Next Article in Journal
IRSDet: Infrared Small-Object Detection Network Based on Sparse-Skip Connection and Guide Maps
Previous Article in Journal
Sound Feedback for Social Distance: The Case for Public Interventions during a Pandemic
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure PD-NOMA with Multi-User Cooperation and User Clustering in Both Uplink and Downlink PD-NOMA

1
Smart Systems Engineering Laboratory, Department of Communications and Networks Engineering, College of Engineering, Prince Sultan University, P.O. Box 66833, Riyadh 11586, Saudi Arabia
2
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(14), 2153; https://doi.org/10.3390/electronics11142153
Submission received: 8 June 2022 / Revised: 6 July 2022 / Accepted: 8 July 2022 / Published: 9 July 2022
(This article belongs to the Section Microwave and Wireless Communications)

Abstract

:
The power domain non-orthogonal multiple access (PD-NOMA) scheme has gained tremendous interest with the multiple access behavior for fifth-generation (5G) wireless communication. Although the overall performance is improved through accurate power distribution among users’ signals, it depends on the user clustering strategy. Moreover, the PD-NOMA communication is not completely secured due to its broadcast nature, which is still a major problem. This paper presents a novel low-complexity short code-based technique utilized by the registered users and the 5G base station (gNodeB) for communication. By doing so, the PD-NOMA scheme is made secure from unregistered users or eavesdroppers. We proposed a three-step user clustering strategy that selects the best cluster among all the possible clusters to improve the overall performance. The proposed clustering strategy achieves a low outage probability in PD-NOMA systems. Moreover, it uses a multi-user decode and forward cooperative relaying scheme with PD-NOMA (Cop-PD-NOMA) to increase the coverage range of the gNodeB. In the multi-user Cop-PD-NOMA, the strong users (near users) are used as relay stations to aid the weak users (far users) by the decode and forward (D&F) technique. The proposed work provides a secure PD-NOMA network and the most effective user clustering approach during validation. The bit-error-rate (BER) comparisons demonstrate that multi-user cooperation outperforms single-user cooperation in Cop-PD-NOMA communication.

1. Introduction

Fifth-generation (5G) applications such as the internet of things, vehicular communication, video conferencing, satellite communication, and wearable devices have come a long way. As a result, wireless communication has grown to include autonomous systems such as self-driving cars, smart homes, advanced cognitive systems, and many more. As a result of this, the number of clients inside the 5G cell has increased, and it has become an ultra-dense cell. In this way, the existing resources, such as orthogonal multiple access (OMA) approaches, which have limits on the number of users due to their orthogonalization, cannot meet the needs of today’s wireless communication. To make sure that these needs are met, multiple access schemes were introduced in [1,2,3,4,5], that let different users share the same resources and are capable of serving the congested systems. Among these, non-orthogonal multiple access (NOMA), a promising 5G method [6], is proposed to remove orthogonality restrictions in the frequency and time domains for cells that are closer together.

1.1. Existing Literature on PD-NOMA

NOMA techniques are further categorized into power-domain NOMA (PD-NOMA) [7] and code-domain NOMA [8]. In the downlink PD-NOMA, a gNodeB transmits the multiple users’ signals by superimposing them in the power domain. The superposition is performed in a way that lets each NOMA user decode the signal of interest using successive interference cancellation (SIC) at their own receiver [9]. Similarly, in the uplink PD-NOMA, each user sends a signal at maximum power (unless a power control mechanism is used), which is added to the other signals in the air and decoded at the gNodeB using the SIC method [10]. The main difference between uplink and downlink PD-NOMA is the SIC order. Based on the SIC method, each user first separate the high power signal from the composite signal. In the downlink, the near users having better channel conditions first decode and eliminate the far user signal (high powered signal) having poor channel conditions using the SIC method. Once the far user signal is eliminated from the composite signal, the near user then retrieves its signal. While in the uplink, the gNodeB first decodes the signal from the near user and then uses SIC to decode the signal of the far user. The SIC technique is used to cancel the effect of the undesired signal during multi-user detection (MUD) by first decoding it from the combined signal, regenerating and subtracting it from the received combined signal [11]. A novel sky-ground (SG) NOMA receiving structure where the aerial user (AU) and terrestrial users (TU) are communicating with the ground base station is presented in [12]. It is understood that removing the most powerful users will give better performance, but only in the case when the most powerful user’s signals are fully correctly decoded at the nearest user, which is impractical. As a result of the decoding errors that occurred during the detection of the far user signal, as well as the complexity of performing SIC operations, the near user experienced performance degradation. The overall performance of the PD-NOMA system can be improved through proper power allocation strategies. The power allocation is completely based on the channel gains of each user [13]. Users with high channel gains (called “strong users”) are assigned the least amount of power, while users with low channel gains (called “weak users”) are assigned the most amount of power. The two-user PD-NOMA outperforms the NOMA-2000 [14]. In the two user PD-NOMA a single-level of SIC is used by the strong user to eliminate the signal of the weak user. Due to non-orthogonal nature of PD-NOMA the inter users’ interference is maximum and it becomes worst if more numbers of users are involved [15,16]. Proper power allocation strategies can help to reduce such interference. In [17], the fixed and dynamic power allocation (FPA and DPA) strategies were proposed for the static and dynamic PD-NOMA environments. The performance of PD-NOMA was analyzed for multi-user scenarios in [18]. The distance-based power allocation is carried out for two, three, and four-users per-cluster PD-NOMA, and the upper limit on the number of users per cluster was proposed in [19].
In ordinary PD-NOMA, the strong users of the system are capable of decoding the weak users’ data for SIC operation. In the PD-NOMA system, there are two types of users: (1) Registered users known to the gNodeB via proper communication links. (2) unregistered users or eavesdroppers, who are unknown and can steal or misuse the information from the received composite signal. This way, the privacy of the weak user data is compromised and can be detected by an unintended user. To ensure the data security in PD-NOMA, the physical layer security (PLS) and low probability detection (LPD) methods are highlighted in [20]. Owing to the raised issue, the PLS is proposed in [21,22] to ensure the efficient deployment of PD-NOMA. PLS has been demonstrated to be more effective and reliable than previous upper-layer security methods. This is because it relies on the unpredictability and randomness of the physical layer and uses simple operations to make sure the data being sent is secure. Once the data is secured from the eavesdroppers, the strong users can be used as relay stations that can assist the weak nodes through cooperation. The cooperative relaying PD-NOMA (Cop-PD-NOMA) is presented for the two users system where the strong user (cell-center) is used to decode and forward the signal of the weak user (cell-edge) [23]. By carefully regulating the phases of the passive components at the re-configurable intelligent surface (RIS), a suitable strategy that establishes a re-configurable radio environments of the propagation medium and increases the received signal strength is proposed in [24]. This study has focused on combined beamforming modeling and optimization for RIS-assisted hybrid satellite terrestrial relay systems, in which the connections from the BS and satellite to numerous users were obstructed. Furthermore, in [25,26] rate-splitting multiple access (RSMA) and NOMA are briefly investigated in satellite-terrestrial and aerial integrated networks. The fuzzy logic-based technique for relay node selection was proposed by Taj et al. in [27], which significantly enhances the selection of adaptive data rates and optimal power allocation. To increase system level performance, the cooperative relaying technique uses full duplex and half duplex relaying schemes on demand to improve the performance of cell-edge users by leveraging the cell-center user as a relay node in the PD-NOMA system [28]. For security purposes, the conventional techniques for user authorization in the Internet of Things are ineffective and risky. Conventional biometrics such as face and finger prints are insufficient for security. The authors in [29] suggest finger vein-based user verification to have more highly secure authentication for the Internet of Things. For real-time wireless sensor networks, the guaranteed time slots (GTSs) allocation mechanism is used in IEEE 802.15.4 [30] and an energy-efficient sleep control technique is used in [31], respectively. Moreover, a genetic algorithm based on machine learning was proposed for pedestrian identification in [32].
User clustering or user pairing is an essential factor of the PD-NOMA. Using the clustering technique, it is easy to figure out how much power to give each PD-NOMA user. Three different techniques for sub-optimal user-clustering solutions are provided in [33], all of which improve spectral efficiency while being simple and easy to apply. The maximum energy efficiency can be achieved through the best selections among cell-edge users for user clustering [34]. The likelihood of an outage was lowest in clusters with the most space between users, and it was highest in clusters with the least space between users. In [10], a low-complexity sub-optimal user clustering technique is presented. This technique takes advantage of the fact that different users in a PD-NOMA cluster have different channel gains and splits them up into different clusters to improve the system’s overall throughput.

1.2. Motivation and Contributions

The majority of research has been focused on power allocation strategies, either fixed or dynamic, which are responsible for overall performance improvement in PD-NOMA. Besides this, some of the literature also addressed the cooperative relaying schemes that are used to aid the weak node users in PD-NOMA systems. Moreover, secure communication in the PD-NOMA system is currently one of the main research areas to be explored. Thus, this study focuses on the major issues that PD-NOMA confronts in both downlink and uplink scenarios and offers solutions to address them. These issues include security, user clustering, and cooperative relaying for performance improvement.
The main contributions of this paper are:
  • For secure PD-NOMA communication, this paper presents the spreading-based technique with short codes that ensure the privacy of the PD-NOMA system from unregistered users or eavesdroppers.
  • Through multi-user decode and forward (D&F) cooperative relaying schemes in PD-NOMA (Cop-PD-NOMA), strong users (near-users) have been used as relays to help increase the coverage area of the gNodeB and improve the BER performance at weak users (far-users).
  • A low-complexity, three-step-based user clustering strategy is proposed to make sure that PD-NOMA clusters have low outage probabilities.
The rest of the article is arranged as follows: In Section 2, the system model for multi-user downlink and uplink PD-NOMA is proposed. Section 3 describes PD-NOMA’s proposed secure communication, multi-user cooperation, and user clustering strategy. The simulation results and conclusions are presented in Section 4 and Section 5, respectively.

2. System Model for Multi-User Downlink and Uplink PD-NOMA

In this section, we explain the basic ideas behind downlink and uplink NOMA for multiple users in a cluster with different channel gains. Multiple signals are superposed using the different power levels at the transmitter, and the superposed signals are decoded using an SIC mechanism at the receivers.

2.1. Multi-User Downlink PD-NOMA

The multi-user downlink PD-NOMA is shown in Figure 1. A gNodeB is used to superpose and transmit multiple distinct signals over the same frequency and time but with different powers non-orthogonally. For simplicity, we consider four users in a single cluster surrounding the gNodeB. All the four users R 1 , R 2 , R 3 , and R 4 have distinct channel gains. At each receiver, the desired signal is decoded once all the high-powered signals are eliminated from the superposed signal using the SIC technique. In the downlink PD-NOMA, the signals of strong users are assigned low power, while the signals of weak users are assigned high power. At the gNodeB, all the users’ signals are combined, and the composite signal X can be given as follows.
X ( t ) = i = 1 4 P i x i ( t ) ,
where P i is the power factor that has been normalized, and x i ( t ) is the signal for the ith user. The gNodeB total transmit power is denoted by P b , and the sum of the power assigned to all users is less than or equal to the total transmit power, such as,
P 1 + P 2 + P 3 + P 4 P b .
Allocation of power is based on the distances and channel gains of each user. Users R 1 , R 2 , R 3 , and R 4 have channel gains in the order of h 1 > h 2 > h 3 > h 4 . Depending on the channel conditions, the power factors are in the range of P 1 < P 2 < P 3 < P 4 .
After passing through the channel, the received signal Y ( t ) for each user is given as follows.
Y i ( t ) = h i X ( t ) + n i ( t ) ,
where h i is the channel gains, which are the reciprocal of the path losses, and n i (t) represents the additive white Gaussian noise (AWGN) for the ith user. The Path Loss (PL) is employed in the New York University simulator model (NYUSIM), which is expressed as follows.
P L ( f , d ) [ d B ] = F S P L ( f , 1 m ) [ d B ] + 10 n l o g 10 ( d ) + A T [ d B ] + X σ ,
where f and d are the frequency in gigahertz and the 3D distance between gNodeB and the ith user, respectively. n is the path loss exponent, and A T is the attenuation factor by the atmosphere. X σ is a Gaussian random variable having a mean of zero and a standard deviation of σ dB. The F S P L ( f , 1 m ) is the free space path loss in decibels at the carrier frequency f and a separation distance of 1 m. This parameter is defined by,
F S P L ( f , 1 m ) [ d B ] = 20 l o g 10 ( 4 π × f × 10 9 c ) , = 32.4 [ d B ] + 20 l o g 10 ( f ) ,
where, c denotes the speed of light. To decode user signals, the channel gains ( h i ) order are used. The highest channel gain user will decode all the users’ signals which are lower in channel gains. For the channel gain order, h 1 > h 2 > h 3 > h 4 : R 1 will perform three-level SIC to eliminate the effect of R 2 , R 3 , and R 4 signals. Similarly, R 2 will employ two-level SIC to eliminate R 3 and R 4 signals, R 3 will employ single-level SIC to eliminate R 4 signals, and R 4 will decode its signal directly due to its low channel gain and high power. In the multi-user downlink scenario, the strong users eliminate the interference caused by the weak users through the SIC technique and hence experience the maximum throughput compared to the weak users. The throughput for user R i in the multi-user downlink PD-NOMA scenario is given by [35].
R i = l o g 2 1 + P i | h i | 2 j = 1 i 1 P j | h i | 2 + N i , i = 1 , 2 , 3 , 4 .
where N i is the noise power spectral density for the ith user.

2.2. Multi-User Uplink PD-NOMA

In the multi-user uplink PD-NOMA, each user transmits signals at their maximum power of P i towards the gNodeB. However, each user experiences different channel conditions and hence has different channel gains. A multi-user uplink PD-NOMA system is shown in Figure 2, where four users communicate to gNodeB with the same power and different channel gains. It is understood that PD-NOMA serves users at different power levels, but here all the users have the same transmit power. The users’ signals are combined over the air because they are utilizing the same spectrum at the same time. The received composite signal at the gNodeB is given by
X = i = 1 4 P i h i x i ( t ) ,
where P i is the maximum transmit power and h i is the channel gain for the ith user. We know that the channel gain order is: h 1 > h 2 > h 3 > h 4 , and all the users are transmitting at their maximum power. As a result, the signal of the nearby user R 1 with channel gain h 1 is attenuated less and has more power remaining in comparison to the signal of the other users. The decoding of the signals at the gNodeB is: R 1 signal is decoded first and is used as a SIC term to decode the R 2 signal. Similarly, R 1 and R 2 signals are eliminated using SIC to detect the R 3 signal, while R 1 , R 2 , and R 3 signals are eliminated using SIC to detect the R 4 signal.
The achieved data rate in the case of a four-user uplink PD-NOMA is given by [35].
R i = l o g 2 1 + P i | h i | 2 j = i + 1 4 P j | h j | 2 + N i , i = 1 , 2 , 3 , 4 .
The main difference between the uplink and the downlink PD-NOMA is the SIC order. In the downlink, the far or weak user data is decoded first, while in the uplink the near or strong user data is decoded first. However, the main theme of the PD-NOMA is preserved in the sense that it decodes the signals based on the power level. In both the uplink and downlink, the signals having the highest power will be decoded first at each receiver. In the downlink, the strong users receive interference-free transmissions upon the successful elimination of the weak user signals through the SIC scheme. While in the uplink, weak users’ signals are once decoded upon the elimination of interference from all the strong users.

3. Proposed Secure Communication, Multi-User Cooperation, and User Clustering Strategy in PD-NOMA

3.1. Problem Formulation

This paper focused on three major points in the PD-NOMA systems: (1) Secure PD-NOMA communication; (2) Multi-user cooperation relaying scheme; and (3) User clustering strategy. Due to multiple access and its non-orthogonal nature, NOMA faces more security issues than the other OMA techniques. Due to multi-user detection (MUD) in NOMA, the strong users decode the information of weak users to perform SIC for signal detection. Thus, the security of the NOMA system for the weak or cell-edge users becomes a challenge since it is not designed to conceal the individual’s information. The issue is more challenging in the case of densely populated cellular networks. The multi-user PD-NOMA system is shown in Figure 3, where the gNodeB is surrounded by the registered ( R 1 , R 2 , R 3 , and R 4 ) and unregistered users (eavesdropper, ( E 1 )). Here, the “registered users” are the users of interest to whom the gNodeB wants to communicate. An unregistered user as an eavesdropper is able to steal or misuse the information transmitted from the gNodeB towards the registered users. The eavesdropper is able to decode the information of all the users that are located far from the gNodeB than the eavesdropper. In Figure 3, the downlink scenario for ordinary PD-NOMA is shown where multiple users are served in proximity of the gNodeB. All the users’ signals are combined into one composite signal through different power layers and then transmitted. During signal detection, the strong users decode the data of the weak users so that they can do SIC. In traditional PD-NOMA, registered users decode the data of weak users, which is only used for SIC operations. But the privacy of such systems is compromised if an unregistered user comes close to the gNodeB, which is capable of misusing or stealing the information of remote users. To solve this problem, we came up with a secret-spreading-based method that works with regular PD-NOMA to protect the privacy of these systems. This method is explained in the next Section 3.2. Due to the high frequency of 5G wireless communication, the cell-edge users around the gNodeB are facing severe signal degradation. This signal degradation is less in pico and femto cells but is more in micro and macro cells. To address this issue, it is necessary to use repeaters or relay stations that are capable of aiding these cell-edge users. In this work, we are utilizing the available resources, such as the cell-center users that are used as relay stations and are capable of decoding and forwarding the signals for cell-edge users. This technique is discussed in the Section 3.3. Furthermore, the power allocation in the densely populated 5G cells without user clustering is critical to handle. In the Section 3.4, we offer a three-step low-complexity user clustering technique.

3.2. Proposed Solution for Secure PD-NOMA Communication

The proposed system shown in Figure 3 assumes a total of five users ( R 1 , R 2 , R 3 , R 4 , and E 1 ). Users R 1 , R 2 , R 3 , and R 4 are considered registered users of the system, whereas E 1 is an unregistered user. In this case, the strong user is R 1 , which can decode the data of all the weak users, including R 2 , R 3 , and R 4 . Similarly, R 2 can decode both R 3 and R 4 data, but R 3 can only decode R 4 data. The proposed technique uses unique short spreading codes that are assigned to gNodeB and registered users. These spreading codes may be orthogonal or non-orthogonal, such as Walsh, pseudorandom sequence (PN), etc. These short codes are used for signal spreading and de-spreading at gNodeB and by registered users. Due to these codes, the registered user and the gNodeB are able to correctly decode the signals from the spread composite signal. The assigned codes may be single-level or multi-level based on the requirements of the system. The proposed system uses single-level codes for securing the users’ data from eavesdroppers. However, multi-level codes can also be used to protect complicated systems where eavesdroppers are able to break the security of single-level codes. To validate the proposed technique, we consider the multi-user downlink PD-NOMA scenario where the composite signal at the gNodeB is multiplied with a short secret code and then transmitted over a channel. At the receiving end, each user first de-spread the received composite signal by multiplying it with the same code. The post-processing, such as SIC and demodulation, has been implemented upon successful decoding of the composite signal. The eavesdropper E 1 , which compromises the ordinary PD-NOMA system security, has no such codes and is not capable of correctly decoding the composite signal. In doing so, the PD-NOMA system’s privacy is preserved. In both the uplink and the downlink scenarios, this method works well to keep unintended users from accessing the data. The proposed method helps a lot to protect PD-NOMA communication, especially in wireless sensor networks (WSN), from unregistered users of the system who might try to break its security.

3.3. Proposed Solution of Multi-User Cooperation in PD-NOMA

Cooperative relaying has been receiving a lot of attention in wireless communication because it can provide spatial diversity to minimize fading and get around the problems of putting many antennas on small communication stations. Multiple strong users are used as relay stations and are designated to aid weak users using the D&F technique in cooperative communications. As a result, combining cooperative communications with PD-NOMA can further improve system performance. In this method, users with good channel conditions D&F the signals for other users. This way, weak users with poor channel conditions to the gNodeB can transmit and receive data more reliably.
A downlink cooperative PD-NOMA (Cop-PD-NOMA) is shown in Figure 4, where four users are communicating with the gNodeB. The gNodeB and all the users are equipped with single input and single output (SISO) antennas. Users R 1 , R 2 , and R 3 are considered strong users, and R 4 as a weak user. The R 4 signal is attenuated more due to the greater distance separation to the gNodeB. To improve the received signal performance at R 4 we use multi-user cooperation from the strong users. In the time slot ( t 1 ), all the users receive a composite signal from the gNodeB, which is given as follows.
Y i , g r ( t 1 ) = h i , g i = 1 4 P i X ( t 1 ) + n i , g r ( t 1 ) ,
where h i , g is the channel gain and n i , g r ( t 1 ) is the AWGN between the gNodeB and the ith user. Superscript r denotes signal from gNodeB at ith receiver. Each receiver R 1 , R 2 , and R 3 first decode the R 4 signal due to its higher power. The decoded R 4 signal is then used for SIC operation to decode the other low powered signals such as R 3 , R 2 , and then R 1 . Users R 1 , R 2 , and R 3 are used sequentially as relay stations that use the ( D & F ) technique to assist the cell-edge user R 4 in the time slots ( t j ) where j = 2 , 3 , and 4. More explicitly, the previously decoded R 4 signal for SIC operation is restored and transmitted by each cell-center user. Multiple cell-center users can be used as relay stations, but this means that more bandwidth is being utilized. This way, in the proposed Cop-PD-NOMA system, user R 4 receives three forwarded copies of his signal from relay stations. The received D&F signals from each relay station at R 4 is given by
Y 4 , i d ( t j ) = l 4 , i P 4 x 4 ( t j ) + n 4 , i d ( t j ) ,
where l 4 , i denotes the channel gain and n 4 , i r ( t j ) is the AWGN between R 4 and the ith user. Superscript d denotes the D&F signal from ith relay station to R 4 . Now user R 4 have four received signals: one from the gNodeB and three from the relay stations: R 1 , R 2 , and R 3 . R 4 uses the maximal ratio combining (MRC) scheme to decode its message signal. The performance improvement due to Cop-PD-NOMA can be observed in the BER curves in the Results section. The generalized equation for D&F Cop-PD-NOMA signal is given by
Y n , i d ( t j ) = i = 1 I l n , i P n x n ( t j ) + n n , i d ( t j ) , n = 1 , 2 N
here, n represents the user which receives the D & F signals and i is the number of relay stations used in the Cop-PD-NOMA system. This way, the Cop-PD-NOMA significantly improve the performance at cell-edge users.

3.4. Proposed Solution for User Clustering Strategy

In the multi-user PD-NOMA system, user clustering or user pairing is as important as the power allocation among the users. The capacity and performance of the PD-NOMA system can be greatly improved by using the proper user clustering strategy. The concept of user grouping is in line with the basic needs of PD-NOMA systems because simultaneous transmissions at the same time and frequency in the denser systems are impractical. The lack of user clustering in the denser PD-NOMA system increases the system overhead for error propagation and channel feedback cooperation. To avoid the system overhead, user clustering can be utilized to improve the capacity and efficiency of PD-NOMA systems. In user clustering, users are divided into multiple groups where PD-NOMA can be effectively employed within each NOMA cluster. Through user clustering, the power distribution among users becomes an easy assignment.
Our proposed user clustering strategy is very helpful in assigning users into different clusters. Suppose we have a total of N users in the vicinity of a gNodeB. The total number of clusters (C) equals or less than half of the total number of users (C N / 2 ). A minimum of two users and a maximum of N / 2 users can be assigned to each NOMA cluster. However, an increasing number of users in a cluster results in poor performance. This is due to the multiple levels (m-levels) of SIC that are involved when there are the most users in a cluster. Due to m-level SIC, the complexity of decoding the weak user signals at the strong user increases, which results in poor performance. The best performance can be achieved when users have a maximum distance separation. Our proposed technique uses the following steps to distribute users among clusters:
  • Make C clusters with C N / 2 .
  • Select a minimum number of users in each cluster to reduce intra-cell interference.
  • Each group must contain users with a maximum distance separation.
The proposed three-step technique has been tested on a four-user system and can be expanded to an N number of users distributed across C clusters. All possible cluster arrangements for four users, R 1 , R 2 , R 3 , and R 4 are shown in Figure 5. Based on the above three steps, four different cluster types are presented, and each user is supposed to be distance d away from the next user. Using the first step of the proposed algorithm, four different clusters are created. In the Cluster Types 1, 2, and 3, two clusters C 1 and C 2 are made and assigned with two users each. As shown in Figure 5, Cluster Type 4 has one cluster C 1 with four users. The second step of the proposed algorithm is to choose a minimum number of users in each cluster. This is performed to reduce the intra-cell interference that happens when there are more users within the cluster. For example, Cluster Type 4 has four users and each successive user is distance (d) apart from the other. It will use a 3-level SIC technique to decode the signal at near user R 1 . Similarly, R 2 will use a two-level SIC technique, while R 3 will use a single-level SIC technique. Due to the increased number of users, the cluster complexity in terms of the multi-level SIC operation and intra-cell interference increases. Hence, Cluster Type 4 fails to achieve the criteria of the second step. On the other hand, Cluster Types 1, 2, and 3 have limited the number of users to a minimum level (each cluster with two users). In these three cluster types, each cluster performs a single-level SIC technique and experiences a minimum intra-cluster interference. Lastly, step three of the proposed algorithm chooses the best cluster based on the rule that each group must have users who are separated by a maximum distance, such as:
d ( R i ) d ( R j ) > minimum ( d ) i , j = 1 , 2 N , i j
where d is the minimum distance separation between two users. In Cluster Types 2 and 3, the minimum distance separation equals d, whereas in Cluster Type 1, it is 2 d . Due to maximum distance separation among the users of a cluster, it achieves the best performance. So, based on steps 1, 2, and 3, Cluster Type 1 is the best possible cluster for the proposed PD-NOMA system. Once the users are distributed among the C i clusters, the power allocation is then carried out, which is based on the distance separation to the gNodeB as in [19] and given as follows.
p i = d ( R i ) d m a x .
Here p i and d ( R i ) represents the ith user absolute power factor and the distance separation, respectively. All the absolute power factors are normalized to get the actual power factors ( P i ) for each cluster, which is defined mathematically by
P i = p i i = 1 N / 2 p i .

4. Simulation Results

This section provides the performance analysis of the proposed algorithms (secure PD-NOMA, multi-user Cop-PD-NOMA, and user clustering strategy) in both uplink and downlink PD-NOMA systems. Both the downlink and uplink PD-NOMA are tested for a single cluster of four users, R 1 , R 2 , R 3 , and R 4 . Users’ distances are in the order of d ( R 1 ) < d ( R 2 ) < d ( R 3 ) < d ( R 4 ) . The performance of the four-user downlink PD-NOMA is depicted in Figure 6, where each user is assigned a power factor that is based on the distance from the gNodeB. Users who are closer to gNodeB are given minimum power, while users who are far away are given maximum power. Figure 6 shows that R 1 has a higher BER than other users. This is due to the complexity of performing m-level (3-level) SIC to eliminate the effect of R 2 , R 3 , and R 4 signals in order to retrieve the R 1 signal. BER curves are obtained by averaging repeated simulation runs against different SNR values. Users achieve a threshold BER of 10 3 at SNR values of: R 1 at 19 dB, R 2 at 17 dB, R 3 at 16.2 dB, and R 4 at 14 dB. Similarly, Figure 7 shows the BER performance for the four-user uplink PD-NOMA, because each user transmits at maximum power (P) with different channel gains in the uplink PD-NOMA. The received signal power is attenuated more for the users located at a greater distance with lower channel gains than the others. At the gNodeB, R 1 signal is decoded first due to its high power, while other users’ signals are decoded after the SIC operation to eliminate the high power signals. Figure 7 shows a threshold BER of 10 3 is achieved at SNR values: R 1 at 8 dB, R 2 at 16 dB, R 3 at 24 dB, and R 4 at 29 dB.
The proposed secure PD-NOMA technique is employed to protect the data from unintended users or eavesdroppers. We used Walsh and PN codes that are only known to gNodeB and registered users, such as R 1 , R 2 , R 3 , and R 4 . In Figure 3, the downlink scenario is tested for the proposed secure PD-NOMA communication. At the gNodeB, users’ signals are combined into a single composite signal and multiplied with their secret code. The spread signal is received by the registered and unregistered users. The registered users ( R 1 , R 2 , R 3 , and R 4 ) de-spread the composite signal correctly using their secret code. Post processing, such as SIC, is used to decode and eliminate the high-powered signals. On the other hand, E 1 as an unregistered user is not capable of correctly decoding the composite signal due to a lack of the secret code. This way, the data can be protected during the MUD in the multiple access PD-NOMA technique. Figure 8 depicts the BER performance analysis for the proposed technique, where the BER curve for the E 1 is a flat line, indicating that the data was incorrectly decoded at the E 1 receiver. In the uplink of PD-NOMA, the same method is used to protect data so that it can be correctly decoded at the desired station, such as the gNodeB.
Presently, we present the performance analysis of the proposed multi-user D&F Cop-PD-NOMA. A total of four users are served around the gNodeB. As shown in Figure 4, the positions of users’ R 1 , R 2 , and R 3 are less than half the distance to the gNodeB as the R 4 position. Due to the greater distance, the R 4 signal undergoes more attenuation as compared to other users. The BER performance of the proposed system is shown in Figure 9, where three users R 1 , R 2 , and R 3 act as relay stations, transmitting the D&F signals for the user R 4 . The R 4 performance greatly improves using this multi-user cooperation. The results are compared to single-user cooperation scenarios [23], in which the cell-center user assists the cell-edge user through D&F cooperation. The proposed multi-user D&F Cop-PD-NOMA outperforms the single-user D&F Cop-PD-NOMA. As we can observe in Figure 9 and Figure 10, cooperation by multiple users can improve the BER performance of R 4 by 4 dB for the same BER threshold 10 3 , while cooperation by a single user can only improve it by 1 dB or less.
The performance of the proposed user clustering strategy is tested using outage probability analysis. As discussed in Section 3.4, better performance can be experienced in such clusters that have a maximum distance separation among their users. Two cluster types, cluster A and cluster B, are given with two users, R 1 and R 2 . In cluster A, user R 1 has a distance ( d 1 ) of 100 m and user R 2 has a distance ( d 2 ) of 500 m. Similarly, in cluster B, user R 1 has d 1 = 100 m and user R 2 has d 2 = 150 m. The distance separation between the users of cluster A is 400 meters, while it is only 50 meters in the case of cluster B. The outage probabilities for both the clusters are plotted vs different SNRs, as shown in Figure 11. Cluster A has a low outage probability because users are as far apart as possible and do not interfere with each other. Cluster B, on the other hand, has a high outage probability because users are close together and interfere with each other at their maximum.

5. Conclusions and the Future Work

The most essential design issues for the PD-NOMA to perform well in both uplink and downlink scenarios are secure communication, cooperation, and power allocation through user clustering. This study describes a spread-based technique using short codes for secure PD-NOMA communication against eavesdroppers who are not registered. The proposed study utilizes the D&F Cop-PD-NOMA technique to improve the performance of weak users. In addition, a low-complexity, three-step user clustering technique is presented to reduce the outage probability that occurs in PD-NOMA systems. The proposed study can be expanded in future work to incorporate more cutting-edge methods that can help to provide secure communication in denser NOMA networks. This strategy can be expanded to accommodate the dynamic PD-NOMA environments’ frequency and/or time selectivity. Furthermore, substantial adaptive user clustering can be used to find the best relay stations for cooperation. Additionally, the more advanced PLS techniques will help to determine the optimum solution to the challenges that expose PD-NOMA systems to vulnerability. Overall, the proposed study lays the groundwork for reliable and secure communication in PD-NOMA networks.

Author Contributions

Conceptualization, A.M., M.M. and H.M.; formal analysis, M.M. and M.M.N.; data curation, A.M. and M.A.E.; investigation, A.M. and M.M.; methodology, A.M. and H.M.; project administration, M.M.; supervision, M.M., H.M., M.M.N. and M.A.E.; validation, A.M.; writing—original draft, A.M.; writing—review and editing, M.M., M.M.N. and M.A.E. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R137), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Acknowledgments

The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) for this publication.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Makki, B.; Chitti, K.; Behravan, A.; Alouini, M.S. A survey of NOMA: Current status and open research challenges. IEEE Open J. Commun. Soc. 2020, 1, 179–189. [Google Scholar] [CrossRef] [Green Version]
  2. Ping, L.; Liu, L.; Wu, K.; Leung, W.K. Interleave division multiple-access. IEEE Trans. Wirel. Commun. 2006, 5, 938–947. [Google Scholar] [CrossRef] [Green Version]
  3. Nikopour, H.; Baligh, H. Sparse code multiple access. In Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK, 8–11 September 2013; pp. 332–336. [Google Scholar]
  4. Al-Imari, M.; Imran, M.A. Low density spreading multiple access. In Multiple Access Techniques for 5G Wireless Networks and Beyond; Springer: Cham, Switzerland, 2019; pp. 493–514. [Google Scholar]
  5. Chen, S.; Ren, B.; Gao, Q.; Kang, S.; Sun, S.; Niu, K. Pattern division multiple access—A novel nonorthogonal multiple access for fifth-generation radio networks. IEEE Trans. Veh. Technol. 2016, 66, 3185–3196. [Google Scholar] [CrossRef]
  6. Maraqa, O.; Rajasekaran, A.S.; Al-Ahmadi, S.; Yanikomeroglu, H.; Sait, S.M. A survey of rate-optimal power domain NOMA with enabling technologies of future wireless networks. IEEE Commun. Surv. Tutor. 2020, 22, 2192–2235. [Google Scholar] [CrossRef]
  7. Islam, S.R.; Avazov, N.; Dobre, O.A.; Kwak, K.S. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun. Surv. Tutor. 2016, 19, 721–742. [Google Scholar] [CrossRef] [Green Version]
  8. Le, M.T.; Ferrante, G.C.; Caso, G.; De Nardis, L.; Di Benedetto, M.G. On information-theoretic limits of code-domain NOMA for 5G. IET Commun. 2018, 12, 1864–1871. [Google Scholar] [CrossRef]
  9. Ali, M.S.; Hossain, E.; Al-Dweik, A.; Kim, D.I. Downlink power allocation for CoMP-NOMA in multi-cell networks. IEEE Trans. Commun. 2018, 66, 3982–3998. [Google Scholar] [CrossRef] [Green Version]
  10. Ali, M.S.; Tabassum, H.; Hossain, E. Dynamic user clustering and power allocation for uplink and downlink non-orthogonal multiple access (NOMA) systems. IEEE Access 2016, 4, 6325–6343. [Google Scholar] [CrossRef]
  11. Ding, Z.; Schober, R.; Poor, H.V. Unveiling the importance of SIC in NOMA systems—Part 1: State of the art and recent findings. IEEE Commun. Lett. 2020, 24, 2373–2377. [Google Scholar] [CrossRef]
  12. Darsena, D.; Iudice, I.; Verde, F. Reception strategies for sky-ground uplink non-orthogonal multiple access. arXiv 2021, arXiv:2108.06713. [Google Scholar]
  13. Oviedo, J.A.; Sadjadpour, H.R. A new NOMA approach for fair power allocation. In Proceedings of the 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, USA, 10–14 April 2016; pp. 843–847. [Google Scholar]
  14. Al Khansa, A.; Yin, Y.; Gui, G.; Sari, H. Power-domain NOMA or NOMA-2000? In Proceedings of the 2019 25th Asia-Pacific Conference on Communications (APCC), Ho Chi Minh City, Vietnam, 6–8 November 2019; pp. 336–341. [Google Scholar]
  15. Sadat, H.; Abaza, M.; Mansour, A.; Alfalou, A. A Survey of NOMA for VLC Systems: Research Challenges and Future Trends. Sensors 2022, 22, 1395. [Google Scholar] [CrossRef]
  16. Shahab, M.B.; Johnson, S.J.; Shirvanimoghaddam, M.; Dohler, M. Receiver design for uplink power domain NOMA with discontinuous transmissions. IEEE Commun. Lett. 2021, 25, 2738–2742. [Google Scholar] [CrossRef]
  17. Mounir, M.; El_Mashade, M.B.; Mohamed Aboshosha, A. On the selection of power allocation strategy in power domain non-orthogonal multiple access (PD-NOMA) for 6G and beyond. Trans. Emerg. Telecommun. Technol. 2021, 33, e4289. [Google Scholar] [CrossRef]
  18. Mahmood, A.; Zeeshan, M. Power allocation and performance analysis of multiuser NOMA under NYUSIM channel model. In Proceedings of the 2019 14th Conference on Industrial and Information Systems (ICIIS), Kandy, Sri Lanka, 18–20 December 2019; pp. 296–301. [Google Scholar]
  19. Mahmood, A.; Khan, S.; Hussain, S.; Zeeshan, M. Performance Analysis of Multi-User Downlink PD-NOMA Under SUI Fading Channel Models. IEEE Access 2021, 9, 52851–52859. [Google Scholar] [CrossRef]
  20. Grzesiak, K.; Piotrowski, Z. From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems. Sensors 2021, 21, 2752. [Google Scholar] [CrossRef] [PubMed]
  21. Baig, S.; Ali, U.; Asif, H.M.; Khan, A.A.; Mumtaz, S. Closed-form BER expression for Fourier and wavelet transform-based pulse-shaped data in downlink NOMA. IEEE Commun. Lett. 2019, 23, 592–595. [Google Scholar] [CrossRef]
  22. Melki, R.; Noura, H.N.; Mansour, M.M.; Chehab, A. An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet Things J. 2018, 6, 361–378. [Google Scholar] [CrossRef]
  23. Mahmood, A.; Marey, M.; Nasralla, M.M.; Esmail, M.A.; Zeeshan, M. Optimal Power Allocation and Cooperative Relaying under Fuzzy Inference System (FIS) Based Downlink PD-NOMA. Electronics 2022, 11, 1338. [Google Scholar] [CrossRef]
  24. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS aided hybrid satellite-terrestrial relay networks: Joint beamforming design and optimization. IEEE Trans. Aerosp. Electron. Syst. 2022. [Google Scholar] [CrossRef]
  25. Lin, Z.; Lin, M.; Wang, J.B.; De Cola, T.; Wang, J. Joint beamforming and power allocation for satellite-terrestrial integrated networks with non-orthogonal multiple access. IEEE J. Sel. Top. Signal Process. 2019, 13, 657–670. [Google Scholar] [CrossRef] [Green Version]
  26. Lin, Z.; Lin, M.; De Cola, T.; Wang, J.B.; Zhu, W.P.; Cheng, J. Supporting IoT with rate-splitting multiple access in satellite and aerial-integrated networks. IEEE Internet Things J. 2021, 8, 11123–11134. [Google Scholar] [CrossRef]
  27. Taj, N.; Zafar, M.H.; Waqas, S.A.; Rehman, H.; Alassafi, M.O.; Khan, I. Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment. Int. J. Commun. Netw. Inf. Secur. 2019, 11, 239–247. [Google Scholar] [CrossRef]
  28. Do, T.N.; da Costa, D.B.; Duong, T.Q.; An, B. Improving the performance of cell-edge users in NOMA systems using cooperative relaying. IEEE Trans. Commun. 2018, 66, 1883–1901. [Google Scholar] [CrossRef]
  29. Lu, Y.; Wu, S.; Fang, Z.; Xiong, N.; Yoon, S.; Park, D.S. Exploring finger vein based personal authentication for secure IoT. Future Gener. Comput. Syst. 2017, 77, 149–160. [Google Scholar] [CrossRef]
  30. Xia, F.; Hao, R.; Li, J.; Xiong, N.; Yang, L.T.; Zhang, Y. Adaptive GTS allocation in IEEE 802.15. 4 for real-time wireless sensor networks. J. Syst. Archit. 2013, 59, 1231–1242. [Google Scholar] [CrossRef]
  31. Wan, R.; Xiong, N. An energy-efficient sleep scheduling mechanism with similarity measure for wireless sensor networks. Hum.-Centric Comput. Inf. Sci. 2018, 8, 18. [Google Scholar] [CrossRef] [Green Version]
  32. Jiang, Y.; Tong, G.; Yin, H.; Xiong, N. A pedestrian detection method based on genetic algorithm for optimize XGBoost training parameters. IEEE Access 2019, 7, 118310–118321. [Google Scholar] [CrossRef]
  33. Rehman, B.U.; Babar, M.I.; Ahmad, A.W.; Alhumyani, H.; Azim, G.A.; Saeed, R.A.; Khalek, S.A. Joint power control and user grouping for uplink power domain non-orthogonal multiple access. Int. J. Distrib. Sens. Netw. 2021, 17. [Google Scholar] [CrossRef]
  34. Khazali, A.; Shayesteh, M.G.; Kalbkhani, H. User grouping and power allocation for energy efficiency maximization in mmWave-NOMA heterogeneous networks. Wirel. Netw. 2022, 28, 2403–2420. [Google Scholar] [CrossRef]
  35. Islam, S.M.; Zeng, M.; Dobre, O.A.; Kwak, K.S. Non-orthogonal multiple access (NOMA): How it meets 5G and beyond. arXiv 2019, arXiv:1907.10001. [Google Scholar]
Figure 1. Block diagram of multi-user downlink PD-NOMA with the channel gains order h 1 > h 2 > h 3 > h 4 .
Figure 1. Block diagram of multi-user downlink PD-NOMA with the channel gains order h 1 > h 2 > h 3 > h 4 .
Electronics 11 02153 g001
Figure 2. Illustration of multi-user Uplink PD-NOMA.
Figure 2. Illustration of multi-user Uplink PD-NOMA.
Electronics 11 02153 g002
Figure 3. Block diagram of downlink PD-NOMA with registered and unregistered users.
Figure 3. Block diagram of downlink PD-NOMA with registered and unregistered users.
Electronics 11 02153 g003
Figure 4. Multi-user cooperation in Cop-PD-NOMA with R 1 , R 2 , and R 3 as strong users and R 4 as a weak user.
Figure 4. Multi-user cooperation in Cop-PD-NOMA with R 1 , R 2 , and R 3 as strong users and R 4 as a weak user.
Electronics 11 02153 g004
Figure 5. Different types of user clustering for four user PD-NOMA ( R 1 is near and R 4 is far to gNodeB).
Figure 5. Different types of user clustering for four user PD-NOMA ( R 1 is near and R 4 is far to gNodeB).
Electronics 11 02153 g005
Figure 6. BER performance analysis of 4 users downlink PD-NOMA system.
Figure 6. BER performance analysis of 4 users downlink PD-NOMA system.
Electronics 11 02153 g006
Figure 7. BER performance analysis of 4 users uplink PD-NOMA system.
Figure 7. BER performance analysis of 4 users uplink PD-NOMA system.
Electronics 11 02153 g007
Figure 8. BER performance analysis for the registered and unregistered users under the proposed secure PD-NOMA technique.
Figure 8. BER performance analysis for the registered and unregistered users under the proposed secure PD-NOMA technique.
Electronics 11 02153 g008
Figure 9. BER performance analysis of the proposed four users D&F Cop-PD-NOMA communication.
Figure 9. BER performance analysis of the proposed four users D&F Cop-PD-NOMA communication.
Electronics 11 02153 g009
Figure 10. BER performance analysis of single-user D&F Cop-PD-NOMA communication [23].
Figure 10. BER performance analysis of single-user D&F Cop-PD-NOMA communication [23].
Electronics 11 02153 g010
Figure 11. Outage probability comparison for different cluster types in PD-NOMA communication.
Figure 11. Outage probability comparison for different cluster types in PD-NOMA communication.
Electronics 11 02153 g011
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mahmood, A.; Marey, M.; Nasralla, M.M.; Esmail, M.A.; Mostafa, H. Secure PD-NOMA with Multi-User Cooperation and User Clustering in Both Uplink and Downlink PD-NOMA. Electronics 2022, 11, 2153. https://doi.org/10.3390/electronics11142153

AMA Style

Mahmood A, Marey M, Nasralla MM, Esmail MA, Mostafa H. Secure PD-NOMA with Multi-User Cooperation and User Clustering in Both Uplink and Downlink PD-NOMA. Electronics. 2022; 11(14):2153. https://doi.org/10.3390/electronics11142153

Chicago/Turabian Style

Mahmood, Asif, Mohamed Marey, Moustafa M. Nasralla, Maged A. Esmail, and Hala Mostafa. 2022. "Secure PD-NOMA with Multi-User Cooperation and User Clustering in Both Uplink and Downlink PD-NOMA" Electronics 11, no. 14: 2153. https://doi.org/10.3390/electronics11142153

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop