]. Therefore, it would be interesting to investigate if the conventional approach of decoding order and power allocation is optimal from the secrecy fairness viewpoint. Encouraged by these substantial observations, in this work, we jointly optimize the resources, such as decoding order and power allocation, for maximizing the secrecy fairness between devices.

I-C Main Contributions

The key contributions of this paper are summarized below:

  • We focus on achieving a secure NOMA-enabled IIoT network in the presence of untrusted devices, considering the real effect of imperfect SIC with a linear RI model. In this respect, we first find out the feasible power allocation condition to obtain a positive secrecy rate for each device in all possible decoding orders. This way, we identify the feasible secure decoding orders that can provide a positive secrecy rate for each device.

  • We focus on optimizing the resources, such as secure decoding order and transmission power allocated to devices, from the perspective of secrecy fairness. Under the secrecy fairness criterion, we formulate and solve a joint optimization problem of maximizing the minimum secrecy rate between devices over a set of secure decoding orders and transmission power allocation. The formulated problem is combinatorial and non-convex. Therefore, we first find the optimal secure decoding order and then solve it over power allocation by obtaining candidates of optimal solution with Karush-Kuhn-Tucker (KKT) conditions. Thus, we provide the closed-form global-optimal solution to the formulated problem.

  • Lastly, we present numerical results to confirm the accuracy of the analysis, provide insightful discussion into the impact of network parameters on the optimal performance, and show the performance gains achieved by the optimal results over different benchmarks.

Notations: Bold uppercase and lowercase letters, respectively, are used to refer to matrices and column vectors. We denote the (u,v)(u,v)-th entries of matrix A by [A]u,v[\textbf{A}]_{u,v}. The uu-th entry of vector a is indicated by [a]u[\textbf{a}]_{u}.

II NOMA-enabled IIoT with Untrusted Devices

In this section, firstly, we describe the network model. Then, we explain the fundamental principle of NOMA transmission. Further, we discuss all possible decoding orders for a NOMA-enabled network in the presence of untrusted devices. Lastly, we present the mathematical definition of the achievable secrecy rate for a device against the other untrusted device.

II-A Network Model

We consider a NOMA-enabled IIoT network, where the base station communicates with two devices, as depicted in Fig. 1. In the network, both devices are assumed to be untrusted. The nn-th device of the network is symbolized by UnU_{n}, where n={1,2}n\in\mathbb{N}=\{1,2\}. All nodes in the network are assumed to have one antenna. All the channels from the base station to devices are assumed to be Rayleigh faded. The channel gain coefficient from the base station to UnU_{n} is represented by hnh_{n}. As a result, the channel power gain, denoted by |hn|2|h_{n}|^{2}, follows an exponential distribution having mean parameter λn=Lpdne\lambda_{n}=L_{p}d_{n}^{-e}, where LpL_{p} indicates path loss constant, dnd_{n} stands for the distance of UnU_{n} from the base station, and ee refer to the path loss exponent. Without any loss of generality, we presume that the channel power gains are arranged as |h1|2>|h2|2|h_{1}|^{2}>|h_{2}|^{2}. Thus, based on the channel power gain conditions, U1U_{1} and U2U_{2} could be referred to as strong device and weak device, respectively. The transmission power broadcasted from the base station to both devices is denoted by PtP_{t}. The fraction of transmission power PtP_{t} allocated to U1U_{1} is indicated by a power allocation coefficient α\alpha, where 0α10\leq\alpha\leq 1. The remaining fraction (1α)(1-\alpha) is allocated to U2U_{2}.

Remark 1

Asking all devices in the network to participate in NOMA jointly is not a good choice due to two reasons: first, sharing the same resource block among multiple devices in NOMA causes strong co-channel interference at receivers; and second, due to superposition coding and multiple SIC, long delays and high implementation complexity occur at both the transmitting and receiving ends with more devices. Therefore, the devices of the network are divided into multiple groups, where NOMA is implemented within each group [36], [37]. Please note that the grouping/pairing of two devices to perform NOMA has been extensively studied in the literature in order to maintain implementation complexity and system performance. Therefore, for the purpose of our analytical study, we consider two devices performing NOMA in one resource block, in our manuscript. However, it is possible to increase the number of devices in a group.

Refer to caption
Figure 1: Illustration of a NOMA-enabled IIoT network with two untrusted devices. Each device may attempt to hear the information of the other device.

II-B NOMA Transmission Principle

The base station first superposes all the message signals dedicated for devices and then transmits the superposed signal to each device. Thus, the broadcasted signal from the base station to both devices can be expressed as

x=αPtx1+(1α)Ptx2,\text{x}=\sqrt{\alpha P_{t}}\text{x}_{1}+\sqrt{(1-\alpha)P_{t}}\text{x}_{2}, (1)

where x1\text{x}_{1} and x2\text{x}_{2}, respectively, signify the message signals with unit power dedicated for U1U_{1} and U2U_{2}. Then, the received signal yn\text{y}_{n} for UnU_{n}, where nn\in\mathbb{N}, can be given as

yn=hnx+wn,\text{y}_{n}=h_{n}\text{x}+w_{n}, (2)

where wnw_{n} represents the additive white Gaussian noise (AWGN) for UnU_{n}. Without loss of generality, we assume that wnw_{n} has a mean equal to zero and variance equal to σ2\sigma^{2}.

After obtaining the superposed signal, receivers apply SIC to remove the inter-device interference imposed by the superposition and get the desired signal. During SIC, each device decodes its own and other devices’ signals in a particular sequence. The collection of these sequences abide by devices is referred to as a decoding order of the network. According to the conventional decoding order of NOMA, the strong device U1U_{1} considers U2U_{2}’s signal as interference. Therefore, it decodes U2U_{2}’s signal at the first stage, applies SIC to cancel its interference, and then decodes its own signal at the second stage. Conversely, the weak device U2U_{2} decodes its own signal at the first stage by considering the signal associated with U1U_{1} as noise. Thus, a mutual trust is assumed between the devices that they will not intercept each other’s information.

II-C Decoding Orders in NOMA with Untrusted Devices

An IIoT network with untrusted devices is an antagonistic but realistic circumstance in which devices do not trust each other and always want to safeguard their data from other devices. Therefore, practically, we should consider the possibility that each device may attempt to decode the signal of itself or other device at any stage [22], [28], [34]. Thus, in a two-device network, each device has two stages of decoding the signal of itself and the other device. As a result, four decoding orders exist based on the concept of permutation. We depict the oo-th decoding order as a matrix 𝐃o\mathbf{D}_{o} of size 2×22\times 2. The mm-th column of matrix 𝐃o\mathbf{D}_{o} is expressed by a 2×12\times 1 column vector 𝐝m\mathbf{d}_{m}, which shows the sequence of SIC followed by UmU_{m}, where mm\in\mathbb{N}. Specifically, [𝐝m]k=n[\mathbf{d}_{m}]_{k}=n defines that signal of the device UnU_{n} is decoded by the device UmU_{m} at kk-th stage, where [𝐝m]1[𝐝m]2[\mathbf{d}_{m}]_{1}\neq[\mathbf{d}_{m}]_{2} and n,kn,k\in\mathbb{N}. Thus, a decoding order of the network can be represented as 𝐃o=[[𝐝1]1,[𝐝2]1;[𝐝1]2,[𝐝2]2]\mathbf{D}_{o}=[[\mathbf{d}_{1}]_{1},[\mathbf{d}_{2}]_{1};[\mathbf{d}_{1}]_{2},[\mathbf{d}_{2}]_{2}]. All decoding orders can be expressed as 𝐃1=[2,2;1,1]\mathbf{D}_{1}=[2,2;1,1], 𝐃2=[2,1;1,2]\mathbf{D}_{2}=[2,1;1,2], 𝐃3=[1,2;2,1]\mathbf{D}_{3}=[1,2;2,1], and 𝐃4=[1,1;2,2]\mathbf{D}_{4}=[1,1;2,2]. We define the set of these four decoding orders as 𝔻={𝐃o|1o4}\mathbb{D}=\{\mathbf{D}_{o}|1\leq o\leq 4\}.

II-D Achievable Data Rates and Secrecy Rates at Devices

For a given decoding order 𝐃o\mathbf{D}_{o}, the data rate achieved at UmU_{m} when UnU_{n} is decoded by UmU_{m}, for all combinations of n,mn,m\in\mathbb{N} with Shannon’s formula can be expressed as

Rnm[o]=log2(1+Γnm[o]),R^{[o]}_{nm}=\log_{2}(1+\Gamma^{[o]}_{nm}), (3)

where Γnm[o]\Gamma^{[o]}_{nm} denotes the received signal to interference plus noise ratio (SINR) at UmU_{m}, when UnU_{n} is decoded by UmU_{m}, and it can be given as

Γnm[o]=a|hm|2b|hm|2+1ρt,\displaystyle\Gamma^{[o]}_{nm}=\frac{a\hskip 1.42262pt|h_{m}|^{2}}{b\hskip 1.42262pt|h_{m}|^{2}+\frac{1}{\rho_{t}}}, (4)

where ρt=ΔPtσ2\rho_{t}\stackrel{{\scriptstyle\Delta}}{{=}}\frac{P_{t}}{\sigma^{2}} is the base station transmit signal-to-noise ratio (SNR). The parameters aa and bb required to define Γnm[o]\Gamma^{[o]}_{nm} for each combination of m,nm,n\in\mathbb{N} in all decoding orders are given in Table I. Note that n=mn=m in Table I indicates the SINR achieved by the legitimate device UnU_{n} when decoding its own data, namely Γnn[o]\Gamma^{[o]}_{nn}, resulting which we obtain Rnn[o]R^{[o]}_{nn} using (3). In Table I, βn^m\beta_{\widehat{n}m} is the RI factor indicating the fraction of the residual error from the previous decoding stage, i.e., when mm imperfectly decodes n^\widehat{n}, where m,n^m,\widehat{n}\in\mathbb{N} and n^n\widehat{n}\neq n. Note that 0βn^m10\leq\beta_{\widehat{n}m}\leq 1. Here βn^m=0\beta_{\widehat{n}m}=0 and βn^m=1\beta_{\widehat{n}m}=1, respectively, indicates perfect SIC and absolutely imperfect SIC [29], [32].

Next, in order to ensure secure communication, we utilize the concept of PLS. According to PLS, the secrecy rate of a legitimate device can be measured by the difference between the rate achieved at the legitimate device when decoding its own data and the rate achieved at another device when decoding the data of the legitimate device. Accordingly, the secrecy rate for UnU_{n} against UmU_{m}, where m,nm,n\in\mathbb{N} can be expressed as [10], [11]

Rsn[o]=[Rnn[o]Rnm[o]]+,R^{[o]}_{sn}=\left[R^{[o]}_{nn}-R^{[o]}_{nm}\right]^{+}, (5)

where nmn\neq m and []+=max{0,}[\Diamond]^{+}=\max\{0,\Diamond\}. To get a positive secrecy rate for a device, the rate of the main communication link must be greater than the rate of the eavesdropper’s link, i.e., for obtaining Rsn[o]>0R^{[o]}_{sn}>0, the condition Rnn[o]>Rnm[o]R^{[o]}_{nn}>R^{[o]}_{nm}, simplified to Γnn[o]>Γnm[o]\Gamma^{[o]}_{nn}>\Gamma^{[o]}_{nm} using (3), needs to be satisfied. []+=max{0,}[\Diamond]^{+}=\max\{0,\Diamond\} indicates that negative secrecy rates are considered to be zero.

TABLE I: Parameter values to define Γnm[o]\Gamma^{[o]}_{nm} for all decoding orders [28]
nn mm 𝐃o\mathbf{D}_{o} aa bb
1 1 𝐃3\mathbf{D}_{3}, 𝐃4\mathbf{D}_{4} α\alpha (1α)(1-\alpha)
𝐃1\mathbf{D}_{1}, 𝐃2\mathbf{D}_{2} (1α)β21(1-\alpha)\beta_{21}
2 𝐃2\mathbf{D}_{2}, 𝐃4\mathbf{D}_{4} (1α)(1-\alpha)
𝐃1\mathbf{D}_{1}, 𝐃3\mathbf{D}_{3} (1α)β22(1-\alpha)\beta_{22}
2 1 𝐃3\mathbf{D}_{3}, 𝐃4\mathbf{D}_{4} (1α)(1-\alpha) αβ11\alpha\beta_{11}
𝐃1\mathbf{D}_{1}, 𝐃2\mathbf{D}_{2} α\alpha
2 𝐃2\mathbf{D}_{2}, 𝐃4\mathbf{D}_{4} αβ12\alpha\beta_{12}
𝐃1\mathbf{D}_{1}, 𝐃3\mathbf{D}_{3} α\alpha

III Secure Decoding Orders

As mentioned in Section II-C, four decoding orders are possible in the case of NOMA with two untrusted devices. Our motive is to protect each device’s data from another device. Therefore, this section investigates which decoding orders are feasible in ensuring a positive secrecy rate for each device.

III-A Infeasibility of Conventional Decoding Order

With the conventional decoding order in untrusted environment, a weak device U2U_{2} may try to decode the signal of U1U_{1} after cancelling the signal of itself through SIC [21]. Thus, the decoding order can be written as 𝐃1=[2,2;1,1]\mathbf{D}_{1}=[2,2;1,1]. Below in Proposition 1, we first prove that 𝐃1\mathbf{D}_{1} is not efficient to achieve a secure NOMA network.

Proposition 1

With decoding order 𝐃1=[2,2;1,1]\mathbf{D}_{1}=[2,2;1,1], the data of the strong device can be secured from the weak device with a constraint on power allocation, while the data of the weak device is not secured against the strong device.

Proof:

For 𝐃1=[2,2;1,1]\mathbf{D}_{1}=[2,2;1,1], the achievable SINRs Γnm[1]\Gamma^{[1]}_{nm}, when UmU_{m} decodes the signal of UnU_{n}, where m,nm,n\in\mathbb{N}, with linear RI model, can be given as per Table I as Γ21[1]=(1α)|h1|2α|h1|2+1ρt,Γ22[1]=(1α)|h2|2α|h2|2+1ρt,Γ11[1]=α|h1|2(1α)β21|h1|2+1ρt,\Gamma^{[1]}_{21}=\frac{(1-\alpha)|h_{1}|^{2}}{\alpha|h_{1}|^{2}+\frac{1}{\rho_{t}}},\Gamma^{[1]}_{22}=\frac{(1-\alpha)|h_{2}|^{2}}{\alpha|h_{2}|^{2}+\frac{1}{\rho_{t}}},\Gamma^{[1]}_{11}=\frac{\alpha|h_{1}|^{2}}{(1-\alpha)\beta_{21}|h_{1}|^{2}+\frac{1}{\rho_{t}}}, and Γ12[1]=α|h2|2(1α)β22|h2|2+1ρt\Gamma^{[1]}_{12}=\frac{\alpha|h_{2}|^{2}}{(1-\alpha)\beta_{22}|h_{2}|^{2}+\frac{1}{\rho_{t}}}. To get positive secrecy rate for U1U_{1}, we solve the required condition Γ11[1]>Γ12[1]\Gamma^{[1]}_{11}>\Gamma^{[1]}_{12} as explained in Section II-D and get a feasible condition on α\alpha as

α<1+|h1|2|h2|2|h1|2|h2|2ρt(β22β21).\alpha<1+\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(\beta_{22}-\beta_{21})}. (6)

Note that α=0\alpha=0 gives Rs1[1]=0R^{[1]}_{s1}=0, and hence, infeasible. As a result, a positive secrecy rate can be obtained for strong device U1U_{1} against U2U_{2} with a constraint on power allocation as

0<α<1+|h1|2|h2|2|h1|2|h2|2ρt(β22β21).0<\alpha<1+\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(\beta_{22}-\beta_{21})}. (7)

On the other hand, the condition Γ22[1]>Γ21[1]\Gamma^{[1]}_{22}>\Gamma^{[1]}_{21} to get positive secrecy rate for U2U_{2} gives |h2|2>|h1|2|h_{2}|^{2}>|h_{1}|^{2}, which is infeasible since we assume that |h1|2>|h2|2|h_{1}|^{2}>|h_{2}|^{2} (Refer Section II-A). Hence, we cannot obtain a positive secrecy rate for U2U_{2}. ∎

Thus, it can be concluded that 𝐃1\mathbf{D}_{1} is not a feasible decoding order in achieving a positive secrecy rate to both devices.

III-B Feasibility Check for Other Possible Decoding Orders

Now we check the feasibility of decoding orders 𝐃2\mathbf{D}_{2}, 𝐃3\mathbf{D}_{3}, and 𝐃4\mathbf{D}_{4}, one by one, in achieving secure NOMA transmission.

III-B1 Feasibility Check for 𝐃2=[2,1;1,2]\mathbf{D}_{2}=[2,1;1,2]

A key result on the feasibility of 𝐃2\mathbf{D}_{2} is provided below in Proposition 2.

Proposition 2

The decoding order 𝐃2=[2,1;1,2]\mathbf{D}_{2}=[2,1;1,2] is feasible in achieving a secure NOMA communication in untrusted scenario as we can get a positive secrecy rate for both devices with a constraint on power allocation as

|h1|2|h2|2|h1|2|h2|2ρt(1β12)<α<1.\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(1-\beta_{12})}<\alpha<1. (8)
Proof:

According to 𝐃2=[2,1;1,2]\mathbf{D}_{2}=[2,1;1,2], each device first decodes the signal of other device, and then decodes its own signal after performing SIC. As a result, the received SINRs as per Table I are given as Γ21[2]=(1α)|h1|2α|h1|2+1ρt,Γ12[2]=α|h2|2(1α)|h2|2+1ρt,Γ11[2]=α|h1|2(1α)β21|h1|2+1ρt,\Gamma^{[2]}_{21}=\frac{(1-\alpha)|h_{1}|^{2}}{\alpha|h_{1}|^{2}+\frac{1}{\rho_{t}}},\Gamma^{[2]}_{12}=\frac{\alpha|h_{2}|^{2}}{(1-\alpha)|h_{2}|^{2}+\frac{1}{\rho_{t}}},\Gamma^{[2]}_{11}=\frac{\alpha|h_{1}|^{2}}{(1-\alpha)\beta_{21}|h_{1}|^{2}+\frac{1}{\rho_{t}}}, and Γ22[2]=(1α)|h2|2αβ12|h2|2+1ρt.\Gamma^{[2]}_{22}=\frac{(1-\alpha)|h_{2}|^{2}}{\alpha\beta_{12}|h_{2}|^{2}+\frac{1}{\rho_{t}}}. The condition Γ11[2]>Γ12[2]\Gamma^{[2]}_{11}>\Gamma^{[2]}_{12} to obtain positive secrecy rate Rs1[2]R^{[2]}_{s1} for U1U_{1} leads to a feasible condition as

α<1+|h1|2|h2|2|h1|2|h2|2ρt(1β21).\alpha<1+\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(1-\beta_{21})}. (9)

Note that 0α10\leq\alpha\leq 1 (Refer Section II-A) and 0β2110\leq\beta_{21}\leq 1 (Refer Section II-D). Also, α=0\alpha=0 gives Rs1[2]=0R^{[2]}_{s1}=0. Hence, the condition on power allocation to get a positive secrecy rate for the strong device U1U_{1} will be 0<α10<\alpha\leq 1.

Similarly, Γ22[2]>Γ21[2]\Gamma^{[2]}_{22}>\Gamma^{[2]}_{21} for Rs2[2]>0R^{[2]}_{s2}>0 gives a condition as

α>|h1|2|h2|2|h1|2|h2|2ρt(1β12).\alpha>\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(1-\beta_{12})}. (10)

Here also due to three conditions, i.e., 0α10\leq\alpha\leq 1 (Refer Section II-A), 0β1210\leq\beta_{12}\leq 1 (Refer Section II-D), and Rs2[2]=0R^{[2]}_{s2}=0 with α=1\alpha=1, the feasible power allocation condition for Rs2[2]>0R^{[2]}_{s2}>0 will be |h1|2|h2|2|h1|2|h2|2ρt(1β12)<α<1\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(1-\beta_{12})}<\alpha<1.

From the analysis mentioned above, we see that a positive secrecy rate can be acquired for each device against the other device in an untrusted scenario if decoding orders 𝐃2\mathbf{D}_{2} is followed, with suitable power allocation constraints. Thus, jointly, the power allocation condition providing secrecy to both devices can be written as given in (8). ∎

Similar to the above analysis, we can check the feasibility of 𝐃3\mathbf{D}_{3} and 𝐃4\mathbf{D}_{4} in achieving a secure NOMA network.

III-B2 Feasibility Check of 𝐃3=[1,2;2,1]\mathbf{D}_{3}=[1,2;2,1]

Below a key result on feasibility of 𝐃3\mathbf{D}_{3} is provided in Proposition 3.

Proposition 3

Decoding order 𝐃3=[1,2;2,1]\mathbf{D}_{3}=[1,2;2,1] is infeasible for achieving secure NOMA communication among untrusted devices as only the data of strong device can be secured from the weak device with a constraint on power allocation as

α>1|h1|2|h2|2|h1|2|h2|2ρt(1β22).\alpha>1-\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(1-\beta_{22})}. (11)
Proof:

The proof is given in Appendix A. ∎

III-B3 Feasibility Check for 𝐃4=[1,1;2,2]\mathbf{D}_{4}=[1,1;2,2]

Now we present a key result on the feasibility of 𝐃4\mathbf{D}_{4} via Proposition 4.

Proposition 4

The decoding order 𝐃4=[1,1;2,2]\mathbf{D}_{4}=[1,1;2,2] is a feasible secure decoding order because it is efficient in providing positive secrecy rate for both devices in an untrusted NOMA network with a constraint on power allocation as

|h1|2|h2|2|h1|2|h2|2ρt(β11β12)<α<1.\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(\beta_{11}-\beta_{12})}<\alpha<1. (12)
Proof:

The proof is provided in Appendix B. ∎

Remark 2

In the case of 𝐃4=[1,1;2,2]\mathbf{D}_{4}=[1,1;2,2], there exists a special condition, i.e., when β11β12\beta_{11}\leq\beta_{12}, then on solving Γ22[4]>Γ21[4]\Gamma^{[4]}_{22}>\Gamma^{[4]}_{21}, we find an infeasible condition, which shows that a positive secrecy rate cannot be acquired for the weak device. Thus, if β11>β12\beta_{11}>\beta_{12}, only then 𝐃4\mathbf{D}_{4} is a feasible decoding order for secure NOMA transmission.

Remark 3

From Propositions 1-4, we observe that a positive secrecy rate can be received for each device with a suitable constraint on power allocation in decoding orders 𝐃2\mathbf{D}_{2} and 𝐃4\mathbf{D}_{4}. Therefore, we refer to 𝐃2\mathbf{D}_{2} and 𝐃4\mathbf{D}_{4} as secure decoding orders. For further analysis, we define the set of these two secure decoding orders as 𝕊={𝐃o|o2,4}\mathbb{S}=\{\mathbf{D}_{o}|o\in 2,4\}.

IV Secrecy Fairness Maximization

In this section, we aim to optimize resources, such as decoding order and power allocation, from the perspective of secrecy fairness. A secrecy fairness viewpoint means that network resources should be allocated to devices in such a way that the secrecy rate performance of each device is ensured. Note that since NOMA primarily pairs or groups devices with significantly different channel gains, the fundamental basis for examining secrecy fairness is that weak devices can also obtain sufficient communication resources in the same manner as strong devices so no loss of secrecy rate performance occurs for weak devices. Under the secrecy fairness criterion, we focus on maximizing the minimum secrecy rate between devices. In this regard, we first formulate the optimization problem, then provide a solution methodology, followed by its closed-from optimal solution.

IV-A Problem Formulation

As we obtained in Section III that there are two secure decoding orders 𝐃2\mathbf{D}_{2} and 𝐃4\mathbf{D}_{4} that can ensure a positive secrecy rate for each device, we will optimize the decoding order over set 𝕊\mathbb{S} of secure decoding orders (Refer Remark 3). Also, since Rs1[o]R^{[o]}_{s1} and Rs2[o]R^{[o]}_{s2}, is a function of both decoding order and α\alpha, we formulate a joint optimization problem as maximizing the minimum secrecy rate between devices over a set 𝕊\mathbb{S} of secure decoding orders and power allocation coefficient α\alpha as

𝒫1:\displaystyle\mathcal{P}_{1}: max𝐃o𝕊,αmin[Rs1[o],Rs2[o]],\displaystyle\quad\underset{\mathbf{D}_{o}\in\mathbb{S},\alpha}{{\max}}\quad\min\left[R^{[o]}_{s1},R^{[o]}_{s2}\right],
s.t. 𝒞1:0α1,𝒞2:Rs1[o]>0,𝒞3:Rs2[o]>0,\displaystyle\quad\mathcal{C}_{1}:0\leq\alpha\leq 1,\quad\mathcal{C}_{2}:R^{[o]}_{s1}>0,\quad\mathcal{C}_{3}:R^{[o]}_{s2}>0,

where 𝒞1\mathcal{C}_{1} refers to the constraint on power allocation coefficient (Refer Section II-A), and 𝒞2\mathcal{C}_{2} and 𝒞3\mathcal{C}_{3} denote the positive secrecy rate conditions for U1U_{1} and U2U_{2}, respectively.

IV-B Solution Methodology

We observe that 𝒫1\mathcal{P}_{1} is a combinatorial optimization problem because there are two secure decoding orders, and the secrecy rate depends on α\alpha in each secure decoding order. Therefore, to reduce the computational complexity in determining the joint optimal solution of decoding order and power allocation, we solve the joint optimization problem 𝒫1\mathcal{P}_{1} in two steps as described below.

  • In the first step, ignoring the power allocation constraint, we optimize the decoding order over a set 𝕊\mathbb{S} of secure decoding orders for maximizing the minimum secrecy rate between the devices. This way we find the optimal secure decoding order for maximizing the minimum secrecy rate between devices. (Refer Section IV-C1)

  • In the second step, to complete joint optimization, we obtain the optimal power allocation solution in closed form for only optimal secure decoding order obtained in the first step. (Refer Section IV-C2)

IV-C Solution of Joint Optimization Problem

IV-C1 Optimal Secure Decoding Order

Following the solution methodology’s first step, an investigation of optimal secure decoding order is presented through Lemma 1.

Lemma 1

The optimal secure decoding order that maximizes the minimum secrecy rate between devices is 𝐃o^=𝐃2\mathbf{D}_{\widehat{o}}=\mathbf{D}_{2}, where o^=2\widehat{o}=2 is the index of optimal secure decoding order.

Proof:

Here, considering the set 𝕊\mathbb{S} of secure decoding orders, we compare secrecy rates obtained with decoding orders 𝐃2\mathbf{D}_{2} and 𝐃4\mathbf{D}_{4}. The secrecy rate is in the form of log2(1+QR1+ST)\log 2\left(\frac{1+\frac{Q}{R}}{1+\frac{S}{T}}\right). In case of 𝐃2\mathbf{D}_{2}, R=(1α)β21|h1|2+1ρt\mathrm{R}=(1-\alpha)\beta_{21}|h_{1}|^{2}+\frac{1}{\rho_{t}} for Rs1[2]R^{[2]}_{s1}, and T=α|h1|2+1ρt\mathrm{T}=\alpha|h_{1}|^{2}+\frac{1}{\rho_{t}} for Rs2[2]R^{[2]}_{s2}. Coming to 𝐃4\mathbf{D}_{4}, we have R=(1α)|h1|2+1ρt\mathrm{R}=(1-\alpha)|h_{1}|^{2}+\frac{1}{\rho_{t}} for Rs1[4]R^{[4]}_{s1}, and T=αβ11|h1|2+1ρt\mathrm{T}=\alpha\beta_{11}|h_{1}|^{2}+\frac{1}{\rho_{t}} for Rs2[4]R^{[4]}_{s2}. The other parameters are the same in both secure decoding orders. Here, in the case of secrecy rate for U1U_{1}, R\mathrm{R} is lower in 𝐃2\mathbf{D}_{2} than in 𝐃4\mathbf{D}_{4} since β21<1\beta_{21}<1. Thus, 𝐃2\mathbf{D}_{2} ensures more secrecy rate for U1U_{1} than 𝐃4\mathbf{D}_{4}. Similarly, we observe that in the case of U2U_{2}, 𝐃2\mathbf{D}_{2} again ensures more secrecy rate for U2U_{2} than 𝐃4\mathbf{D}_{4} since T\mathrm{T} is higher in 𝐃2\mathbf{D}_{2} as compared to 𝐃4\mathbf{D}_{4}, since β11<1\beta_{11}<1. Thus, since 𝐃2\mathbf{D}_{2} ensures more secrecy for each device than 𝐃4\mathbf{D}_{4}, it will be optimal for maximizing the minimum secrecy rate between devices. Hence, 𝐃2\mathbf{D}_{2} is an optimal secure decoding order for secrecy fairness maximization between devices. ∎

IV-C2 Optimal Power Allocation

We already have solved 𝒫1\mathcal{P}_{1} over the set 𝕊\mathbb{S} of secure decoding orders by obtaining the optimal secure decoding order 𝐃o^\mathbf{D}_{\widehat{o}} in Section IV-C1. Therefore, to complete the joint optimization, we can now solve 𝒫1\mathcal{P}_{1} over α\alpha for only 𝐃o^\mathbf{D}_{\widehat{o}}. In this regard, considering o^\widehat{o} as the index of optimal secure decoding order, 𝒫1\mathcal{P}_{1} can be restated as

𝒫1a:\displaystyle\mathcal{P}_{1a}: max𝛼min[Rs1[o^],Rs2[o^]],\displaystyle\quad\underset{\alpha}{\max}\quad\min\left[R^{[\widehat{o}]}_{s1},R^{[\widehat{o}]}_{s2}\right],
s.t. 𝒞1,𝒞4:Rs1[o^]>0,𝒞5:Rs2[o^]>0,\displaystyle\quad\mathcal{C}_{1},\quad\mathcal{C}_{4}:R^{[\widehat{o}]}_{s1}>0,\quad\mathcal{C}_{5}:R^{[\widehat{o}]}_{s2}>0,

where 𝒞4\mathcal{C}_{4} and 𝒞5\mathcal{C}_{5} are positive secrecy rate conditions for U1U_{1} and U2U_{2}, respectively, in optimal secure decoding order 𝐃o^\mathbf{D}_{\widehat{o}}.

Following Lemma 1, o^=2\widehat{o}=2. Thus, 𝒫1a\mathcal{P}_{1a} can be restated as

𝒫1b:\displaystyle\mathcal{P}_{1b}: max𝛼min[Rs1[2],Rs2[2]],\displaystyle\quad\underset{\alpha}{\max}\quad\min\left[R^{[2]}_{s1},R^{[2]}_{s2}\right],
s.t. 𝒞6:|h1|2|h2|2|h1|2|h2|2ρt(1β12)<α<1,\displaystyle\quad\mathcal{C}_{6}:\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(1-\beta_{12})}<\alpha<1,

where 𝒞6\mathcal{C}_{6} refers to the constraint on power allocation coefficient α\alpha, which is obtained in (8) by solving 𝒞1\mathcal{C}_{1}, 𝒞4\mathcal{C}_{4}, and 𝒞5\mathcal{C}_{5} for o^=2\widehat{o}=2 (Refer Proposition 2 in Section III-B1).

Further, using xc=min[Rs1[2],Rs2[2]]x_{c}=\min\left[R^{[2]}_{s1},R^{[2]}_{s2}\right], 𝒫1b\mathcal{P}_{1b} can be written as

𝒫1c:\displaystyle\mathcal{P}_{1c}: maxα,xcxc,\displaystyle\quad\underset{\alpha,x_{c}}{\max}\quad x_{c},
s.t. 𝒞6,𝒞7:xcRs1[2],𝒞8:xcRs2[2],\displaystyle\quad\mathcal{C}_{6},\quad\mathcal{C}_{7}:x_{c}\leq R^{[2]}_{s1},\quad\mathcal{C}_{8}:x_{c}\leq R^{[2]}_{s2},

where 𝒞7\mathcal{C}_{7} and 𝒞8\mathcal{C}_{8} comes from the definition of min[.]\min[.].

Note that 𝒫1c\mathcal{P}_{1c} is a non-convex problem because of the presence of non-convex constraints 𝒞7\mathcal{C}_{7} and 𝒞8\mathcal{C}_{8}. That is why finding the optimal solution of power allocation is challenging. Therefore, we solve the optimization problem 𝒫1c\mathcal{P}_{1c} by obtaining all possible optimal points with KKT conditions, which are the candidates for the global-optimal solution [38]. After obtaining candidate optimal points, we can select the global-optimal solution as the feasible optimal point that maximizes the minimum secrecy rate between devices. The global-optimal power allocation solution of 𝒫1c\mathcal{P}_{1c} is given by Lemma 2.

Lemma 2

The global-optimal power allocation solution, denoted by α^\widehat{\alpha}, of 𝒫1c\mathcal{P}_{1c}, is the feasible candidate from the obtained candidates that maximizes the minimum secrecy rate between devices and can be given as

α^=Δargmaxα{α2,α3,α4,α5,α6,α7}min[Rs1[2],Rs2[2]],\widehat{\alpha}\stackrel{{\scriptstyle\Delta}}{{=}}\!\underset{\alpha\in\{\alpha_{2}^{*},\alpha_{3}^{*},\alpha_{4}^{*},\alpha_{5}^{*},\alpha_{6}^{*},\alpha_{7}^{*}\}}{\mathrm{argmax}}\!\min\left[R^{[2]}_{s1},R^{[2]}_{s2}\right], (13)

where α2,α3,α4,α5,α6,α7\alpha_{2}^{*},\alpha_{3}^{*},\alpha_{4}^{*},\alpha_{5}^{*},\alpha_{6}^{*},\alpha_{7}^{*} are the candidate optimal points and each of them is obtained in the closed-form as described in the proof.

Proof:

To solve 𝒫1c\mathcal{P}_{1c}, we keep the boundary constraint on power allocation coefficient, i.e., 𝒞6\mathcal{C}_{6}, implicit and connect Lagrange multipliers δ1\delta_{1} with 𝒞7\mathcal{C}_{7} and δ2\delta_{2} with 𝒞8\mathcal{C}_{8}. Thus, we can define the Lagrangian function LL as

L=xcδ1[xcRs1[2]]δ2[xcRs2[2]].L=x_{c}-\delta_{1}\left[x_{c}-R^{[2]}_{s1}\right]-\delta_{2}\left[x_{c}-R^{[2]}_{s2}\right]. (14)

There are 4 KKT conditions. The primal feasibility conditions are given by 𝒞7\mathcal{C}_{7} and 𝒞8\mathcal{C}_{8}. The dual feasibility conditions are δ10\delta_{1}\geq 0 and δ20\delta_{2}\geq 0. The subgradient conditions are given as

dLdxc\displaystyle\frac{\mathrm{d}L}{\mathrm{d}x_{c}} =1δ1δ2=0,\displaystyle=1-\delta_{1}-\delta_{2}=0, (15a)
dLdα\displaystyle\frac{\mathrm{d}L}{\mathrm{d}\alpha} =δ1dRs1[2]dα+δ2dRs2[2]dα=0.\displaystyle=\delta_{1}\frac{\mathrm{d}R^{[2]}_{s1}}{\mathrm{d}\alpha}+\delta_{2}\frac{\mathrm{d}R^{[2]}_{s2}}{\mathrm{d}\alpha}=0. (15b)

The two complementary slackness conditions are expressed as

δ1[Rs1[2]xc]=0,\displaystyle\delta_{1}\left[R^{[2]}_{s1}-x_{c}\right]=0, (16a)
δ2[Rs2[2]xc]=0.\displaystyle\delta_{2}\left[R^{[2]}_{s2}-x_{c}\right]=0. (16b)

Each of the Lagrange multipliers, i.e., δ1\delta_{1} and δ2\delta_{2}, could be either equal to or greater than zero. Thus, 4 cases exist, which are discussed in the following.

Case 1: δ1=0\delta_{1}=0, δ2=0\delta_{2}=0: This implies δ1+δ2=0\delta_{1}+\delta_{2}=0. However, as given in (15a), δ1+δ2=1\delta_{1}+\delta_{2}=1. Thus, this is an infeasible case.

Case 2: δ1=0\delta_{1}=0, δ2>0\delta_{2}>0: This case, using (15b), implies dLdα=dRs2[2]dα=0\frac{\mathrm{d}L}{\mathrm{d}\alpha}=\frac{\mathrm{d}R^{[2]}_{s2}}{\mathrm{d}\alpha}=0. On solving dRs2[2]dα=0\frac{\mathrm{d}R^{[2]}_{s2}}{\mathrm{d}\alpha}\!=\!0, we obtain a quadratic equation solving which on α\alpha, we get two roots, denoted by α1\alpha^{*}_{1} and α2\alpha^{*}_{2}, as given in (17) on the top of next page. We observe that α1=(1β12)|h1|2+(1β12)|h1|2(|h1|2β12|h2|2)(β12|h2|2ρt+1)β12(β121)|h1|2|h2|2ρt\!\alpha^{*}_{1}\!=\!\dfrac{\!\left(1\!-\!\beta_{12}\right)\!|h_{1}|^{2}\!\!+\!\!\sqrt{\!\left(1\!-\!\beta_{12}\right)\!|h_{1}|^{2}(|h_{1}|^{2}\!\!-\!\!\beta_{12}|h_{2}|^{2})(\beta_{12}|h_{2}|^{2}\rho_{t}\!+\!1)}}{\beta_{12}\left(\beta_{12}\!-\!1\right)|h_{1}|^{2}|h_{2}|^{2}\rho_{t}}\! is infeasible. The reason is that for (|h1|2β12|h2|2)>0(|h_{1}|^{2}-\beta_{12}|h_{2}|^{2})>0, the required condition is β12<|h1|2|h2|2\beta_{12}<\frac{|h_{1}|^{2}}{|h_{2}|^{2}}, which is true since β12<1\beta_{12}<1 and |h1|2>|h2|2|h_{1}|^{2}>|h_{2}|^{2}. As a result, α1\alpha^{*}_{1} is negative, which is infeasible. Therefore, we consider the root α2\alpha_{2}^{*} as the candidate for the optimal power allocation solution.

α1,α2=(1β12)|h1|2±(1β12)|h1|2(|h1|2β12|h2|2)(β12|h2|2ρt+1)β12(β121)|h1|2|h2|2ρt,\alpha^{*}_{1},\alpha^{*}_{2}=\dfrac{\left(1-\beta_{12}\right)|h_{1}|^{2}\pm\sqrt{\left(1-\beta_{12}\right)|h_{1}|^{2}(|h_{1}|^{2}-\beta_{12}|h_{2}|^{2})(\beta_{12}|h_{2}|^{2}\rho_{t}+1)}}{\beta_{12}\left(\beta_{12}-1\right)|h_{1}|^{2}|h_{2}|^{2}\rho_{t}}, (17)

 

Case 3: δ1>0\delta_{1}>0, δ2=0\delta_{2}=0: In the third case, using (15b), dLdα=dRs1[2]dα=0\frac{\mathrm{d}L}{\mathrm{d}\alpha}=\frac{\mathrm{d}R^{[2]}_{s1}}{\mathrm{d}\alpha}=0 is obtained. Similar to the case 2, here also dRs1[2]dα=0\frac{\mathrm{d}R^{[2]}_{s1}}{\mathrm{d}\alpha}=0 leads to a quadratic equation in terms of α\alpha which gives two roots α3\alpha^{*}_{3} and α4\alpha^{*}_{4}, as given in (18) on the next page. These roots also are the candidates for the optimal solution.

α3,α4=(β211)|h2|2(β21|h1|2ρt+1)±(1β21)|h2|2(β21|h1|2ρt+1)(|h2|2β21|h1|2)β21(β211)|h1|2|h2|2ρt,\alpha^{*}_{3},\alpha^{*}_{4}=\dfrac{\left(\beta_{21}-1\right)|h_{2}|^{2}(\beta_{21}|h_{1}|^{2}\rho_{t}+1)\!\pm\!\sqrt{(1-\beta_{21})|h_{2}|^{2}(\beta_{21}|h_{1}|^{2}\rho_{t}+1)(|h_{2}|^{2}-\beta_{21}|h_{1}|^{2})}}{\beta_{21}\left(\beta_{21}-1\right)|h_{1}|^{2}|h_{2}|^{2}\rho_{t}}, (18)

 

Case 4: δ1>0\delta_{1}>0, δ2>0\delta_{2}>0: Using (16a) and (16b), this case implies Rs1[2]=Rs2[2]R^{[2]}_{s1}=R^{[2]}_{s2}, which indicates equal secrecy rate for both devices. Thus, using (3), (4), (5), and Table I, we solve Rs1[2]=Rs2[2]R^{[2]}_{s1}=R^{[2]}_{s2} for decoding order 𝐃2\mathbf{D}_{2}, which can be given as

log2(1+α|h1|2(1α)β21|h1|2+1ρt)(1+α|h2|2(1α)|h2|2+1ρt)\displaystyle\log_{2}\frac{\Big{(}1+\frac{\alpha\hskip 1.42262pt|h_{1}|^{2}}{(1-\alpha)\beta_{21}\hskip 1.42262pt|h_{1}|^{2}+\frac{1}{\rho_{t}}}\Big{)}}{\Big{(}1+\frac{\alpha\hskip 1.42262pt|h_{2}|^{2}}{(1-\alpha)\hskip 1.42262pt|h_{2}|^{2}+\frac{1}{\rho_{t}}}\Big{)}} =log2(1+(1α)|h2|2αβ12|h2|2+1ρt)(1+(1α)|h1|2α|h1|2+1ρt).\displaystyle=\log_{2}\frac{\Big{(}1+\frac{(1-\alpha)\hskip 1.42262pt|h_{2}|^{2}}{\alpha\beta_{12}\hskip 1.42262pt|h_{2}|^{2}+\frac{1}{\rho_{t}}}\Big{)}}{\Big{(}1+\frac{(1-\alpha)\hskip 1.42262pt|h_{1}|^{2}}{\alpha\hskip 1.42262pt|h_{1}|^{2}+\frac{1}{\rho_{t}}}\Big{)}}. (19)

After some algebric simplifications in (19), a cubic equation in the form of M1α3+M2α2+M3α+M4=0M_{1}\alpha^{3}+M_{2}\alpha^{2}+M_{3}\alpha+M_{4}=0 is resulted with coefficients M1,M2,M3M_{1},M_{2},M_{3} and M4M_{4}, where M1=B1E1G1I1F1H1C1D1M_{1}=B_{1}E_{1}G_{1}I_{1}-F_{1}H_{1}C_{1}D_{1}, M2=B1E1I1+(A1E1+B1D1)G1I1F1H1A1D1(D1H1+F1)C1D1M_{2}=B_{1}E_{1}I_{1}+(A_{1}E_{1}+B_{1}D_{1})G_{1}I_{1}-F_{1}H_{1}A_{1}D_{1}-(D_{1}H_{1}+F_{1})C_{1}D_{1}, M3=(A1E1+B1D1)I1+A1D1G1I1(D1H1+F1)A1D1C1D12M_{3}=(A_{1}E_{1}+B_{1}D_{1})I_{1}+A_{1}D_{1}G_{1}I_{1}-(D_{1}H_{1}+F_{1})A_{1}D_{1}-C_{1}D_{1}^{2}, and M4=A1D1I1A1D12M_{4}=A_{1}D_{1}I_{1}-A_{1}D_{1}^{2} with A1=β21|h1|2ρt+1A_{1}=\beta_{21}|h_{1}|^{2}\rho_{t}+1, B1=(|h1|2β21|h1|2)ρtB_{1}=(|h_{1}|^{2}-\beta_{21}|h_{1}|^{2})\rho_{t}, C1=β21|h1|2ρtC_{1}=-\beta_{21}|h_{1}|^{2}\rho_{t}, D1=|h2|2ρt+1D_{1}=|h_{2}|^{2}\rho_{t}+1, E1=|h2|2ρtE_{1}=-|h_{2}|^{2}\rho_{t}, F1=(β121)|h2|2ρtF_{1}=(\beta_{12}-1)|h_{2}|^{2}\rho_{t}, G1=β12|h2|2ρtG_{1}=\beta_{12}|h_{2}|^{2}\rho_{t}, H1=|h1|2ρtH_{1}=|h_{1}|^{2}\rho_{t} , and I1=|h1|2ρt+1I_{1}=|h_{1}|^{2}\rho_{t}+1. Thus, in this case, three roots exist, i.e., candidate optimal points denoted as α5\alpha^{*}_{5}, α6\alpha^{*}_{6} and α7\alpha^{*}_{7}.

The above analysis shows six candidates for optimal solution. Therefore, the global-optimal power allocation solution α^\widehat{\alpha} of 𝒫1c\mathcal{P}_{1c} is the feasible candidate for which the minimum secrecy rate between the strong and weak devices is maximum, as given in (13). ∎

V Numerical Results

This section provides numerical results to validate the derived results and present key insights on the optimized solution. The default network parameters are considered as: d1=50d_{1}=50, d2=100d_{2}=100, Lp=1L_{p}=1, and e=3e=3. Small-scale fading is supposed to follow an exponential distribution having a mean value equal to 1 at each link [21]. We average the simulations over 10310^{3} randomly generated channel gain realizations with Rayleigh distribution for each link. Simulation and analytical results, respectively, are marked as ‘Sim’ and ‘Ana’.

Refer to caption
Figure 2: Validation of the optimality of decoding order with β21=0.2\beta_{21}=0.2, β22=0.2\beta_{22}=0.2, β12=0.2\beta_{12}=0.2, β11=0.5\beta_{11}=0.5, and ρt=60\rho_{t}=60 dB.
Refer to caption
Figure 3: Validation of the correctness of the closed-form optimal power allocation solution with different values of RI factor and ρt=70\rho_{t}=70 dB.
Refer to caption
Figure 4: Variation in average optimal secrecy rate performance obtained by solving the formulated max-min joint optimization problem with ρt\rho_{t} for different values of far device’s distance d2d_{2} from the base station, β21=β12=0.2\beta_{21}=\beta_{12}=0.2.

V-A Validation of Optimal Results

Firstly, Fig. 2 is plotted to validate the accuracy of Lemma 1, stating that the optimal secure decoding order maximizing the minimum secrecy rate between devices is 𝐃2\mathbf{D}_{2}. Here, through Fig. 2(a) and Fig. 2(b), the variation in secrecy rates Rs1[o]R_{s1}^{[o]} and Rs2[o]R_{s2}^{[o]} for U1U_{1} and U2U_{2}, respectively, with α\alpha for all four decoding orders is shown. The results confirm that for all α\alpha values, 𝐃2\mathbf{D}_{2} provides more secrecy rate for each device than other decoding orders. Hence, to maximize the minimum secrecy rate, the optimal secure decoding order is 𝐃2\mathbf{D}_{2}.

Further, to validate optimal power allocation solution (Refer Lemma 2) for optimal secure decoding order 𝐃2\mathbf{D}_{2}, Fig. 3 is plotted. Here, we show the variation of min[Rs1[2],Rs2[2]]\min\left[R_{s1}^{[2]},R_{s2}^{[2]}\right] with α\alpha for different values of β21\beta_{21} and β12\beta_{12}. Results indicate that there exists a unique global-optimal solution for min[Rs1[2],Rs2[2]]\min\left[R_{s1}^{[2]},R_{s2}^{[2]}\right] in terms of α\alpha. The perfect match between the simulation and analytical results confirms the accuracy of the analysis. We also observe from the results that the optimal power allocation can be greater than 0.5. It means providing lesser power to the strong device than the power allocated to the weak device, as presumed in many works in the NOMA literature, is not always necessary. Thus, we conclude that the power allocation associated with devices in a NOMA-enabled IIoT network should be decided based on the given network parameters.

V-B Impact of Network Parameters on Optimal Solution

Through the results presented in Fig. 4, we study the impact of ρt\rho_{t} and different values of far device’s distance d2d_{2} on the average optimal secrecy rate performance of the network. d1d_{1} is set to as 5050 meters. We observe that average optimal secrecy rate increases by increasing ρt\rho_{t}. The reason is that the achievable data rates for devices increase with an increase in SNR. Here we also notice that the average optimal secrecy rate performance decreases with an increase in distance d2d_{2}. The reason is that increasing the distance d2d_{2} results in a decrease in the achievable data rate of U2U_{2}, and consequently, an increase in secrecy rate for U1U_{1} and a decrease in secrecy rate for U2U_{2} is obtained. Through simulations, we notice that less secrecy rate is obtained for U2U_{2} for most channel realizations. Therefore, while calculating the average max min secrecy rate, the secrecy rate for U2U_{2} is dominant for given network parameters, which decreases by increasing d2d_{2}. Therefore, the results show that average performance degrades with an increase in d2d_{2}.

V-C Performance Comparison

Through Fig. 5, we demonstrate that the joint optimal solution, i.e., optimal decoding order and optimal power allocation, is capable of improving the average secrecy rate over different benchmarks. In this regard, the joint optimal solution is compared with four different benchmarks to evaluate its performance in terms of average secrecy rate, and the percentage gain is calculated. Four different benchmarks are considered: (i) ODEP: optimal decoding order and equal power allocation, (ii) ODFP: optimal decoding order and fixed power allocation, (iii) FDEP: fixed decoding order and equal power allocation, and (iv) FDFP: fixed decoding order and fixed power allocation. The optimal and fixed decoding orders are 𝐃2\mathbf{D}_{2} and 𝐃4\mathbf{D}_{4}, respectively. For the equal power allocation, α=0.5\alpha=0.5 is assumed, which is considered to examine the case in which both devices are assigned with equal power. However, in a fixed power allocation scheme, α=0.33\alpha=0.33 is taken, which means α=0.33\alpha=0.33 is allocated to U1U_{1} and the remaining fraction 1α=0.661-\alpha=0.66 is allocated to U2U_{2}. Taking α=0.33\alpha=0.33 is intended to examine the situation in which a weak device is assigned more power than a strong one, as considered in many works in the literature. Results show that the joint optimal solution provides an average percentage gain in secrecy fairness performance over benchmarks ODEP, ODFP, FDEP, and FDFP, of around 22.75%22.75\%, 50.58%50.58\%, 94.59%94.59\%, and 98.16%98.16\%, respectively. In this way, we observe that the result achieved by FDFP actually differs greatly from the joint optimal solution obtained.

Refer to caption
Figure 5: Performance comparison of average optimal secrecy rate obtained by joint optimal solution of decoding order and power allocation, o^\widehat{o} and α^\widehat{\alpha}, with ODEP, ODFP, FDEP, and FDFP schemes, β11=β21=0.5,β12=0.2\beta_{11}=\beta_{21}=0.5,\beta_{12}=0.2.
Refer to caption
Figure 6: Performance comparison of average max min secrecy rate obtained by optimal decoding order 𝐃2\mathbf{D}_{2} and conventional decoding order 𝐃1\mathbf{D}_{1}.

Through Fig. 6, we demonstrate a variation in min[Rs1[o],Rs2[o]]\min\left[R_{s1}^{[o]},R_{s2}^{[o]}\right] with α\alpha for conventional decoding order and optimal decoding order. Note that the conventional and optimal secure decoding order, respectively, are 𝐃1\mathbf{D}_{1} and 𝐃2\mathbf{D}_{2}. Results indicate that for all α\alpha values, 𝐃2\mathbf{D}_{2} ensures secrecy fairness between devices and gives a significant secrecy rate. Also, there exists a unique global-optimal solution for min[Rs1[2],Rs2[2]]\min\left[R_{s1}^{[2]},R_{s2}^{[2]}\right] in terms of α\alpha for 𝐃2\mathbf{D}_{2}. However, in the case of conventional decoding order 𝐃1\mathbf{D}_{1}, maximizing minimum secrecy rates between devices, i.e., min[Rs1[1],Rs2[1]]\min\left[R_{s1}^{[1]},R_{s2}^{[1]}\right] will always result in zero secrecy rates. The reason is that if conventional decoding order is followed, a positive secrecy rate cannot be achieved for weak devices (Refer proposition 1), resulting in min[Rs1[2],Rs2[2]]=0\min\left[R_{s1}^{[2]},R_{s2}^{[2]}\right]=0. Thus, from the secrecy fairness viewpoint, we can conclude that 𝐃1\mathbf{D}_{1} is not a feasible decoding order.

VI Concluding Remarks

We focused on obtaining a secure NOMA-enabled IIoT network with untrusted devices. We considered the RI at receivers with the linear model to observe the practical impact of imperfect SIC on the network’s performance. We first obtained feasible secure decoding orders to achieve a positive secrecy rate for each device. Under each device’s positive secrecy rate constraint, we jointly optimized the secure decoding order and power allocation to maximize the minimum secrecy rate between devices and provided the closed-form solution. Lastly, we presented numerical results to validate the accuracy of the theoretical analysis and provide insights into the optimal results and performance gain over benchmarks. Future work could analyze resource allocation for secrecy fairness maximization in a MIMO NOMA network with multiple devices.

Appendix A Proof of Proposition 3

In case of 𝐃3=[1,2;2,1]\mathbf{D}_{3}=[1,2;2,1], both devices U1U_{1} and U2U_{2} first decode their own signals, perform SIC, and then decode the signal of other multiplexed device. Following Table I, we obtain the SINRs as Γ11[3]=α|h1|2(1α)|h1|2+1ρt\Gamma^{[3]}_{11}=\frac{\alpha|h_{1}|^{2}}{(1-\alpha)|h_{1}|^{2}+\frac{1}{\rho_{t}}}, Γ21[3]=(1α)|h1|2α1β11|h1|2+1ρt\Gamma^{[3]}_{21}=\frac{(1-\alpha)|h_{1}|^{2}}{\alpha_{1}\beta_{11}|h_{1}|^{2}+\frac{1}{\rho_{t}}}, Γ22[3]=(1α)|h2|2α|h2|2+1ρt\Gamma^{[3]}_{22}=\frac{(1-\alpha)|h_{2}|^{2}}{\alpha|h_{2}|^{2}+\frac{1}{\rho_{t}}}, Γ12[3]=α|h2|2(1α)β22|h2|2+1ρt\Gamma^{[3]}_{12}=\frac{\alpha|h_{2}|^{2}}{(1-\alpha)\beta_{22}|h_{2}|^{2}+\frac{1}{\rho_{t}}}. Here, the condition Γ11[3]>Γ12[3]\Gamma^{[3]}_{11}>\Gamma^{[3]}_{12} for Rs1[3]>0R_{s1}^{[3]}>0 gives a feasible condition as α>1|h1|2|h2|2|h1|2|h2|2ρt(1β22)\alpha>1-\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(1-\beta_{22})}, which shows that strong device U1U_{1} can be secured from the U2U_{2}. However, the required condition Γ22[3]>Γ21[3]\Gamma^{[3]}_{22}>\Gamma^{[3]}_{21} for U2U_{2} leads to α<|h2|2|h1|2|h1|2|h2|2ρt(1β11)\alpha<\frac{|h_{2}|^{2}-|h_{1}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(1-\beta_{11})}, which is not a feasible condition. Thus, the data of U2U_{2} is not secured against U1U_{1}. Hence, the decoding order 𝐃3\mathbf{D}_{3} is infeasible.

Appendix B Proof of Proposition 4

In 𝐃4=[1,1;2,2]\mathbf{D}_{4}=[1,1;2,2], using Table I, the SINRs can be given as Γ11[4]=α|h1|2(1α)|h1|2+1ρt\Gamma^{[4]}_{11}=\frac{\alpha|h_{1}|^{2}}{(1-\alpha)|h_{1}|^{2}+\frac{1}{\rho_{t}}}, Γ21[4]=(1α)|h1|2αβ11|h1|2+1ρt\Gamma^{[4]}_{21}=\frac{(1-\alpha)|h_{1}|^{2}}{\alpha\beta_{11}|h_{1}|^{2}+\frac{1}{\rho_{t}}}, Γ12[4]=α|h2|2(1α)|h2|2+1ρt\Gamma^{[4]}_{12}=\frac{\alpha|h_{2}|^{2}}{(1-\alpha)|h_{2}|^{2}+\frac{1}{\rho_{t}}}, Γ22[4]=(1α)|h2|2αβ12|h2|2+1ρt\Gamma^{[4]}_{22}=\frac{(1-\alpha)|h_{2}|^{2}}{\alpha\beta_{12}|h_{2}|^{2}+\frac{1}{\rho_{t}}}. To get Rs1[4]>0R^{[4]}_{s1}>0 for U1U_{1}, we solve Γ11[4]>Γ12[4]\Gamma^{[4]}_{11}>\Gamma^{[4]}_{12}, and get a feasible condition |h1|2>|h2|2|h_{1}|^{2}>|h_{2}|^{2}. This shows that positive secrecy rate can be obtained for U1U_{1} if 0<α10<\alpha\leq 1, since α=0\alpha=0 gives Rs1[4]=0R^{[4]}_{s1}=0. Similarly, to get Rs2[4]>0R_{s2}^{[4]}>0, the condition Γ22[4]>Γ21[4]\Gamma^{[4]}_{22}>\Gamma^{[4]}_{21} gives a feasible condition α1>|h1|2|h2|2|h1|2|h2|2ρt(β11β12)\alpha_{1}>\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(\beta_{11}-\beta_{12})}. Thus, positive secrecy rate can be obtained for U2U_{2} with a constraint on α\alpha as |h1|2|h2|2|h1|2|h2|2ρt(β11β12)<α<1\frac{|h_{1}|^{2}-|h_{2}|^{2}}{|h_{1}|^{2}|h_{2}|^{2}\rho_{t}(\beta_{11}-\beta_{12})}<\alpha<1 since α=1\alpha=1 gives Rs2[4]=0R^{[4]}_{s2}=0. Thus, to get a positive secrecy rate for both devices, the joint constraint on power allocation can be given as in (12).

References

  • [1] L. D. Xu, W. He, and S. Li, “Internet of things in industries: A survey,” IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233–2243, Nov. 2014.
  • [2] A. Mahmood, L. Beltramelli, S. Fakhrul Abedin, S. Zeb, N. I. Mowla, S. A. Hassan, E. Sisinni, and M. Gidlund, “Industrial IoT in 5G-and-beyond networks: Vision, architecture, and design trends,” IEEE Trans. Ind. Informat., vol. 18, no. 6, pp. 4122–4137, June 2022.
  • [3] M. Gidlund, G. P. Hancke, M. H. Eldefrawy, and J. Åkerberg, “Guest editorial: Security, privacy, and trust for industrial internet of things,” IEEE Trans. Ind. Informat., vol. 16, no. 1, pp. 625–628, Jan. 2020.
  • [4] T. Gebremichael, L. P. I. Ledwaba, M. H. Eldefrawy, G. P. Hancke, N. Pereira, M. Gidlund, and J. Akerberg, “Security and privacy in the industrial internet of things: Current standards and future challenges,” IEEE Access, vol. 8, pp. 152 351–152 366, Aug. 2020.
  • [5] J. Tang, L. Jiao, K. Zeng, H. Wen, and K.-Y. Qin, “Physical layer secure MIMO communications against eavesdroppers with arbitrary number of antennas,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 466–481, 2021.
  • [6] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. K. Bhargava, “A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2181–2195, Oct. 2017.
  • [7] M. Wijewardena, T. Samarasinghe, K. T. Hemachandra, S. Atapattu, and J. S. Evans, “Physical layer security for intelligent reflecting surface assisted two–way communications,” IEEE Commun. Lett., vol. 25, no. 7, pp. 2156–2160, July 2021.
  • [8] W. Lu, Y. Mo, Y. Feng, Y. Gao, N. Zhao, Y. Wu, and A. Nallanathan, “Secure transmission for multi-UAV-assisted mobile edge computing based on reinforcement learning,” IEEE Trans. Netw. Sci. Eng., pp. 1–12, June 2022.
  • [9] Y. Ding, Y. Feng, W. Lu, S. Zheng, N. Zhao, L. Meng, A. Nallanathan, and X. Yang, “Online edge learning offloading and resource management for UAV-assisted MEC secure communications,” IEEE J. Sel. Topics Signal Process., vol. 17, no. 1, pp. 54–65, Jan. 2023.
  • [10] A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, 1975.
  • [11] J. M. Hamamreh, H. M. Furqan, and H. Arslan, “Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey,” IEEE Commun. Surveys Tuts., vol. 21, no. 2, pp. 1773–1828, Oct. 2018.
  • [12] X. Liu and X. Zhang, “NOMA-based resource allocation for cluster-based cognitive industrial internet of things,” IEEE Trans. Ind. Informat., vol. 16, no. 8, pp. 5379–5388, Aug. 2020.
  • [13] M. W. Akhtar, S. A. Hassan, A. Mahmood, H. Jung, H. K. Qureshi, and M. Gidlund, “Q2A-NOMA: A Q-learning-based QoS-aware NOMA system design for diverse data rate requirements,” IEEE Trans. Ind. Informat., vol. 18, no. 11, pp. 7549–7559, Jan. 2022.
  • [14] X. Liu, X. B. Zhai, W. Lu, and C. Wu, “QoS-guarantee resource allocation for multibeam satellite industrial internet of things with NOMA,” IEEE Trans. Ind. Informat., vol. 17, no. 3, pp. 2052–2061, Mar. 2021.
  • [15] B. He, A. Liu, N. Yang, and V. K. Lau, “On the design of secure non-orthogonal multiple access systems,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2196–2206, Oct. 2017.
  • [16] Y. Zhang, H.-M. Wang, Q. Yang, and Z. Ding, “Secrecy sum rate maximization in non-orthogonal multiple access,” IEEE Commun. Lett., vol. 20, no. 5, pp. 930–933, May 2016.
  • [17] L. Lv, Z. Ding, Q. Ni, and J. Chen, “Secure MISO-NOMA transmission with artificial noise,” IEEE Trans. Vehicular Technol., vol. 67, no. 7, pp. 6700–6705, July 2018.
  • [18] Y. Wu, G. Ji, T. Wang, L. Qian, B. Lin, and X. Shen, “Non-orthogonal multiple access assisted secure computation offloading via cooperative jamming,” IEEE Trans. Veh. Technol., vol. 71, no. 7, pp. 7751–7768, July 2022.
  • [19] L. Xiao, Y. Li, C. Dai, H. Dai, and H. V. Poor, “Reinforcement learning-based NOMA power allocation in the presence of smart jamming,” IEEE Trans. Veh. Technol., vol. 67, no. 4, pp. 3377–3389, Apr. 2018.
  • [20] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656–1672, Jan. 2017.
  • [21] B. M. ElHalawany and K. Wu, “Physical-layer security of NOMA systems under untrusted users,” in Proc. IEEE GLOBECOM, United Arab Emirates, Dec. 2018, pp. 1–6.
  • [22] S. Thapar, D. Mishra, and R. Saini, “Novel outage-aware NOMA protocol for secrecy fairness maximization among untrusted users,” IEEE Trans. Veh. Technol., vol. 69, no. 11, pp. 13 259–13 272, Sep. 2020.
  • [23] Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin, “Secure beamforming in downlink MISO nonorthogonal multiple access systems,” IEEE Trans. Veh. Technol., vol. 66, no. 8, pp. 7563–7567, Aug. 2017.
  • [24] M. Abolpour, S. Aïssa, M. Mirmohseni, and M. R. Aref, “Secrecy performance of friendly jammer assisted cooperative NOMA systems with internal eavesdroppers,” in Proc. IEEE PIMRC, London, United Kingdom, Aug. 2020, pp. 1–6.
  • [25] C. Zhang, F. Jia, Z. Zhang, J. Ge, and F. Gong, “Physical layer security designs for 5G NOMA systems with a stronger near-end internal eavesdropper,” IEEE Trans. Veh. Technol., vol. 69, no. 11, pp. 13 005 – 13 017, Aug. 2020.
  • [26] R. M. Christopher and D. K. Borah, “Physical layer security for weak user in MISO NOMA using directional modulation (NOMAD),” IEEE Commun. Lett., vol. 24, no. 5, pp. 956–960, Feb. 2020.
  • [27] Y. Qi and M. Vaezi, “Secure transmission in MIMO-NOMA networks,” IEEE Commun. Lett., vol. 24, no. 12, pp. 2696–2700, Aug. 2020.
  • [28] P. K. Hota, S. Thapar, D. Mishra, R. Saini, and A. Dubey, “Ergodic performance of downlink untrusted NOMA system with imperfect SIC,” IEEE Commun. Lett., vol. 26, no. 1, pp. 23–26, Jan. 2022.
  • [29] H. Sun, B. Xie, R. Q. Hu, and G. Wu, “Non-orthogonal multiple access with SIC error propagation in downlink wireless MIMO networks,” in Proc. IEEE VTC-Fall, Montreal, Canada, Sep. 2016, pp. 1–5.
  • [30] X. Yue, Z. Qin, Y. Liu, S. Kang, and Y. Chen, “A unified framework for non-orthogonal multiple access,” IEEE Transactions on Communications, vol. 66, no. 11, pp. 5346–5359, May 2018.
  • [31] B. T. F.T. Miandoab, “NOMA performance enhancement-based imperfect SIC minimization using a novel user pairing scenario involving three users in each pair,” Wireless Networks, vol. 26, no. 5, pp. 3735–3748, Mar. 2020.
  • [32] X. Wang, R. Chen, Y. Xu, and Q. Meng, “Low-complexity power allocation in NOMA systems with imperfect SIC for maximizing weighted sum-rate,” IEEE Access, vol. 7, pp. 94 238–94 253, July 2019.
  • [33] R. Jiao, L. Dai, W. Wang, F. Lyu, N. Cheng, and X. Shen, “Max-min fairness for beamspace MIMO-NOMA: From single-beam to multi-beam,” IEEE Trans. Wireless Commun., vol. 21, no. 2, pp. 739–752, Feb. 2022.
  • [34] X. Chen, A. Beiijebbour, A. Li, H. Jiang, and H. Kayama, “Consideration on successive interference canceller (SIC) receiver at cell-edge users for non-orthogonal multiple access (NOMA) with SU-MIMO,” in Proc. IEEE PIMRC, Hong Kong, China, Aug. 2015, pp. 522–526.
  • [35] M. Vaezi, R. Schober, Z. Ding, and H. V. Poor, “Non-orthogonal multiple access: Common myths and critical questions,” IEEE Wireless Commun., vol. 26, no. 5, pp. 174–180, Oct. 2019.
  • [36] Z. Ding, P. Fan, and H. V. Poor, “Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6010–6023, Aug. 2016.
  • [37] N. Li, M. Xiao, L. K. Rasmussen, X. Hu, and V. C. M. Leung, “On resource allocation of cooperative multiple access strategy in energy-efficient industrial internet of things,” IEEE Trans. Ind. Informat., vol. 17, no. 2, pp. 1069–1078, Feb. 2021.
  • [38] A. Ravindran, G. V. Reklaitis, and K. M. Ragsdell, Engineering optimization: methods and applications.   John Wiley & Sons, 2006.
[Uncaptioned image] Sapna Thapar (Student Member, IEEE) received the B.Tech. degree in electronics and communication engineering from the Rajasthan Technical University, Rajasthan, India, in 2013, and the M.Tech. degree in electronics and communication engineering from the LNMIIT Jaipur, Rajasthan, India, in 2016. She is currently working toward a PhD degree in electrical engineering from the Indian Institute of Technology (IIT) Jammu, Jammu and Kashmir, India. She has also been a Visiting Researcher at the University of Tokyo, Tokyo, Japan, in 2022. She has also worked at the Lovely Professional University, Punjab, India, as an Assistant Professor, from 2016 to 2017. She is a recipient of the TCS RSP Fellowship (2019-2023). She was also selected as an Exemplary Reviewer of IEEE WIRELESS COMMUNICATIONS LETTERS in 2021. Her research interests include non-orthogonal multiple access and physical layer security.
[Uncaptioned image] Deepak Mishra (Senior Member, IEEE) received a PhD degree in electrical engineering from the Indian Institute of Technology (IIT) Delhi in 2017. Currently, he is an Australian Research Council (ARC) Discovery Early Career Researcher Award (DECRA) fellow with the School of Electrical Engineering and Telecommunications at UNSW Sydney, where he joined in August 2019 as a Senior Research Associate. Before that, he was a Post-Doctoral Researcher at Linköping University, Sweden, from August 2017 to July 2019. He has also been a Visiting Researcher at the Northeastern University (USA), University of Rochester (USA), Huawei Technologies (France), and Southwest Jiaotong University (China). He serves as an Associate Editor of IEEE WIRELESS COMMUNICATIONS LETTERS, IEEE ACCESS, and Communication Theory track of Frontiers in Communications and Networks. His research interests include energy harvesting cooperative communication networks, MIMO, backscattering, physical layer security, as well as signal processing and energy optimization schemes for the uninterrupted operation of wireless networks.
[Uncaptioned image] Ravikant Saini (Member, IEEE) received B.Tech. degree in electronics and communication Engineering, and M.Tech. degree in communication systems from the Indian Institute of Technology Roorkee, India, in 2001 and 2005, respectively. After completing his PhD from the Indian Institute of Technology Delhi, India, in 2016, he worked as an Assistant Professor at Shiv Nadar University, Greater Noida, India, till Dec. 2017. Since then, he has been working as an Assistant Professor in the Electrical Engineering Department at the Indian Institute of Technology (IIT) Jammu, India.