Skip to main content

Advertisement

Log in

Physical layer security for NOMA: limitations, issues, and recommendations

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

More and more attention is being directed towards the Non-Orthogonal Multiple Access (NOMA) technology due to its many advantages such as high data rate, enhanced spectral and energy efficiency, massive connectivity, and low latency. On the other hand, secure data transmission remains a critical challenge in wireless communication systems since wireless channels are, in general, exposed. To increase the robustness of NOMA systems and overcome the issues related to wireless transmission, several Physical Layer Security (PLS) schemes have been recently presented. Unlike conventional security algorithms, this type of solutions exploits the dynamicity of the physical layer to secure data using a single iteration and minimum operations. In this paper, we survey the various NOMA-based PLS schemes in the literature, which target all kinds of security properties. From this study, we have noticed that the majority of the research work in this area is mainly focused on data confidentiality and privacy and not on other security properties such as device and source authentication, key generation, and message integrity. Therefore, we discuss the PLS data confidentiality schemes for NOMA and their limitations, challenges, and countermeasures, and we propose different methods to address the remaining security properties.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Dutta A (2019) Power domain NOMA design based on MBER criterion. In: National Conference on Communications (NCC), IEEE, pp 1–5

  2. Zeng J, et al. (2018) Investigation on evolving single-carrier NOMA into multi-carrier NOMA in 5G. IEEE Access 6: 48268–48288

    Article  Google Scholar 

  3. Shahab M, Shin S (2017) A time sharing based approach to accommodate similar gain users in NOMA for 5G networks. In: IEEE Conference on Local Computer Networks Workshops (LCN workshops), IEEE, pp 142–147

  4. Vaezi M, Ding Z, Poor H (2019) Multiple access techniques for 5G wireless networks and beyond. Springer, Book

    Book  Google Scholar 

  5. Furqan H, et al. (2019) Physical layer security for NOMA: requirements, merits, challenges, and recommendations. arXiv:1905.05064

  6. Baig S, Ali U, Asif HM, Khan AA, Mumtaz S (2019) Closed-form BER expression for fourier and wavelet transform-based pulse-shaped data in downlink NOMA. IEEE Commun Lett 23(4):592–595

    Article  Google Scholar 

  7. Melki R, et al. (2018) An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things Journal 6(1):361–378

    Article  Google Scholar 

  8. Aldababsa M, Toka M, Gökçceli S., Kurt GK, Kucur O (2018) A tutorial on nonorthogonal multiple access for 5G and beyond. Wireless Commun Mobile Comput, vol. 2018

  9. Kizilirmak R, Bizaki H (2016) Non-orthogonal multiple access (NOMA) for 5G networks. Towards 5G Wireless Networks-A Physical Layer Perspective: 83:83–98

    Google Scholar 

  10. Taherzadeh M, Nikopour H, Bayesteh A, Baligh H (2014) Scma codebook design. In: Proceedings of the IEEE Vehicular Technology Conference (VTC2014-Fall), IEEE, pp 1–5

  11. Melki R, Noura HN, Mansour MM, Chehab A (2019) Physical layer security schemes for MIMO systems: an overview. Wirel Netw: 26(3):2089–2111

    Article  Google Scholar 

  12. Melki R, Noura H, Mansour M, Chehab A (2019) A survey on OFDM physical layer security. Physical Communication 32:1–30

    Article  Google Scholar 

  13. Hamamreh J, Furqan H, Arslan H (2018) Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey. IEEE Communications Surveys & Tutorials 21 (2):1773–1828

    Article  Google Scholar 

  14. Lei H, et al. (2017) On secure NOMA systems with transmit antenna selection schemes. IEEE Access 5:17450–17464

    Article  Google Scholar 

  15. Shim K, et al. (2020) TAS schemes to enhance PLS in two-user NOMA systems with multiple eavesdroppers. In: International Conference on Electronics, Information and Communication (ICEIC)

  16. Noura H, Melki R, Chehab A, Mansour M (2018) A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach. Mobile Networks and Applications: 24(2):447–463

    Article  Google Scholar 

  17. Shin W, Vaezi M, Lee B, Love D, Lee J, Poor H (2017) Non-orthogonal multiple access in multi-cell networks: theory, performance, and practical challenges. IEEE Commun Mag 55(10):176–183

    Article  Google Scholar 

  18. Xu D, Ren P, Du Q, Sun L, Wang Y (2017) Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission. In: Proceedings of the IEEE International Conference on Communication (ICC), IEEE, pp 1–6

  19. Shannon C (1949) Communication theory of secrecy systems. Bell Systems Technical Journal 28:656–715

    Article  MathSciNet  MATH  Google Scholar 

  20. Stallings W, Tahiliani MP (2014) Cryptography and network security: principles and practice, vol. 6

  21. Gueron S, et al. (2019) Flexible architecture and instruction for advanced encryption standard (AES). US Patent 10,171,232

  22. Zhang H, et al. (2018) Heterogeneous ultra dense networks: part 2. IEEE Commun Mag 56 (6):12–13

    Article  Google Scholar 

  23. Noura H, Melki R, Chehab A, Mansour M, Martin S (2018) Efficient and secure physical encryption scheme for low-power wireless M2M devices. In: Proceedings of the IEEE International Wireless Communications & Mobile Computing Conference (IWCMC), IEEE, pp 1267–1272

  24. Cioni S, et al. (2018) On the satellite role in the era of 5G massive machine type communications. IEEE Netw 32(5):54–61

    Article  Google Scholar 

  25. Tayakout H, Dayoub I, Ghanem K, Bousbia-Salah H (2018) Automatic modulation classification for d-stbc cooperative relaying networks. IEEE Wireless Communications Letters 7(5):780–783

    Article  Google Scholar 

  26. Le Q, Bao V, An B (2018) Full-duplex distributed switch-and-stay energy harvesting selection relaying networks with imperfect CSI: design and outage analysis. J Commun Netw 20(1):29–46

  27. Pajovic M, Akino T, Orlik P (2019) Localization using millimeter wave communication signals. US Patent App. 10/425,910

  28. Ferreira P, et al. (2018) Multiobjective reinforcement learning for cognitive satellite communications using deep neural network ensembles. IEEE Journal on Selected Areas in Communications 36(5):1030–1041

    Google Scholar 

  29. Biton C, Arnon S (2018) Improved multiple access resource allocation in visible light communication systems. Opt Commun 424:98–102

    Article  Google Scholar 

  30. Roman R, Lopez J, Mambo M, et al. (2018) Mobile edge computing, fog: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698

    Article  Google Scholar 

  31. Jebril A, Sali A, Ismail A, Rasid M (2018) Overcoming limitations of LoRa physical layer in image transmission. Sensors 18(10):3257

    Article  Google Scholar 

  32. Melki R, Noura H, Chehab A (2019) Lightweight multi-factor mutual authentication protocol for IoT devices. Int J Inf Secur: 2019:1–16

    Google Scholar 

  33. Noura H, Melki R, Chehab A (2019) Secure and lightweight mutual multi-factor authentication for IoT communication systems. In: Proceedings of the IEEE Vehicular Technology Conference (VTC2019-Fall), IEEE, pp 1–7

  34. Saldamli G, Ertaul L, Shankaralingappa A (2019) Analysis of lightweight message authentication codes for IoT environments. In: Proceedings of the IEEE International Conference on Fog and Mobile Edge Computing (FMEC), IEEE, pp 235–240

  35. Satrya G, Shin Y (2019) Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems. Physical Communication 33:16–25

    Article  Google Scholar 

  36. Satrya G, Shin Y (2017) Security enhancement to successive interference cancellation algorithm for non-orthogonal multiple access (NOMA). In: Proceedings of the IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, pp 1–5

  37. Abolpour M, Mirmohseni M, Aref M (2019) Outage performance in secure cooperative NOMA. In: Proceedings of the IEEE Iran Workshop on Communication and Information theory (IWCIT), IEEE, pp 1–6

  38. Feng Y, Yan S, Liu C, Yang Z, Yang N (2019) Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access. IEEE Transactions on Information Forensics and Security 14(6):1670–1683

    Article  Google Scholar 

  39. Bankey V, Singh V, Upadhyay P (2020) Physical layer secrecy of NOMA-based hybrid satellite-terrestrial relay networks. In: Wireless Communications and Networking Conference (WCNC), IEEE, pp 1–6

  40. Xiang Z, et al. (2019) Physical layer security in cognitive radio inspired NOMA network. IEEE Journal of Selected Topics in Signal Processing 13(3):700–714

    Article  Google Scholar 

  41. Xiao K, Gong L, Kadoch M (2018) Opportunistic multicast NOMA with security concerns in a 5G massive MIMO system. IEEE Commun Mag 56(3):91–95

    Article  Google Scholar 

  42. Zhou F, et al. (2018) Enhancing PHY security of MISO NOMA SWIPT systems with a practical non-linear EH model. In: Proceedings of the IEEE International Conference on Communications Workshops (ICC Workshops), IEEE, pp 1–6

  43. Nandan N, Majhi S, Wu H (2018) Secure beamforming for MIMO-NOMA-based cognitive radio network. IEEE Commun Lett 22(8):1708–1711

    Article  Google Scholar 

  44. Zheng B, et al. (2018) Secure NOMA based two-way relay networks using artificial noise and full duplex. IEEE Journal on Selected Areas in Communications 36(7):1426–1440

    Article  Google Scholar 

  45. Zheng B, Chen F, Wen M, Li Q, Liu Y, Ji F (2018) Secure NOMA based cooperative networks with rate-splitting source and full-duplex relay. In: Proceedings of the IEEE International Symposium on Wireless Communication Systems (ISWCS), pp 1–5

  46. Zeng M, Nguyen N, Dobre O, Poor H (2019) Securing downlink massive MIMO-NOMA networks with artificial noise. IEEE Journal of Selected Topics in Signal Processing 13(3):685–699

    Article  Google Scholar 

  47. Singh P, Trivedi A (2020) NOMA And massive MIMO assisted physical layer security using artificial noise precoding. Physical Communication 39:100977

    Article  Google Scholar 

  48. Feng Y, et al. (2019) Beamforming design and power allocation for secure transmission with NOMA. IEEE Trans Wirel Commun 18(5):2639–2651

    Article  Google Scholar 

  49. Alsaba Y, Leow C, Abdul Rahim S (2019) Null-steering beamforming for enhancing the physical layer security of non-orthogonal multiple access system. IEEE Access 7:11397– 11409

    Article  Google Scholar 

  50. Chen J, Yang L, Alouini M (2018) Physical layer security for cooperative NOMA systems. IEEE Trans Veh Technol 67(5):4645–4649

    Article  Google Scholar 

  51. Wu Y, Khisti A, Xiao C, Caire G, Wong K, Gao X (2018) A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE Journal on Selected Areas in Communications 36(4):679–695

    Article  Google Scholar 

  52. Jiang F, Huang G, Liu W, Sun C (2018) Adaptive power allocation for D2D assisted cooperative relaying system with NOMA. In: Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC), pp 676–681

  53. Lei L, et al. (2018) Power and load optimization in interference-coupled non-orthogonal multiple access networks. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM), pp 1–6

  54. Yang L, Yuan Y (2020) Secrecy outage probability analysis for RIS-assisted NOMA systems. arXiv:2007.15902

  55. Anh L, Kong H (2020) Secrecy performance of an uplink-downlink cooperative PD-NOMA DF network in PLS. Int J Electron: 2020:1–26

    Google Scholar 

  56. You L, et al. (2018) Resource optimization with load coupling in multi-cell NOMA. IEEE Trans Wirel Commun 17(7):4735– 4749

    Article  Google Scholar 

  57. Su B, Ni Q, He B (2018) Robust transmit designs for secrecy rate constrained MISO NOMA system. In: Proceedings of the IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp 1–5

  58. Wang H, Zhang X, Yang Q, Tsiftsis TA (2019) Secure users oriented downlink MISO NOMA. IEEE Journal of Selected Topics in Signal Processing 13(3):671–684

    Article  Google Scholar 

  59. ElHalawany B, Ruby R, Riihonen T, Wu K (2018) Performance of cooperative NOMA systems under passive eavesdropping. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM), pp 1–6

  60. Islam A, Uddin M, Kader M, Shin S (2018) Blockchain based secure data handover scheme in non-orthogonal multiple access. In: Proceedings of the IEEE International Conference on Wireless and Telematics (ICWT), pp 1–5

  61. Shao X, Wu Z (2018) A novel multiple access scheme with physical layer security. In: Proceedings of the IEEE International Conference on communication technology (ICCT), pp 36–40

  62. Xu D, Ren P, Lin H (2018) Combat hybrid eavesdropping in power-domain NOMA: joint design of timing channel and symbol transformation. IEEE Trans Veh Technol 67(6):4998–5012

    Article  Google Scholar 

  63. Chen B, et al. (2019) Secure primary transmission assisted by a secondary full-duplex NOMA relay. IEEE Trans Veh Technol 68(7):7214–7219

    Article  Google Scholar 

  64. Zhao F, et al. (2020) Secure energy efficiency transmission for mmwave-NOMA system. IEEE Syst J

  65. Sun X, Yang W, Cai Y (2020) Secure communication in NOMA-assisted millimeter-wave SWIPT UAV networks. IEEE Internet of Things Journal 7(3)

  66. Xiang Z, et al. (2020) NOMA assisted secure short-packet communications in IoT. IEEE Wireless Communications 27(4):8–15

    Article  Google Scholar 

  67. Yesilkaya A, et al. (2020) Physical-layer security in visible light communications. In: 6G Wireless Summit (6G SUMMIT), IEEE, pp 1–5

  68. Sheng Z, Tuan H, Nasir A, Duong T, Poor H (2020) Secure UAV-enabled communication using han-kobayashi signaling. IEEE Trans Wirel Commun 19(5):2905–2919

    Article  Google Scholar 

  69. Lai K, Lei J, Wen L, Chen G, Li W, Xiao P (2018) Secure transmission with randomized constellation rotation for downlink sparse code multiple access system. IEEE Access 6:5049–5063

    Article  Google Scholar 

  70. Oggier F, Hassibi B (2011) The secrecy capacity of the MIMO wiretap channel. IEEE Trans Inf Theory 57(8):4961–4972

    Article  MathSciNet  MATH  Google Scholar 

  71. Barros J, Rodrigues M (2006) Secrecy capacity of wireless channels. In: IEEE International Symposium on Information Theory, IEEE, pp 356–360

  72. Tao L, et al. (2018) On secrecy outage probability and average secrecy rate of large-scale cellular networks. Wirel Commun Mob Comput, 2018

  73. Monteiro M, et al. (2018) Maximum secrecy throughput of MIMOME FSO communications with outage constraints. IEEE Trans Wirel Commun 17(5):3487–3497

    Article  Google Scholar 

  74. Li X, et al. (2018) Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Netw 72:105–114

    Article  Google Scholar 

  75. Yan S, Zhou X, Hu J, Hanly S (2019) Low probability of detection communication: opportunities and challenges. arXiv:1906.07895

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reem Melki.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Melki, R., Noura, H.N. & Chehab, A. Physical layer security for NOMA: limitations, issues, and recommendations. Ann. Telecommun. 76, 375–397 (2021). https://doi.org/10.1007/s12243-020-00819-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-020-00819-7

Keywords

Navigation