A SECURE NOMA METHOD BASED ON PHYSICAL LAYER SECURITY

Information

  • Patent Application
  • 20240063849
  • Publication Number
    20240063849
  • Date Filed
    December 26, 2021
    2 years ago
  • Date Published
    February 22, 2024
    2 months ago
  • Inventors
  • Original Assignees
    • ISTANBUL MEDIPOL UNIVERSITESI
Abstract
Disclosed is a secure scheme that incorporates both internal and external eavesdroppers to secure all users' links in the downlink PD-NOMA. In particular, the proposed scheme implies that the BS induces a phase shift in each user's symbol based on its corresponding instantaneous channel phase. The phase shift of each user is restricted such that the original symbol is moved to the location of another symbol in the constellation diagram. Therefore, as each user is aware of its instantaneous channel phase only, it will be able to recover the actual phase of its corresponding symbol. Thus, the proposed scheme does not only protect the data against eavesdroppers, but it also guarantees confidentiality and privacy against all other users.
Description
TECHNICAL FIELD

The present invention is a secure Non-Orthogonal Multiple Access (NOMA) method based on physical layer security concepts.


More particularly, the proposed method exploits the random and independent channel characteristics to induce a different phase shift in each user's symbol. Based on the assumption that the instantaneous channel phase between a user and the base station is available only at both ends, other users will not be able to decode the right symbol. The proposed scheme does not impact the performance at users' ends, and at the same time, can guarantee data confidentiality of each user against both internal and external eavesdropping.


BACKGROUND

NOMA has gained significant attention for 5G and beyond wireless systems for its desired properties. Among the different NOMA schemes, Power Domain NOMA (PD-NOMA) has recently received high attention due to its improved connectivity and simple implementation. It suffers from critical security risks. In particular, because all signals are broadcasted together over the same resources, there is a risk that an eavesdropper intercepts the transmission and gains access to user signals. Thus, Physical Layer Security (PLS) techniques have emerged as viable solutions for the shortcomings of conventional cryptography [7, 8, 9]. PLS exploits the diverse properties of the wireless fading channel (random channel fading, interference, noise, etc.) in such a way that the legitimate user can decode their data while the eavesdropper (Eve) is unable to decode any intercepted data. Consequently, PLS holds great potential in addressing security concerns present in NOMA and thus has gained significant research activity in recent years.


In NOMA, multiple users exploit the communication channel at the same time with different power levels this makes the information exchange between the communication entity vulnerable to eavesdropping which considers as one of the critical security problems in a communication system. An eavesdropper within a NOMA system can fall into one of two categories; external (that is not one of the legitimate users being served by the base station (BS)) or internal (which is one of the served users) [1]. Enhancing security level against potential internal eavesdroppers in PD-NOMA has been reported as a serious challenge. This is because the employed successive interference cancellation (SIC) detection technique in PD-NOMA dictates that a user should decode the signals of the users that have higher power levels, which makes transmitted signals vulnerable to eavesdropping [10].


The external Eve has been considered in the literature where different security mechanisms have been proposed to secure normal NOMA users from being eavesdropped based on different setups and scenarios. For example, artificial noise has been adopted in [2, 3] to degrade the performance at Eve, while the protected zone concept is utilized in [4, 5] where no Eve can reside in this zone. The shape and location of the protected zone are optimized for downlink mmWave-based NOMA systems in [6, 7] and uplink multi-antenna NOMA systems in [8]. In [9], transmit antenna selection is used to secure the data for two NOMA users against an external Eve. In another approach, the beamforming and the artificial noise are combined to degrade the reception at the external Eve in [10, 11], while optimizing beamforming and power allocation are considered in [12, 13, 14].


However, all of the above-mentioned works aim at degrading the received signal at Eve, which makes them invalid for combating internal eavesdroppers. besides, these methods could not face challenging requirements in terms of latency, spectral efficiency, connection density, data rate, energy efficiency, computational and hardware complexity. Examples of systems that face these challenges are the Internet of Things (IoT) system, ultra-reliable low-latency communication (URLLC), and massive machine-type communication (mMTC). As mentioned earlier, internal Eve is one of the served users, and hence, the employed security mechanism should not affect its data reception while it should prevent Eve from revealing the others' data.


The internal Eve, which is the main focus of this work, has been considered in only a few works [15, 16, 17, 18, 19]. In [17], users are distributed among clusters, and a zero-forcing beamforming scheme is presented to minimize mutual interference and information leakage. However, the case that the eavesdropper is the far user is considered simple as compared to the case when the eavesdropper is the near user.


Moreover, the eavesdropper is assumed to be identified at the BS, which should facilitate the action against it. Unlike [15, 16, 17], the authors of [18] combine both artificial noises aided beamforming and power allocation to mitigate the impact of the presence of an internal near eavesdropper and an external eavesdropper. Although it works efficiently against both types of eavesdroppers (internal and external), it requires that both are identified at the BS and their instantaneous channel gains are known as well. Thus, if a user is incorrectly identified as an eavesdropper, its performance will be degraded.


Recently, in [19], the directional modulation is exploited to protect the data of a far trusted user from being intercepted by an internal near eavesdropper. Specifically, directional modulation implies hiding the symbols transmitted to the trusted (far) user by representing them in a way so that the eavesdropper receives different lower-order symbols. Although it can efficiently protect the far user's data, it suffers from several limitations. First, it cannot be implemented for a system of more than to users, or more than a single eavesdropper. Second, the eavesdropper must be identified and known at the BS. Third, there is no guarantee to reach the optimal vector of the directional modulation.


The application numbered U.S. Ser. No. 10/651,961 describes techniques for wireless communication. A first method includes receiving downlink control information for first user equipment (UE) based at least in part on a group identifier associated with a NOMA group including the first UE and at least a second UE; and receiving a set of NOMA downlink transmissions at the first UE based at least in part on the downlink control information for the first UE. A second method includes receiving downlink control information for a first UE, the downlink control information for the first UE including an indication of at least a second UE; receiving downlink control information for the second UE based at least in part on the indication of at least the second UE; receiving a set of NOMA downlink transmissions at the first UE based at least in part on the downlink control information for the first UE and the downlink control information for the second UE. However, the application cannot guarantee data confidentiality of each user against both internal and external eavesdropping.


SUMMARY

To secure all users' links in the downlink PD-NOMA, this invention proposes a novel secure scheme that incorporates both internal and external eavesdroppers. In particular, the proposed scheme implies that the BS induces a phase shift in each user's symbol based on its corresponding instantaneous channel phase. The phase shift of each user is restricted such that the original symbol is moved to the location of another symbol in the constellation diagram. Therefore, as each user is aware of its instantaneous channel phase only, it will be able to recover the actual phase of its corresponding symbol. Thus, the proposed scheme does not only protect the data against eavesdroppers, but it also guarantees confidentiality and privacy against all other users. The only basic assumption in the proposed scheme is the availability of the full CSI at the BS It is worth highlighting that such an assumption is not an additional requirement since the CSI is already required at the BS for many other tasks.


The proposed algorithm can provide security against both internal and external eavesdropping without additional time or power resource consumption compare to conventional secure PD-NOMA schemes. Thus, the proposed method is more suitable for the networks that face challenging requirements in terms of latency, spectral efficiency, connection density, data rate, and energy efficiency like the Internet of Things (IoT) devices, massive machine type communication (mMTC), ultra-reliable low latency communication (ULLRC), remote surgery, and healthcare application.


The advantages of the proposed secure scheme can be summarized as follows:

    • The proposed scheme can work efficiently against internal and external eavesdroppers regardless of their locations, channel orders, and SNRs.
    • The proposed scheme can work efficiently for any number of eavesdroppers present in the system.
    • The proposed scheme does not induce any additional time or resource consumption concerning the conventional PD-NOMA system.
    • The proposed scheme does not affect the error performance of other legitimate users.
    • As the eavesdropper is an internal user, the proposed scheme allows the eavesdropper to get its data only and protects the others' data from being eavesdropped on.
    • The BS does need to identify the eavesdropper, where the proposed scheme assumes that the eavesdropper is unknown at the BS.
    • Relying on the channel phase to precode the signals improves the resilience of the proposed scheme. This is because the channel phase is fairly hard to be estimated or predicted by a third party as the channel phase is distant-independent.





BRIEF DESCRIPTION OF THE FIGURES


FIG. 1 shows the flowchart of the secure downlink NOMA method against an unknown internal eavesdropper.



FIG. 2 shows the flowchart of the secure uplink mMTC-NOMA method against the external eavesdropper.





DETAILED DESCRIPTION

In this invention, a novel secure Non-Orthogonal Multiple Access (NOMA) scheme based on physical layer security concepts is proposed. The proposed scheme exploits the random and independent channel characteristics to induce a different phase shift in each users symbol. Based on the assumption that the instantaneous channel phase between a user and the base station is available only at both ends, other users will not be able to decode the right symbol. The proposed scheme does not impact the performance at users' ends, and at the same time, can guarantee data confidentiality of each user against both internal and external eavesdropping.


In the first scenario, a secure downlink NOMA system against an unknown internal eavesdropper is proposed. In the BS, each user signal is modulated to be delivered.


Then, different power levels for each user is assigned based on its channel conditions, where the best user (usually the nearest) is allocated the lowest power level, and the highest power level is allocated to the worst user (usually the farthest). Denoting the power coefficient of user n by ρn, the allocated power coefficients should satisfy:



















n
=
1

N



ρ
n


=
1

,


and



ρ
1


<

ρ
2

<

<


ρ
n

.






(
1
)








Based on the proposed scheme, the BS induces a phase shift on each symbol before merging the transmitted symbols. Specifically, the BS will exploit its knowledge of the CSI of all users in order to extract a specific phase shift for each particular user that will be used to rotate its corresponding symbol. However, the challenge in NOMA systems is that the BER at a user mainly relies on its ability to correctly detect the other users' symbols. As such, the induced phase shift on a user should be carefully selected not to affect other users' performance.


Being a complex value, block fading channel hn can be expressed as hn=jneiθn, where jn and θn represent the magnitude and the phase of hn, respectively, and i is the imaginary unit. Accordingly, the phase shift on the symbol of user n, denoted by ϕn, is given as follows:












ϕ
n

=


(


[


θ
n


2


π
/
M



]

+
1

)

×



2

π

M

.






(
2
)








It should be noted the phase shift will rotate the corresponding symbol by a multiple of 2π/M, and hence, it will appear as another symbol on the constellation diagram. Thus, users (other than the intended user) will detect it as one of the candidate symbols (constellation points), and only the intended user (that is aware of ϕn) can recover the original phase of the symbol. FIG. 1 illustrates the proposed secure scheme for PD-NOMA systems.


Following the proposed scheme, the received signal at the user n is now given by












y
n

=



P




h
n

(







k
=
1

N




ρ
k




e


-
i



ϕ

k

S
k






)


+


w
n

.






(
3
)










    • where wn is denote the additive white Gaussian noise (AWGN) with zero mean and σ2 variance wn, ˜N(0, σ2) at the nth user's. Besides, all links are modeled by large-scale (path-loss) and small-scale fading












h
n

=


d
n

-

n
2





f
n







where fn is modeled by the Rayleigh fading channel gain fn˜N(0, σ2). And do is the separation distance between the transmitter and the receiver n, and n is the path loss exponent.


Accordingly, the SIC detection to accommodate the induced phase as:













s
^

n

=

arg


min

l
=

1
:
M







"\[LeftBracketingBar]"



y
n

-


P




h
n

(







k
=

n
+
1


N




ρ
k





s
^

k


)


-



P


ρ
n





h
n



e


-
i



ϕ

n

S
l









"\[RightBracketingBar]"







(
4
)








Each user performs SIC. SIC implies that each user performs an iterative maximum likelihood detection. Specifically, given the power levels order, user n detects the other users' symbols starting with the first user (i.e., user N) until reaching its symbol. At each iteration, the detected symbol is subtracted from the received signal, and the result is passed to the next iteration. This process allows a user to detect only the symbols of the users that have higher power coefficients than its coefficient. In other words, the user N signal is detected and subtracted from the received signal (yn) to find the user (N−1) signal and these procedures are repeated until the indented user detects his signal.


In the second scenario, a secure uplink mMTC-NOMA scheme against an external eavesdropper is defined. The mMTC refers to provide a massive connection between a large number of devices that transmit a small amount of data traffic like IoT applications, healthcare sensors, smart homes, etc. In up-link NOMA-based mMTC networks, multiple MTC devices (MTCDs) utilized the subchannel for transmission at the same time but with different power allocation. And each user allocated power due to their channel condition. Thus, the MTCD with the worst channel is allocated more power compare with the MTCD with better channel conditions. By assuming that the allocated power coefficients ρ12> . . . >ρn due to the channel gain condition |h1|2<|hn|2< . . . <|hN|2.


As shown in FIG. 2, each MTCD will shift own original phase of the symbol by the amount of phase determined in Eq. (2) then transmit the signal to the BS. the received signals at legitimate BS and Eve-BS will be:












y
d

=








k
=
1

N



h
n





ρ
n



P
n





s
n



e


-
i



ϕ
k




+

w

d
,
n







(
5
)
















y
e

=








k
=
1

N



g
n




ρ


P
n





s
n



e


-
i



ϕ
k




+

w

e
,
n







(
6
)








where wd,n and we,n are denote the additive white Gaussian noise (AWGN) with zero mean and σ2 variance wd,n, we,n˜N(0, σ2) between user n, legitimate BS, and Eve-BS, respectively. Besides, all links are modeled by large-scale (path-loss) and small-scale fading in such a way that hn and









g
n

=


d
n

-

n
2





f
n







where fn is modeled by the Rayleigh fading channel gain fn˜N(0, σ2). And do is the separation distance between the MTCD and the BS, and n is the path loss exponent.


Both legitimate BS and external eavesdropper exploit the SIC technology to decode the superposed received signals. SIC implies an iterative procedure where a BS first detects the signal of the strongest MTCD. Then subtracts this signal from the received signal until decode all MTCD receiver signals. At each iteration, the BS considers all other strong MTCD received signals as interference while weak MTCD received signals as noise. Since the CSI used to determine the phase shift (ϕn) and secure the information is available only to the MTCDs and legitimate BS. The external eavesdropper will evaluate differently phase value









ψ
n

=


(


[


Ω
n


2


π
/
M



]

+
1

)

×


2

π

M







wherein Ωn, the phase of gn. Thus, the legitimate BS will correctly detect the information for each user while external eavesdropper will not.


REFERENCES



  • [1] N. Zhao, D. Li, M. Liu, Y. Cao, Y. Chen, Z. Ding, and X. Wang, “Secure transmission via joint precoding optimization for downlink MISO NOMA,” IEEE Trans. Veh. Tech., vol. 68, no. 8, pp. 7603-7615, 2019.

  • [2] H. Bao, C. Zhang, L. Wu, and M. Li, “Design of physical layer secure transmission scheme based on SWIPT NOMA systems,” in IEEE ICCT, 2017, pp. 6-9.

  • [3] B. Chen, Y. Chen, Y. Chen, Y. Cao, Z. Ding, N. Zhao, and X. Wang, “Secure primary transmission assisted by a secondary full-duplex NOMA relay,” IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 7214-7219, 2019.

  • [4] Z. Qin, Y. Liu, Z. Ding, Y. Gao, and M. Elkashlan, “Physical layer security for 5G non-orthogonal multiple access in large-scale networks,” in IEEE ICC, 2016, pp. 1-6.

  • [5] N. Rupasinghe, Y. Yapici, I. Guvenc, H. Dai, and A. Bhuyan, “Enhancing physical layer security for NOMA transmission in mmWave drone networks,” in 2018 52nd Asilomar Conference on Signals, Systems, and Computers. IEEE, 2018, pp. 729-733.

  • [6] Y. Yapici, I. Guvenc, H. Dai, A. Bhuyan, and N. Rupasinghe, “Physical layer security for mmwave drone links with noma.”

  • [7] Y. Yapici, N. Rupasinghe, I. Guvenc, H. Dai, and A. Bhuyan, \Physical layer security for noma transmission in mmwave drone networks,” arXiv preprint arXiv:2001.04863, 2020.

  • [8] G. Gomez, F. J. Martin-Vega, F. Javier Lopez-Martinez, Y. Liu, and M. Elkashlan, “Physical layer security in uplink noma multi-antenna systems with randomly distributed eavesdroppers,” IEEE Access, vol. 7, pp. 70422-70435, 2019.

  • [9] H. Lei, J. Zhang, K.-H. Park, P. Xu, I. S. Ansari, G. Pan, B. Alomair, and M.-S. Alouini, “On secure NOMA systems with transmit antenna selection schemes,” IEEE Access, vol. 5, pp. 17450-17464, 2017.

  • [10] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the physical layer security of nonorthogonal multiple access in large-scale networks,” IEEE Trans. Wireless Comm., vol. 16, no. 3, pp. 1656-1672, 2017.

  • [11] L. Lv, Z. Ding, Q. Ni, and J. Chen, “Secure MISO-NOMA transmission with articial noise,” IEEE Trans. Veh. Tech., vol. 67, no. 7, pp. 6700-6705, 2018.

  • [12] Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin, “Secure beamforming in downlink MISO nonorthogonal multiple access systems,” IEEE Trans. Veh. Tech., vol. 66, no. 8, pp. 7563-7567, 2017.

  • [13] B. M. ElHalawany and K. Wu, “Physical-layer security of NOMA systems under untrusted users,” in 2018 IEEE GLOBECOM, 2018, pp. 1-6.

  • [14] Y. Cao, N. Zhao, Y. Chen, M. Jin, Z. Ding, Y. Li, and F. R. Yu, “Secure transmission via beamforming optimization for NOMA networks,” IEEE Wireless Comm., 2019.

  • [15] B. M. ElHalawany and K. Wu, “Physical-layer security of noma systems under untrusted users,” in 2018 IEEE Global Communications Conference (GLOBECOM), 2018, pp. 1-6.

  • [16] K. Cao, B. Wang, H. Ding, T. Li, and F. Gong, “Optimal relay selection for secure noma systems under untrusted users,” IEEE Transactions on Vehicular Technology, vol. 69, no. 2, pp. 1942-1955, 2020.

  • [17] Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin, “Secure beamforming in downlink miso nonorthogonal multiple access systems,” IEEE Transactions on Vehicular Technology, vol. 66, no. 8, pp. 7563-7567, 2017.

  • [18] K. Cao, B. Wang, H. Ding, T. Li, J. Tian, and F. Gong, “Secure transmission designs for noma systems against internal and external eavesdropping,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2930-2943, 2020.

  • [19] R. M. Christopher and D. K. Borah, “Physical layer security for weak user in miso noma using directional modulation (nomad),” IEEE Communications Letters, vol. 24, no. 5, pp. 956-960, 2020.


Claims
  • 1. A secure downlink NOMA method against an unknown internal eavesdropper, comprising: assigning different power levels for each user by a base station based on users' channel conditions,inducing a phase shift on each modulated symbol,merging and sending the superposed signal to the users from the base station,each user performs successive interference cancellation by detecting the other users' symbols starting with the first user until reaching its symbol by subtracting the detected symbol from the received signal at each iteration and carrying the resulting signal to the next iteration, andperforming a phase shift to detect the confidential signal.
  • 2. The method according to claim 1, wherein the base station extracts a specific phase shift for each particular user that will be used to rotate its corresponding symbol.
  • 3. The method according to claim 2, wherein the phase shift on the symbol of user n, denoted by ϕn, is given as
  • 4. A secure uplink massive machine type communication NOMA method against an external eavesdropper, comprising: each user modulates their symbol to be delivered to a base station,shifting each symbol by a phase value,transmitting user signals according to allocated power to the base station,receiving signals from all the users simultaneously at the base station,detecting the signal of the strongest user and applying a phase shifter to demodulate the strongest user signal,applying iterative successive interference cancellation to detect the rest user signals, andapplying a phase shift until detecting all user signals.
  • 5. The method according to claim 4, wherein the phase shift value on the symbol of user n, denoted by ϕn, is given as
Priority Claims (1)
Number Date Country Kind
TR 2020/22629 Dec 2020 TR national
PCT Information
Filing Document Filing Date Country Kind
PCT/TR2021/051509 12/26/2021 WO