Abstract
More and more attention is being directed towards the Non-Orthogonal Multiple Access (NOMA) technology due to its many advantages such as high data rate, enhanced spectral and energy efficiency, massive connectivity, and low latency. On the other hand, secure data transmission remains a critical challenge in wireless communication systems since wireless channels are, in general, exposed. To increase the robustness of NOMA systems and overcome the issues related to wireless transmission, several Physical Layer Security (PLS) schemes have been recently presented. Unlike conventional security algorithms, this type of solutions exploits the dynamicity of the physical layer to secure data using a single iteration and minimum operations. In this paper, we survey the various NOMA-based PLS schemes in the literature, which target all kinds of security properties. From this study, we have noticed that the majority of the research work in this area is mainly focused on data confidentiality and privacy and not on other security properties such as device and source authentication, key generation, and message integrity. Therefore, we discuss the PLS data confidentiality schemes for NOMA and their limitations, challenges, and countermeasures, and we propose different methods to address the remaining security properties.
Similar content being viewed by others
References
Dutta A (2019) Power domain NOMA design based on MBER criterion. In: National Conference on Communications (NCC), IEEE, pp 1–5
Zeng J, et al. (2018) Investigation on evolving single-carrier NOMA into multi-carrier NOMA in 5G. IEEE Access 6: 48268–48288
Shahab M, Shin S (2017) A time sharing based approach to accommodate similar gain users in NOMA for 5G networks. In: IEEE Conference on Local Computer Networks Workshops (LCN workshops), IEEE, pp 142–147
Vaezi M, Ding Z, Poor H (2019) Multiple access techniques for 5G wireless networks and beyond. Springer, Book
Furqan H, et al. (2019) Physical layer security for NOMA: requirements, merits, challenges, and recommendations. arXiv:1905.05064
Baig S, Ali U, Asif HM, Khan AA, Mumtaz S (2019) Closed-form BER expression for fourier and wavelet transform-based pulse-shaped data in downlink NOMA. IEEE Commun Lett 23(4):592–595
Melki R, et al. (2018) An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things Journal 6(1):361–378
Aldababsa M, Toka M, Gökçceli S., Kurt GK, Kucur O (2018) A tutorial on nonorthogonal multiple access for 5G and beyond. Wireless Commun Mobile Comput, vol. 2018
Kizilirmak R, Bizaki H (2016) Non-orthogonal multiple access (NOMA) for 5G networks. Towards 5G Wireless Networks-A Physical Layer Perspective: 83:83–98
Taherzadeh M, Nikopour H, Bayesteh A, Baligh H (2014) Scma codebook design. In: Proceedings of the IEEE Vehicular Technology Conference (VTC2014-Fall), IEEE, pp 1–5
Melki R, Noura HN, Mansour MM, Chehab A (2019) Physical layer security schemes for MIMO systems: an overview. Wirel Netw: 26(3):2089–2111
Melki R, Noura H, Mansour M, Chehab A (2019) A survey on OFDM physical layer security. Physical Communication 32:1–30
Hamamreh J, Furqan H, Arslan H (2018) Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey. IEEE Communications Surveys & Tutorials 21 (2):1773–1828
Lei H, et al. (2017) On secure NOMA systems with transmit antenna selection schemes. IEEE Access 5:17450–17464
Shim K, et al. (2020) TAS schemes to enhance PLS in two-user NOMA systems with multiple eavesdroppers. In: International Conference on Electronics, Information and Communication (ICEIC)
Noura H, Melki R, Chehab A, Mansour M (2018) A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach. Mobile Networks and Applications: 24(2):447–463
Shin W, Vaezi M, Lee B, Love D, Lee J, Poor H (2017) Non-orthogonal multiple access in multi-cell networks: theory, performance, and practical challenges. IEEE Commun Mag 55(10):176–183
Xu D, Ren P, Du Q, Sun L, Wang Y (2017) Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission. In: Proceedings of the IEEE International Conference on Communication (ICC), IEEE, pp 1–6
Shannon C (1949) Communication theory of secrecy systems. Bell Systems Technical Journal 28:656–715
Stallings W, Tahiliani MP (2014) Cryptography and network security: principles and practice, vol. 6
Gueron S, et al. (2019) Flexible architecture and instruction for advanced encryption standard (AES). US Patent 10,171,232
Zhang H, et al. (2018) Heterogeneous ultra dense networks: part 2. IEEE Commun Mag 56 (6):12–13
Noura H, Melki R, Chehab A, Mansour M, Martin S (2018) Efficient and secure physical encryption scheme for low-power wireless M2M devices. In: Proceedings of the IEEE International Wireless Communications & Mobile Computing Conference (IWCMC), IEEE, pp 1267–1272
Cioni S, et al. (2018) On the satellite role in the era of 5G massive machine type communications. IEEE Netw 32(5):54–61
Tayakout H, Dayoub I, Ghanem K, Bousbia-Salah H (2018) Automatic modulation classification for d-stbc cooperative relaying networks. IEEE Wireless Communications Letters 7(5):780–783
Le Q, Bao V, An B (2018) Full-duplex distributed switch-and-stay energy harvesting selection relaying networks with imperfect CSI: design and outage analysis. J Commun Netw 20(1):29–46
Pajovic M, Akino T, Orlik P (2019) Localization using millimeter wave communication signals. US Patent App. 10/425,910
Ferreira P, et al. (2018) Multiobjective reinforcement learning for cognitive satellite communications using deep neural network ensembles. IEEE Journal on Selected Areas in Communications 36(5):1030–1041
Biton C, Arnon S (2018) Improved multiple access resource allocation in visible light communication systems. Opt Commun 424:98–102
Roman R, Lopez J, Mambo M, et al. (2018) Mobile edge computing, fog: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698
Jebril A, Sali A, Ismail A, Rasid M (2018) Overcoming limitations of LoRa physical layer in image transmission. Sensors 18(10):3257
Melki R, Noura H, Chehab A (2019) Lightweight multi-factor mutual authentication protocol for IoT devices. Int J Inf Secur: 2019:1–16
Noura H, Melki R, Chehab A (2019) Secure and lightweight mutual multi-factor authentication for IoT communication systems. In: Proceedings of the IEEE Vehicular Technology Conference (VTC2019-Fall), IEEE, pp 1–7
Saldamli G, Ertaul L, Shankaralingappa A (2019) Analysis of lightweight message authentication codes for IoT environments. In: Proceedings of the IEEE International Conference on Fog and Mobile Edge Computing (FMEC), IEEE, pp 235–240
Satrya G, Shin Y (2019) Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems. Physical Communication 33:16–25
Satrya G, Shin Y (2017) Security enhancement to successive interference cancellation algorithm for non-orthogonal multiple access (NOMA). In: Proceedings of the IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, pp 1–5
Abolpour M, Mirmohseni M, Aref M (2019) Outage performance in secure cooperative NOMA. In: Proceedings of the IEEE Iran Workshop on Communication and Information theory (IWCIT), IEEE, pp 1–6
Feng Y, Yan S, Liu C, Yang Z, Yang N (2019) Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access. IEEE Transactions on Information Forensics and Security 14(6):1670–1683
Bankey V, Singh V, Upadhyay P (2020) Physical layer secrecy of NOMA-based hybrid satellite-terrestrial relay networks. In: Wireless Communications and Networking Conference (WCNC), IEEE, pp 1–6
Xiang Z, et al. (2019) Physical layer security in cognitive radio inspired NOMA network. IEEE Journal of Selected Topics in Signal Processing 13(3):700–714
Xiao K, Gong L, Kadoch M (2018) Opportunistic multicast NOMA with security concerns in a 5G massive MIMO system. IEEE Commun Mag 56(3):91–95
Zhou F, et al. (2018) Enhancing PHY security of MISO NOMA SWIPT systems with a practical non-linear EH model. In: Proceedings of the IEEE International Conference on Communications Workshops (ICC Workshops), IEEE, pp 1–6
Nandan N, Majhi S, Wu H (2018) Secure beamforming for MIMO-NOMA-based cognitive radio network. IEEE Commun Lett 22(8):1708–1711
Zheng B, et al. (2018) Secure NOMA based two-way relay networks using artificial noise and full duplex. IEEE Journal on Selected Areas in Communications 36(7):1426–1440
Zheng B, Chen F, Wen M, Li Q, Liu Y, Ji F (2018) Secure NOMA based cooperative networks with rate-splitting source and full-duplex relay. In: Proceedings of the IEEE International Symposium on Wireless Communication Systems (ISWCS), pp 1–5
Zeng M, Nguyen N, Dobre O, Poor H (2019) Securing downlink massive MIMO-NOMA networks with artificial noise. IEEE Journal of Selected Topics in Signal Processing 13(3):685–699
Singh P, Trivedi A (2020) NOMA And massive MIMO assisted physical layer security using artificial noise precoding. Physical Communication 39:100977
Feng Y, et al. (2019) Beamforming design and power allocation for secure transmission with NOMA. IEEE Trans Wirel Commun 18(5):2639–2651
Alsaba Y, Leow C, Abdul Rahim S (2019) Null-steering beamforming for enhancing the physical layer security of non-orthogonal multiple access system. IEEE Access 7:11397– 11409
Chen J, Yang L, Alouini M (2018) Physical layer security for cooperative NOMA systems. IEEE Trans Veh Technol 67(5):4645–4649
Wu Y, Khisti A, Xiao C, Caire G, Wong K, Gao X (2018) A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE Journal on Selected Areas in Communications 36(4):679–695
Jiang F, Huang G, Liu W, Sun C (2018) Adaptive power allocation for D2D assisted cooperative relaying system with NOMA. In: Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC), pp 676–681
Lei L, et al. (2018) Power and load optimization in interference-coupled non-orthogonal multiple access networks. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM), pp 1–6
Yang L, Yuan Y (2020) Secrecy outage probability analysis for RIS-assisted NOMA systems. arXiv:2007.15902
Anh L, Kong H (2020) Secrecy performance of an uplink-downlink cooperative PD-NOMA DF network in PLS. Int J Electron: 2020:1–26
You L, et al. (2018) Resource optimization with load coupling in multi-cell NOMA. IEEE Trans Wirel Commun 17(7):4735– 4749
Su B, Ni Q, He B (2018) Robust transmit designs for secrecy rate constrained MISO NOMA system. In: Proceedings of the IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp 1–5
Wang H, Zhang X, Yang Q, Tsiftsis TA (2019) Secure users oriented downlink MISO NOMA. IEEE Journal of Selected Topics in Signal Processing 13(3):671–684
ElHalawany B, Ruby R, Riihonen T, Wu K (2018) Performance of cooperative NOMA systems under passive eavesdropping. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM), pp 1–6
Islam A, Uddin M, Kader M, Shin S (2018) Blockchain based secure data handover scheme in non-orthogonal multiple access. In: Proceedings of the IEEE International Conference on Wireless and Telematics (ICWT), pp 1–5
Shao X, Wu Z (2018) A novel multiple access scheme with physical layer security. In: Proceedings of the IEEE International Conference on communication technology (ICCT), pp 36–40
Xu D, Ren P, Lin H (2018) Combat hybrid eavesdropping in power-domain NOMA: joint design of timing channel and symbol transformation. IEEE Trans Veh Technol 67(6):4998–5012
Chen B, et al. (2019) Secure primary transmission assisted by a secondary full-duplex NOMA relay. IEEE Trans Veh Technol 68(7):7214–7219
Zhao F, et al. (2020) Secure energy efficiency transmission for mmwave-NOMA system. IEEE Syst J
Sun X, Yang W, Cai Y (2020) Secure communication in NOMA-assisted millimeter-wave SWIPT UAV networks. IEEE Internet of Things Journal 7(3)
Xiang Z, et al. (2020) NOMA assisted secure short-packet communications in IoT. IEEE Wireless Communications 27(4):8–15
Yesilkaya A, et al. (2020) Physical-layer security in visible light communications. In: 6G Wireless Summit (6G SUMMIT), IEEE, pp 1–5
Sheng Z, Tuan H, Nasir A, Duong T, Poor H (2020) Secure UAV-enabled communication using han-kobayashi signaling. IEEE Trans Wirel Commun 19(5):2905–2919
Lai K, Lei J, Wen L, Chen G, Li W, Xiao P (2018) Secure transmission with randomized constellation rotation for downlink sparse code multiple access system. IEEE Access 6:5049–5063
Oggier F, Hassibi B (2011) The secrecy capacity of the MIMO wiretap channel. IEEE Trans Inf Theory 57(8):4961–4972
Barros J, Rodrigues M (2006) Secrecy capacity of wireless channels. In: IEEE International Symposium on Information Theory, IEEE, pp 356–360
Tao L, et al. (2018) On secrecy outage probability and average secrecy rate of large-scale cellular networks. Wirel Commun Mob Comput, 2018
Monteiro M, et al. (2018) Maximum secrecy throughput of MIMOME FSO communications with outage constraints. IEEE Trans Wirel Commun 17(5):3487–3497
Li X, et al. (2018) Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Netw 72:105–114
Yan S, Zhou X, Hu J, Hanly S (2019) Low probability of detection communication: opportunities and challenges. arXiv:1906.07895
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Melki, R., Noura, H.N. & Chehab, A. Physical layer security for NOMA: limitations, issues, and recommendations. Ann. Telecommun. 76, 375–397 (2021). https://doi.org/10.1007/s12243-020-00819-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-020-00819-7