You are on page 1of 12

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

Secure Transmission in HARQ-Assisted


Non-orthogonal Multiple Access Networks
Zhongwu Xiang, Weiwei Yang, Gaofeng Pan, Yueming Cai, Yi Song, and Yulong Zou

Abstract—This paper investigates the secure transmission technique for realizing ubiquitous connectivity [3], has been
in hybrid automatic repeat request (HARQ)-assisted non- employed in many IoT applications [4], [5]. In addition, hy-
orthogonal multiple access (NOMA) networks, where a security- brid automatic repeat request (HARQ) protocol exploits time
required (SR) user is paired with an opportunity-served (OS)
user to perform NOMA. Different from the previous works diversity to improve the reliability of communication networks
where NOMA and HARQ are separately considered for secure with one-bit feedback. It is suitable for IoT networks which
transmissions, in this paper, both NOMA and HARQ are utilized generally consist of the devices with constrained hardware and
to enhance the security of the SR user. We derive the closed- signal processing capabilities, and limited feedback [6], [7].
form expressions for connection outage probability (COP), se- Power-domain NOMA has been proposed for 3GPP Long
crecy outage probability (SOP), reliable and secure transmission
probability (RSP) and effective secrecy throughput (EST) of Term Evolution (LTE) initiative [8], which explores the pow-
the SR user in both maximum ratio combining (MRC) and er domain to multiplex the non-orthogonal communication
selection combining (SC) schemes. The security-reliability trade- resources. Multiple users can share the same resource slot
off (SRT) results of the SR user in both MRC and SC schemes are by applying successive interference cancellation (SIC) [9].
also provided. Analysis and simulation results show that HARQ According to SIC, the signals with different power levels are
improves secrecy performance in MRC and SC schemes in terms
of RSP, especially in low transmit power region. Besides, since transmitted by superposition coding. The signal with stronger
every retransmission is utilized in the MRC scheme, it strictly power should be demodulated first, then re-modulate and sub-
outperforms the SC scheme in terms of the SRT metric. However, tract this signal from the superposition signals, and finally, the
the SC scheme has the potential to achieve higher EST than the signal with weaker power can be demodulated. The key to SIC
MRC scheme by optimizing the transmit power or the power is correctly demodulating the signal with stronger power. Once
allocation factor. Significantly, the quality of service (QoS) of the
OS user can be guaranteed by pairing an SR user who is far the strong signal cannot be demodulated correctly, the error
away from the transmitter and the secrecy performance of the propagation will exert a serious effect on the following de-
SR user can be enhanced by pairing an OS user. modulation [10], [11]. Fortunately, HARQ provides a solution
Index Terms—HARQ-assisted NOMA networks, physical layer for reliable transmission in a feedback-limited system. When
security, security-reliability trade-off, reliable and secure trans- the signal cannot be demodulated correctly, the retransmission
mission probability, effective secrecy throughput. is requested until the signal is demodulated correctly or
reaching the maximum retransmission round. Thus, combining
HARQ with NOMA, the error propagation caused by SIC
I. I NTRODUCTION
can be alleviated. It demonstrates that there exists an inher-
A. Backgrounds ent benefit when combining HARQ with NOMA. Recently,
NTERNET of Things (IoT) has attracted considerable HARQ-assisted NOMA schemes have attracted much attention
I research attention in recent years. It is expected that large
scale deployed IoT devices will be connected to networks,
[11]–[15]. A cooperative HARQ-assisted NOMA scheme is
proposed in [11] which provides an interference-aware optimal
which are far beyond the number of existing devices and will design to improve the system throughput. Reference [12]
impose a heavy burden on the limited radio resources [2]. Non- proposes a NOMA scheme with truncated HARQ, which
orthogonal multiple access (NOMA), identified as a promising demonstrates that the proposed system outperforms the tra-
ditional HARQ scheme. HARQ with incremental redundancy
This work was supported by the National Natural Science Foundation of (IR) is studied in [13] and [14], where [14] guarantees the
China (no. 61771487 and no. 61671474). (Corresponding author: Weiwei required outage probability in HARQ-assisted NOMA systems
Yang.) Part of the work was presented at the IEEE 2nd International Confer-
ence on Electronic Information and Communication Technology (ICEICT), by optimizing power allocation factors. Reference [15] derives
Harbin, China, January, 2019 [1]. the closed-form expressions for the outage probability in the
Zhongwu Xiang, Weiwei Yang and Yueming Cai are with the HARQ-assisted NOMA systems and demonstrates that in the
Army Engineering University of PLA, 210007, Nanjing, China (e-mail:
xzwnoon@live.com; wwyang1981@163.com; caiym@vip.sina.com). low transmit power region, the system performance can be
Gaofeng Pan is with the School of Information and Electronic- efficiently improved by using HARQ.
s, Beijing Institute of Technology, Beijing 100081, China. (e-mail: On the other hand, many devices in IoT networks are
Gaofeng.Pan.CN@ieee.org).
Yi Song is with the Army Engineering University of PLA, 210007, Nanjing, concerned with confidential messages, especially when they
China, and also with Huaiyin Normal University, 223001, Huaian, China (e- are related to military, commercial or political affairs [16].
mail: hysongyi@163.com). Due to the broadcast nature of radio propagation, wireless
Yulong Zou is with the School of Telecommunications and Information
Engineering, Nanjing University of Posts and Telecommunications, Nanjing, communication networks are vulnerable to eavesdropping [17].
China (e-mail: yulong.zou@njupt.edu.cn). Traditionally, secure transmission is achieved by cryptographic

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

algorithms, where the encryption and decryption will introduce better secrecy performance than OMA after proper power
significant computation overhead and extra system complexity. allocation and signal processing, multiple transmissions caused
However, physical layer security (PLS) technology exploits the by HARQ increase the risk of leaking confidential messages
characteristics of wireless channels to ensure the security of to Eve. How to utilize the multiple transmitted signals to
transmission, which can be implemented without consuming improve the secrecy performance is challenging work. Secure
massive communication resources [18]. Therefore, PLS has transmission design in HARQ-assisted NOMA networks is
been considered as a promising technology for secure trans- still an open issue. In addition, Eves are widely assumed to be
mission [19]–[22]. powerful enough to perform perfect SIC process or eliminate
any interference by multiuser detection technologies [24]–
B. Related Works [30]. It overestimates Eves’ capability, especially when Eve
is an untrusted user. Considering the SIC error at Eve is more
In NOMA networks, PLS has become a popular technique to
corresponding to real wiretap scenarios and more effective
guarantee information security [23]. In large scale networks,
strategies can be used to against eavesdropping. Furthermore,
reference [24] adopts user paring strategy in single antenna
in HARQ-assisted NOMA networks, selection combining (SC)
scenarios and artificial noise generating strategy in multiple-
is adopted in [11] and maximum ratio combining (MRC) is
antenna assisted scenarios to enhance the PLS performance.
adopted in [12] and [15] to exploit time diversity for reliable
In cooperative networks, both amplify-and-forward (AF) and
transmission. However, the transceiver design for secure trans-
decode-and-forward (DF) protocols are considered in [25],
mission in HARQ-assisted NOMA networks is waiting to be
which shows the same performance can be achieved in both
studied.
AF and DF systems. In full-duplex systems, reference [26]
derives the closed-form expressions for achievable ergodic In this paper, we provide an initial investigation on the
secrecy rates in both single and multiple eavesdroppers (Eve) secure transmission in HARQ-assisted NOMA networks where
wiretapping situations. Previous works have identified that a security-required (SR) user is paired with an opportunity-
NOMA outperforms traditional orthogonal multiple access served (OS) user to perform NOMA. To reduce the leakage
(OMA) schemes by proper resource allocation and signal of confidential messages, less power is allocated to the SR user
processing. Power allocation is investigated in [27] and [28] and SIC is adopted to eliminate the interference from the signal
to improve the secrecy performance and the results show the intended to the OS user. In addition, SIC error is considered
secrecy performance of the NOMA scheme is better than that both at Eve and SR user, which has not been given enough
in the OMA schemes. Reference [29] and [30] adopt secure attention by previous works. Furthermore, HARQ is adopted
beamforming to enhance the secrecy performance in NOMA at the SR user to ensure the SIC being performed successfully.
systems, which also prove that NOMA outperforms OMA For providing further insights into the performance of different
benchmark systems. retransmission strategies on secrecy performance, the related
In HARQ assisted networks, many efforts have been made MRC and SC schemes are considered at the receiver. Our
to improve the PLS performance [31]–[37]. HARQ with IR principal contributions are summarized as follows.
is adopted in [31], [32], where the length of the codeword is
• A novel secure transmission strategy is designed to im-
variable in the transmissions. Secure transmission is ensured
prove the secrecy performance in HARQ-assisted NOMA
in [31] by the introduction of dummy-message and, compared
networks where both Eve and SR user adopt SIC to ex-
with [32], the scheme in [31] achieves higher secrecy through-
tract its intended messages. Considering a more practical
put and lower delay. In [33] and [34], multi-bit feedback
communication scenario, SIC error may occur at both
is utilized by the transmitter to adjust the code rate. [34]
Eve and SR user when their channel conditions are poor.
demonstrates that 4-bit feedback achieves 90% of the secrecy
To reduce the impact of SIC error at SR user, HARQ is
capacity when the perfect channel state information (CSI)
adopted to guarantee the SIC process being implemented
is available. Secrecy performance of cooperative HARQ is
successfully. Furthermore, both SC and MRC schemes
investigated in [35] and [36], where [35] derives the closed-
are adopted at receivers for utilizing the retransmitted
form expressions for the connection outage probability (COP)
signals.
and secrecy outage probability (SOP) to reveal some insights
• We provide a comprehensive investigation of the secrecy
into system characteristics. Reference [37] designs an HARQ-
performance of the SR user by deriving the closed-form
assisted network coding scheme, where only when the receiver
expressions for SOP, reliable and secure transmission
obtains all of the code packets can it demodulate the original
probability (RSP), and effective secrecy throughput (EST)
message correctly. The retransmission is stopped when the
over Nakagami-m channels. Moreover, the closed-form
legitimate user receives all of the code packets, however,
expressions for COP of the SR user and OS user in
Eve may not, which shows that security can be enhanced if
the MRC and SC schemes are derived. The security-
combining HARQ with network coding.
reliability trade-off (SRT) [38], [39] results of the SR
user in the both MRC and SC schemes are also provided.
C. Motivations and Challenges The analysis results show that HARQ improves secrecy
Nevertheless, in HARQ-assisted NOMA networks, PLS performance in terms of RSP, especially in a low transmit
issue has not been concerned in published works. Although power region.
previous works have confirmed that NOMA can achieve • The results also show that the MRC schemes strictly

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

NACK/ACK 2
The normalized messages xm and xn , i.e., E[|xm | ] = 1
2
and E[|xn | ] = 1, are transmitted after superposition coding
where the signals with different power levels are overlapped.
xm is the signal for the user m with codeword rate Rm,t , and
xn is the signal for the user n. Based on well-known Wyner
secrecy code theorem [41], xn is coded as (Rn,t , Rs ) where
Rn,t is the codeword rate, and Rs is the secrecy rate. The jth
received signals at users can be expressed as
Transmitter Eve User n User m
(√ √ )
yij = hi,j P αm xm + P αn xn + ni,j , (1)

Fig. 1. HARQ-assisted NOMA network. where P is the total transmit power at the transmitter, ni,j is
the AWGN at user i and αi (i ∈ {m, n}) is the power alloca-
tion factor. For reducing information leakage, the confidential
outperform the SC schemes in terms of SRT metric, at signal of user n should be hidden below the signal of user m
the cost of consuming more communication resources. [42]. Consequently, more power should be allocated to user
However, the SC schemes have the potential to achieve m, i.e., αm > αn where αm + αn = 1.
higher EST than the MRC schemes by optimizing the The Eve keeps silent and wiretaps the messages from
transmit power or the power allocation factor. In addition, transmitter passively, where the jth received signal is denoted
the quality of service (QoS) of the OS user can be as
(√ √ )
guaranteed by pairing an SR user who is far away yej = he,j P αm xm + P αn xn + ne,j , (2)
from the transmitter and the secrecy performance of the
HARQ-assisted NOMA schemes are improved by pairing where ne,j is the AWGN at Eve.
an OS user when its transmit rate is properly determined. In order to extract the intended messages from the over-
The rest of the paper is organized as follows. The HARQ- lapped signals, SIC is employed at user n and Eve. According
assisted NOMA networks and secure transmission strategy are to the SIC principle, when demodulating the strong signal,
introduced in Section II. In Section III and Section IV, we the weak signal is viewed as interference. However, when
derive a set of closed-form expressions for the COP, SOP, demodulating the weak signal, the strong signal should be first
RSP and EST in MRC and SC schemes, respectively. In demodulated with the interference of weak signal, and then re-
Section V, simulations are conducted to verify the derived modulated and subtracted from the overlapped signals. When
closed-form expressions and provide some insights into system the channel is poor, SIC could be failed at user n. HARQ is
characteristics. Finally, Section VI concludes the paper. adopted for reducing the impact of SIC error at user n. When
user n cannot demodulate its message correctly, it sends back
II. N ETWORK M ODEL AND T RANSMISSION S TRATEGY a NACK to request retransmission for the same signal; other-
As shown in Fig. 1, we consider an HARQ-assisted NOMA wise, user n sends back an ACK. Transmitter stops the trans-
network with one-bit feedback, which consists of a transmitter mission when receiving an ACK or the number of transmission
T , an SR user n, an OS user m, and a passive eavesdropper e. rounds reaches L. Both legitimate users and eavesdropper
For intercepting more confidential messages, possible attacks can receive multiple transmitted signals. However, benefiting
may be carried out by eavesdropper [40], which will be left from HARQ, user n may receive its messages correctly while
for further research. The two legitimate users are assumed Eve may not, which will enhance security. If the multiple
to require different communication demands. Specifically, the transmitted signals are generated from the same codebook,
secure transmission of the SR user should be considered, MRC can be adopted at receivers. Inspired by a randomize-
however, the OS user only considers the QoS requirement. and-forward relaying strategy [43], every retransmitted signal
Users with different communication requirements widely exist can be generated by an independent codebook. In this scenario,
in IoT applications that serve multiple devices with distinct MRC cannot be applied at receivers, which can be replaced by
communication requirements [5]. The channels between trans- SC. According to the two different retransmission strategies,
mitter and users, and the channel between transmitter and two corresponding receiving strategies are designed as follows:
Eve in the jth transmission are denoted as hi,j and he,j , 1) Maximum Ratio Combining: If the multiple transmitted
respectively, where i ∈ {m, n} , j ∈ {1, 2, · · · , L} and L is signals are generated from the same codebook, MRC can be
the maximum transmission round. hi,j and he,j are assumed employed. According to the principle of MRC, the signals
to experience independent block Nakagami-m fading with from multiple transmissions are combined by combining co-
2 2
path loss E[|hi,j | ] = Ωi and E[|he,j | ] = Ωe , and fading efficients wj (j ∈ {1, 2, · · · l}) where l ≤ L is the number of
parameters Mi (i ∈ {m, n}) and Me , respectively. In addition, practical transmissions. The combined signal can be expressed
all the nodes in the network work under half-duplex mode with as
a single antenna, and the AWGN powers at all users and Eve ∑
l (√ √ ) ∑l
are assumed as σ 2 . The transmission strategy is detailed as yl,k = hk,j wj P αm xm + P αn xn + nk,j wj , (3)
follows. j=1 j=1

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

where k ∈ {m, n, e}. When network node k demodulates the transfer factor δ [10], [11]. When Eve eavesdrops the message
message of user m, the SINR can be written as of user n, the SINR can be written as
2
∑ ∑
l
l |he,j |
2
P αm wj hk,j P αn
j=1 O j=1
γl,k→m (w1 , · · · wl ) = 2 . (4) γl,e→n = . (9)
∑ ∑
l
2
l ∑l
2 δP αm |he,j | + σ2
P αn w h + σ2 |wj |
j=1 j k,j j=1
j=1

Obviously, δ = 0, when Eve correctly demodulates the


According to MRC principle, setting wj = hH
k,j and substitut- message of user m.
ing it into (4), we can obtain
2) Selection Combining: If the multiple transmitted signals

l
2 are generated from different codebooks, SC is adopted at
P αm |hk,j |
j=1 receivers. Comparing with MRC, SC is easier to be imple-
O
γl,k→m = . (5) mented, which selects the signal with the best quality from l

l
2
P αn |hk,j | + σ 2 transmissions to demodulate the intended message. When user
j=1 m demodulates its intended message, the SINR is given by
Observing (5), due to the interrelated interference among the { }
2
signals, the expression of SINR in NOMA scheme after MRC P αm max |hm,j |
j={1,··· ,l}
is much different from that in the traditional OMA scheme. S
γl,m→m = { } . (10)
2
It is also different from the NOMA scheme in [15] where the P αn max |hm,j | + σ 2
j={1,··· ,l}
interference among the signals is assumed to be independent.
The similar results can be seen in [27] equation (4) where the When user n demodulates the message of user m, the SINR
maximal ratio transmission (MRT) scheme is adopted. can be written as
After MRC, user m detects its intended message by treating { }
2
the signal intended to user n as interference, and the SINR can P αm max |hn,j |
be expressed as j={1,··· ,l}
S
γl,n→m = { } . (11)
2

l P αn max |hn,j | + σ 2
2
P αm |hm,j | j={1,··· ,l}

O j=1
γl,m→m = . (6) After user n eliminating the interference from user m, the

l
2
P αn |hm,j | + σ 2 SNR of user n is expressed as
j=1
{ }
2
According to the SIC principle, user n should demodulate P αn max |hn,j |
S j={1,··· ,l}
the message xm before demodulating its intended message, γl,n→n = . (12)
σ2
and the SINR of xm at user n can be expressed as
Similar to MRC scheme, considering the worst situation, when

l
2
P αm |hn,j | user n cannot demodulate the message of user m, user n also
O
γl,n→m =
j=1
. (7) cannot obtain its message correctly.

l
2 Eve also adopts SC to receive the multiple transmitted
P αn |hn,j | + σ 2
j=1 signals. Similar to MRC scheme, the SIC error is considered
at the Eve. Thus, when Eve intercepts the message of user n,
When the user n demodulates the message of the user m cor- the SINR can be obtained as
rectly, the interference from xm can be eliminated completely { }
by SIC. Thus, the signal-to-noise ratio (SNR) of message xn P αn max |he,j |
2

is expressed as j={1,··· ,l}


S
γl,e→n = { } . (13)
2

l δP αm max |he,j | + σ 2
2
P αn |hn,j | j={1,··· ,l}

O j=1
γl,n→n = . (8)
σ2
III. P ERFORMANCE A NALYSIS OF MRC S CHEME
Otherwise, the residual signal of user m will impose a se-
vere impact on demodulating the message intended to user In this section, we adopt MRC scheme to process the multi-
n, considering the worst situation, which directly leads to ple transmitted signals. The CSI used for MRC can be obtained
communication failure. from the pilot transmitted by transmitter. Although MRC
The Eve also adopts MRC and SIC to intercept the confiden- increases extra signaling overhead, every transmitted signal
tial messages intended to user n. In addition, a more practical are utilized for detecting, which is beneficial for improving
SIC scenario is considered, where the SIC error occurs when system performance. We derive the closed-form expressions
the message of user m cannot be demodulated correctly. for COP, SOP, RSP and EST in the MRC scheme for offering
Therefore, the signal of user m transfers into interference using further insights into system performance.

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

A. COP for User n and User m where T O (l) denotes the probability of the number of trans-
1) COP for SR User n: When user n cannot demodulate mission rounds l.
its message correctly, a NACK is sent back to request re- Before deriving the closed-form expression of T O (l), we
transmission until user n demodulates its signal correctly or first give the expression of P O (l) which denotes the probabil-
the number of transmission rounds reaches L. Consequently, ity of user n just correctly demodulating its intended message
connection outage event occurs when n cannot demodulate its after l transmissions. When l > 1, P O (l) is expressed as
signal correctly after L transmission rounds. The COP of user [ O ]
P O (l) = Pr γl,n→m O
> θm,t , γl,n→n > θn,t
n can be expressed as [ O ]
[ O ] − Pr γl−1,n→m > θm,t , γl−1,n→n
O
> θn,t . (20)
O
Pn,co = 1 − Pr γL,n→m O
> θm,t , γL,n→n > θn,t , (14)
According to (18), similar to the derivation of (15), (20) can
where θm,t = 2 − 1 and θn,t = 2
Rm,t
− 1. After some Rn,t be derived as
manipulations, the closed-form expression for COP of user n M∑n l−1 ( )j
O Mn max {φm , φn } 1 − Mn max{φ m ,φn }
can be written as P (l) = e Ωn .
Ωn j!
M∑n L−1 ( )j j=Mn (l−1)
O Mn max {φm , φn } 1 − Mn max{φ m ,φn }
(21)
Pn,co = 1− e Ωn ,
j=0
Ωn j!
When l = 1, P O (l) is given by
{ (15)
[ O ]
σ 2 θm,t
P αm −P αn θm,t , α m − α n θm,t > 0 P O (l) = Pr γl,n→m O
> θm,t , γl,n→n > θn,t
where φm = and
∞, else M∑n −1 ( )j
σ2 θ
Mn max {φm , φn } 1 − Mn max{φ m ,φn }

φn = P αn,t . = e Ωn . (22)
n
j=0
Ω n j!
Proof: Substituting (7) and (8) into (14), we can obtain
 Observing (22) and (21), we can find that (22) is included in
∑L
σ 2 θm,t (21). Thus the closed-form expression of P O (l) is given by
= 1 − Pr 
2
O
Pn,co |hn,j | (αm − αn θm,t ) > ,
P (21).
j=1
 When l < L, if user n obtains its message correctly after
∑L
2 σ 2 θn,t  l transmissions, the number of transmission round is l. Thus,
|hn,j | > . (16) T O (l) = P O (l). When L = 1, T O (1) = 1, obviously. If
P αn
j=1
after L − 1 transmissions, user n still cannot demodulate its
Obviously, when αm−αnθm,t < 0, the first item in the right side message correctly, the number of transmission rounds goes to
O L, the probability of which is derived as
{ which leads to Pn,co = 1. For conve-
of (16) cannot be satisfied,
[ O ]
σ 2 θm,t
P αm −P αn θm,t , αm −αn θm,t > 0 T O (L) = 1 − Pr γL−1,n→m O
> θm,t , γL−1,n→n > θn,t
nient, we define φm =
∞, else Mn (L−1)−1 ( )j
∑ Mn max {φm , φn } 1 − Mn max{φ m ,φn }
σ 2 θn,t = e Ωn .
and φn = P αn .
Thus, (16) can be rewritten as Ωn j!
  j=0

∑L (23)
= 1 − Pr  |hn,j | > max {φm , φn } ,
O 2
Pn,co (17)
Above all, T O (l) is obtained in (24) at the top of next page.
j=1
Utilizing (18) and (24), (19) can be derived as

l
m l−1 ( )j
where the cumulative distribution function (CDF) of |hi,j |
2 ∑L M∑
Mm φm 1 − Mm φm
O
j=1 Pm,co = 1− T O (l) e Ωm . (25)
can be expressed as j=0
Ωm j!
l=1

i l−1 (
M∑ )j Observing (15) and (25), increasing maximum transmission
Mi x 1 − MΩi x
O
Fi,l (x) = 1 − e i . (18) rounds L decreases the COP of both user n and user m, which
Ωi j!
j=0 shows that HARQ is beneficial to reliable communication.
Substituting (18) into (17), (15) is obtained. For avoiding
O
Pn,co = 1, Rm,t should satisfy 2Rm,t − 1 < ααm
n
. B. SOP for SR User n
2) COP for OS User m: Due to the variation of chan- The confidential messages of security-required user n
nel condition between the transmitter and user n, in every should keep secret from the Eve. When intercepting the
communications, the number of signal transmission rounds is message of user n, Eve should eliminate the interference from
also variable. When user n demodulates its message correctly xm by SIC first. When Eve cannot demodulate xm correctly,
or the number of transmissions reaches L, transmitter stops xm will be transferred into interference by transfer factor δ,
transmission. COP of user m can be written as which can be expressed as

L
[ O ] {
O
Pm,co = T O (l) Pr γl,m→m < θm,t , (19)
O
0, γl,e→m ≥ θm,t
δ= O , (26)
l=1 δ0 , γl,e→m < θm,t

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security



 1, L=1

 M∑ ( )j


n l−1
Mn max{φm ,φn } 1 −
Mn max{φm ,φn }

j! e , l<L
Ωn
Ωn
T O (l) = j=Mn (l−1) (24)

 ( )j

 ∑
Mn (L−1)−1
Mn max{φm ,φn } M max{φm ,φn }
− n

 Ωn
1
j! e
Ωn , l = L.
j=0

 (( )+
M∑
e l−1 )j ( )j
Me φm 1 Me φe (δ = 0) 1
S O (l) =1 +  
M φe (δ=0)
− MeΩφ m − e Ω
e e − e e

j=0
Ωe j! Ωe j!
e l−1 (
M∑ )j
Me min {φe (δ = δ0 ) , φm } 1 − Me min{φeΩ(δ=δ0 ),φm }
− e e , (29)
j=0
Ωe j!


l
P αm |he,j |2 HARQ has adverse effect on COP and SOP. Thus, the per-
, and δ0 (δ0 ∈ [0, 1]) is
O j=1
where γl,e→m = ∑
l formance of HARQ is hard to be evaluated by COP and SOP
P αn |he,j |2 +σ 2
j=1 separately. We adopt RSP to investigate system performance in
assumed to be a constant for simplicity [10], [11]. It is worthy the view of both Eve and user n, which denotes the probability
to note that when δ0 = 0, Eve is assumed to be powerful of reliable and secure transmission. RSP of user n is given by
enough to eliminate any interference [24] and when δ0 = 1,

L
Eve cannot eliminate any interference when xm is detected O
Prs = P O (l)S O (l) , (30)
with error [44]. The SOP of user n can be written as l=1


L where P O (l) is given in (21) and S O (l) is expressed in (29).
O
Pso =1− T O (l) S O (l), (27) Observing (30), both P O (l) and S O (l) are positive, increasing
l=1 maximum transmission round L improves reliable and secure
O
where S (l) denotes the probability that Eve cannot intercept transmission probability. It demonstrates that HARQ is ben-
any information after l transmissions in the MRC scheme. eficial to secrecy communication from the view of both Eve
According to total probability formula, S O (l) is given by and user n.
[ O ]
S O (l) = Pr γl,e→m ≥ θm,t , γl,e→n
O
< θs |δ = 0 D. EST for User n
[ O ]
+ Pr γl,e→m O
< θm,t , γl,e→n < θs |δ = δ0 , (28) Communication reliability can be improved by retransmis-
sion. However, transmission efficiency may decrease when
where θs = 2Rn,t −Rs − 1. Utilizing (18), similar to the the same message is transmitted by multiple rounds. EST
derivation of (15),{(28) is derived in (29) at the top of this page, is adopted to evaluate the efficiency of secure transmission,
σ 2 θs
P αn −δP αm θs , αn − δαm θm,t > 0 and
according to renewal-reward theorem [45], which is expressed
where φe (δ) =
∞, else as
+
[x] = max {0, x}. ∑L
Rs P O (l) S O (l)
According to (27), increasing maximum transmission round l=1
ηO = , (31)
L increases SOP, since Eve obtains more information from ∑L
multiple transmissions. Thus, retransmission decreases secrecy lT O (l)
l=1
performance.
Remark 1: COP evaluates the reliability performance and where P O (l), S O (l) and T O (l) are given by (21), (29) and

L
SOP evaluates the secrecy performance. (15) and (27) demon- (24), respectively. lT O (l) represents the average number
strate that the impact of maximum transmission round L and l=1
of transmission rounds.
transmit power P on reliability performance is contrary to
Remark 2: RSP and EST evaluate the security and efficien-
secrecy performance. In other words, a tradeoff exists between
cy, respectively, from the perspective of both legitimate user
reliability and security. In different communication scenarios,
and Eve. (30) shows that HARQ improves the reliability and
the requirements of reliability or security are different. It is
secrecy performance, which is owed to the feedback between
worth noting that the proposed scheme can meet the different O
the SR user and transmitter. In addition, when P = 0, Prs =0
communication requirements by choosing a proper L or P .
and η = 0 and when P → ∞, Prs → 0 and η → 0,
O O O

which shows that increasing the transmit power P cannot


C. RSP for User n always improve RSP or EST. It demonstrates that the transmit
COP and SOP evaluate the system performance from the power should be reasonably designed for achieving better
view of legitimate users and Eve, respectively. In addition, performance.

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

IV. P ERFORMANCE A NALYSIS OF SC S CHEME According to (35), (37) can be derived as


M∑ n −1 ( )j
In this section, we adopt SC scheme to combine the multiple S Mn max {φm , φn } 1 − Mn max{φ m ,φn }

transmitted signals, where only the signal with the best quality P (l) = e Ωn

j=0
Ω n j!
is employed to detect the intended message. It is worth to  l−1
mention that, in this scheme, the perfect CSI is not necessary, M∑n −1( )j
M max {φ , φ } 1 Mn max{φm ,φn }
×1− −  ,
n m n
which reduces the signaling overhead. COP, SOP, RSP and e Ωn

EST are adopted as performance metrics to evaluate the system j=0


Ωn j!
performance in the SC scheme. (38)
when l = 1, P S (l) is given by
A. COP for User n and User m [ S ]
P S (l) = Pr γl,n→m S
> θm,t , γl,n→n > θn,t
Similar to the MRC scheme, in the SC scheme, the trans- M∑ n −1 ( )j
Mn max {φm , φn } 1 − Mn max{φ m ,φn }
mitter keeps transmitting until user n receives its signal = e Ωn . (39)
correctly or the transmission round reaches L. Thus, after L j=0
Ωn j!
transmissions, n still cannot demodulate its intended signal Observing (39) and (38), we can note that (39) is included in
correctly, resulting in connection outage. The COP of user n (38). Thus, the expression of P S (l) can be given by (38). In
in the SC scheme is given by addition, from (22) and (39), we can find P S (1) = P O (1)
[ S ] obviously because single transmission achieves the same per-
S
Pn,co = 1 − Pr γL,n→m S
> θm,t , γL,n→n > θn,t . (32)
formance in MRC and SC schemes.
After some mathematical manipulations, (32) can be derived When l < L, after l transmissions, user n can demodulate
as its signal correctly, the number of transmission round is l.
 L Thus, T S (l) = P S (l). When L = 1, T S (1) = 1, obviously.

Mn−1( )j If after L − 1 transmissions, user n still cannot demodulate its
M max {φ , φ } 1 Mn max{φm ,φn }
Pn,co=1− − .
S n m n
e Ωn
message correctly, the number of transmission round goes to
Ωn j!
j=0 L, the probability of which is derived as
(33) [ S ]
T S (L) = 1 − Pr γL−1,n→m S
> θm,t , γL−1,n→n > θn,t
Proof: Substituting (11) and (12) into (32), (32) can be  L−1
M∑n −1 ( )j
rewritten as M max {φ , φ } 1 Mn max{φm ,φn }
=1− e−  .
n m n Ωn
[ { } ] Ω n j!
2 j=0
S
Pn,co = Pr max |hn,j | < max {φm , φn } , (34)
j={1,··· ,L} (40)
{ } Above all, T S (l) is expressed in (41) at the top of next page.
2
where the CDF of max |hi,j | is given by
j={1,··· ,l} Utilizing (35) and (41), (36) can be derived as
 l ∑
L

M i −1 ( )j S
Pm,co = T S (l)
Mi x 1 M x
− Ωi
S
Fi,l (x) = 1 − e i . (35) l=1
Ωi j!  l
n −1 ( )j
j=0
M∑
Mn max {φm , φn } 1 − Mn max{φ m ,φn }
Substituting (35) into (34), (33) is obtained. × 1− e Ωn .
j=0
Ωn j!
[
When the number ]
of transmission rounds is l, the COP of
S
user m is Pr γl,m→m < θm,t . For the maximum transmis- (42)
sion round L, the COP of user m in SC scheme can be written Observing (33) and (42), increasing maximum transmission
as rounds L decreases the COP of both user n and user m in the
SC scheme, because time diversity can be utilized by HARQ

L
[ S ]
S
Pm,co = T S (l) Pr γl,m→m < θm,t , (36) scheme to improve receiving performance, which shows the
l=1
similar property to MRC scheme.

where T S (l) denotes the probability of the number of the B. SOP for User n
transmissions l in SC scheme.
Before decoding the confidential messages of user n, Eve
Similar to the MRC scheme, we first derive the expression
should eliminate the interference from m by SIC first. How-
of P S (l) which denotes the probability of user n just demod-
ever, when Eve cannot demodulate the message of user m
ulating its message correctly in lth transmission. When l > 1,
correctly, the signal of user m is transferred into interference
P S (l) is expressed as
by transfer factor δ, which can be expressed as
[ S ] {
P S (l) = Pr γl,n→m S
> θm,t , γl,n→n > θn,t S
0, γl,e→m ≥ θm,t
[ S ] δ= , (43)
− Pr γl−1,n→m S
> θm,t , γl−1,n→n > θn,t . (37) S
δ0 , γl,e→m < θm,t

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security


 1, L=1

 ( )l−1
M∑
 (
n−1 )j ∑n −1 ( )j

 Mn max{φm ,φ n } 1 −
M n max{φ ,φ
m n } M
Mn max{φm ,φ n } 1 −
Mn max{φm ,φn }

j! e 1− j! e , l<L
Ωn Ωn
Ωn Ωn
T S (l) = j=0 j=0 (41)

 ( )L−1

 n −1 (
M∑ )j

 1− Mn max{φm ,φn } 1
M max{φm ,φn }
− n
 Ωn j! e
Ωn , l = L.
j=0

 l  l +

M e −1 ( )j ∑
M e −1 ( )j
 Me φe (δ = 0) 1 − e Ωe Me φm 1 − eΩ m  
S S (l) =1 −  − 1 −
M φ (δ=0) M φ
e e e e 
j=0
Ω e j! j=0
Ω e j!
 l

Me −1 ( )j
Me min {φe (δ = δ0 ) , φm } 1 M min{φe (δ=δ0 ),φm }
+ 1 − e − e Ωe . (46)
j=0
Ωe j!

P αm max
j={1,··· ,l}
{|he,j |2 } D. EST for User n
S
where γl,e→m = and δ0 is assumed
P αn {|he,j |2 }+σ2
max
j={1,··· ,l} To evaluate the efficiency of secure transmission, EST is
to be a constant [10], [11]. The SOP of user n is given by adopted as performance metric in the SC scheme, which is

L expressed as
S
Pso =1− T S (l) S S (l), (44)

L
l=1 Rs P S (l) S S (l)
l=1
where S S (l) denotes the probability that Eve cannot intercept ηS = , (48)
any information after l transmission rounds. Similar to MRC ∑
L
lT S (l)
scheme, S S (l) is written as l=1
[ S ]
S S (l) =Pr γl,e→m ≥ θm,t , γl,e→n
S
< θs |δ = 0 where P (l), S (l) and T S (l) are expressed in (38), (46)
S S
[ S ] ∑
L
+ Pr γl,e→m S
< θm,t , γl,e→n < θs |δ = δ0 . (45) and (41), respectively. lT S (l) denotes the average number
l=1
Utilizing (35), (45) is derived as (46) at the top of this page. of transmission rounds in the SC scheme.
Similar to the MRC scheme, observing from (44), retrans- Remark 4: Observing (47), HARQ improves the reliability
mission increases the SOP in the SC scheme, due to time and secrecy performance in the SC scheme, which is similar
diversity is utilized by Eve to wiretap. It shows that HARQ is to the MRC scheme. In addition, increasing transmit power P
harmful to secure transmission from the perspective of Eve. cannot always improve RSP or EST. It demonstrates that the
Remark 3: (33) and (44) demonstrate that maximum trans- transmit power should be reasonably designed for achieving
mission round L and transmit power P also have an adverse better performance.
impact on reliability performance and secrecy performance in Remark 5: When L = 1, any retransmission is not al-
the SC scheme. Similar to the MRC scheme, a tradeoff also lowed. The HARQ-assisted NOMA system is degraded to the
exists between reliability and security in the SC scheme. The traditional NOMA system. In addition, when Rm = 0, the
different requirements of reliability or security can be satisfied interference from user m can always be eliminated. Thus,
in the proposed scheme by choosing a proper L or P . user m can obtain its intended message without SIC, i.e.,
the system is degraded to a traditional HARQ-assisted OMA
C. RSP for User n system. The two degraded systems can be viewed as two
In this subsection, RSP is adopted to investigate system benchmarks for measuring the proposed system’s performance.
performance in the view of both Eve and user n, which denotes It also demonstrates that the proposed HARQ-assisted NOMA
the probability of reliability and secure transmission. RSP of system represents a generalized system and the comparison
user n in the SC scheme is given by results are presented in Section V.

L
S
Prs = P S (l) S S (l), (47) V. N UMERICAL R ESULTS
l=1 In this section, we present numerical results to give better
where P S (l) is given by (38) and S S (l) is expressed in (46). insights into system performance. The path loss is expressed
Observing from (47), increasing maximum transmission round as Ωk = d1a where k ∈ {m, n, e} and a is path loss
k
L improves reliable and secure transmission probability. It exponent. Unless otherwise stated, the simulation parameters
demonstrates that HARQ is beneficial to secrecy communi- are presented in Table I, where BPCU is the abbreviation of
cation from the view of both Eve and user n. bit per channel use.

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

10 0 10 0
Simulation.
User m by MRC
User n by MRC
10 -1
10 -1

10 -2
COP

-2

SOP
10 L=1
10 -3
L=3

dn =500m,400m,300m
10 -3 L=4
10 -4

Simulation
SC scheme
-5 MRC scheme
10
10 -4

0 2 4 6 8 10 12 14 16 18 20 10 -4 10 -3 10 -2 10 -1 10 0
P (dBm) COP

Fig. 2. The COP of user m and n in MRC scheme versus P with dm = Fig. 4. SOP versus COP of user n in both SC and MRC schemes with
400m and dn = 500m, 400m, 300m. L = 1, 3, 4, and P ∈ [0, 20dBm].

10 0 10 0
Simulation
User m by SC
User n by SC

10 -1

L=1
COP

10 -2
RSP L=3

dn =500m,400m,300m L=4

-1
10 L=5
10 -3

Simulation
SC scheme
MRC scheme

10 -4
0 5 10 15 20 -2 0 2 4 6 8 10 12 14
P (dBm) P (dBm)

Fig. 3. The COP of user m and n in SC scheme versus P with dm = 400m Fig. 5. The RSP of user n versus P with L = 1, 3, 4, 5 in both MRC and
and dn = 500m, 400m, 300m. SC scheme.

Fig. 2 and Fig. 3 plot the COP of users m and n versus user n. Increasing P will reduce the number of transmissions,
transmit power P with dn = 500m, 400m, 300m in the which leads to an increase of the COP at user m. In addition,
MRC and SC schemes respectively. Both Fig. 2 and Fig. 3 in both Fig. 2 and Fig. 3, when dn grows from 300m to
show that the COP of user n keeps decreasing, and when 500m, the COP of user n increases. However, the COP of
user n is near to the transmitter, the COP of user m also user m decreases. It demonstrates that the QoS of user m can
keeps decreasing while increasing P . However, when user be guaranteed when user n is far away from transmitter.
n is far away from the transmitter, e.g., dn = 500m, the Fig. 4 plots SOP versus COP of user n in both SC and MRC
COP of user m first decreases and then increases and finally schemes with L = 1, 3, 4, and P ∈ [0, 20dBm]. Firstly, we can
decreases while increasing P . When dn is large, multiple observe that secrecy performance improves with the increasing
transmissions are needed to promise correct demodulation at of COP. This implies a trade-off existing between security
and reliability of user n. In addition, the SRT performance
improves significantly in both SC and MRC schemes when
TABLE I
TABLE OF PARAMETERS maximum transmission round increases from L = 1 to L = 4.
Especially, the HARQ-assisted NOMA system, i.e., L > 1,
Parameter value strictly outperforms the traditional NOMA system, i.e. L = 1,
The distance between nodes dn = 300m, de = 800m
Nakagami-m fading parameters Mm = 2, Mn = 2, Me = 2
in terms of SRT. Furthermore, Fig. 4 shows that in the HARQ-
Rn,t = 1.0BPCU, assisted NOMA system, the MRC scheme outperforms the
Codeword rates
Rm,t = 1.0BPCU SC scheme. This is because the MRC scheme makes full use
Expected secrecy rate Rs = 0.5BPCU of every transmission. However, the MRC scheme consumes
Path loss exponent a = 2.7
Power allocation exponent αn = 0.2, αm = 0.8 more communication resources when compared with the SC
Interference transfer exponent δ0 = 0.05 scheme.
Noise power −68dBm Fig. 5 plots the RSP of user n versus P with L = 1, 3, 4, 5

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

10

0.4 0.5
Simulation
0.35 0.45 MRC scheme
SC scheme
0.4
0.3
0.35
L=1
0.25
0.3
L=2
EST

EST
0.2
0.25
L=3 OMA δ0 = 1, 0.2, 0
0.15 0.2
L=4
0.15
0.1

Simulation
0.1
0.05
MRC scheme
MC scheme 0.05
0
0
0 5 10 15 1 1.5 2 2.5
P (dBm) Rm,t (BPCU)

Fig. 6. The EST of user n versus P with L = 1, 2, 3, 4 in both MRC and Fig. 7. The EST of user n versus Rm,t with P = 12dBm, L = 4 and
SC scheme. δ0 = 0, 0.2, 1 in both MRC and SC scheme.

0.4
in both MRC and SC schemes. From Fig. 5, we can find Simulation
that in MRC and SC schemes, the RSP increases firstly 0.35 SC scheme
MRC scheme
and then decreases due to the increase of P , which shows
0.3
that the reliable and secure transmission performance can be
improved by choosing a proper transmit power. A specific 0.25 L=1

observation is that RSP also can be improved by increasing EST 0.2 L=2

the maximum transmission round. Besides, the HARQ-assisted L=3


0.15
NOMA system, i.e., L > 1, outperforms the traditional
L=4
NOMA system, i.e., L = 1, showing the advantage of 0.1

exploiting HARQ against eavesdropping. Especially, in the


0.05
high transmit power region, both MRC and SC schemes are
degraded to a traditional NOMA system where they have a 0
-20 -18 -16 -14 -12 -10 -8 -6 -4 -2 0
similar performance. αn /αm (dB)

Fig. 6 plots the EST of user n versus P with L = 1, 2, 3, 4


in both MRC and SC schemes to show the efficiency of Fig. 8. The EST of user n versus αn /αm with P = 10dBm and L =
1, 2, 3, 4 in both MRC and SC scheme.
HARQ-assisted NOMA systems. Notably, in the low trans-
mit power region, the EST in the SC scheme keeps nearly
unchanged when increasing maximum transmission round L.
It can be explained that the performance improvement brought This is because a larger Rm,t may increase the difficulty of
by retransmissions is neutralized by retransmission delay. demodulation at Eve when SIC error is considered. It shows
However, the EST in the MRC scheme increases remarkably the proposed HARQ-assisted NOMA system can outperform
by increasing maximum transmission round L due to every traditional HARQ-assisted OMA system by choosing Rm,t
retransmission signal being utilized by MRC efficiently. It properly. It also demonstrates that pairing an opportunity-
shows that MRC is more suitable for improving the efficiency served user to perform NOMA not only can increase network
of secure transmission in the low transmit power region. connectivity, but also has the potential to enhance security. As
Nevertheless, the maximum EST in the SC scheme is higher Rm,t increases beyond a critical value, EST drops dramatically
than that in the MRC scheme, which shows that the SC scheme until to zero, due to high Rm,t putting a heavy burden on the
can achieve better performance by choosing a proper transmit SIC at user n. For achieving a better secrecy performance,
power. It demonstrates that better performance can be achieved Rm,t should be determined reasonably.
by consuming fewer communication resources when SC is Fig. 8 plots the EST of user n versus αn /αm with P =
adopted. 10dBm and L = 1, 2, 3, 4 in both MRC and SC schemes.
Fig. 7 plots the EST of user n versus Rm,t with P = Firstly, from Fig. 8, as the power allocated to user n increas-
12dBm and δ0 = 0, 0.2, 1 in both MRC and SC schemes. es, the EST in both MRC and SC schemes first increases
It is worthy to note that when δ0 = 0, the detection ability and then decreases, which demonstrates an optimal αn /αm
assumption of Eve is degraded to that in [24] and when existing for achieving the best performance. In addition, when
δ0 = 1, the assumption is degraded to that in [44]. In addition, allocating less power to user n, i.e., αn /αm is small, the
when Rm,t = 0, HARQ-assisted NOMA system is degraded MRC scheme shows better performance than the SC scheme
to a traditional HARQ-assisted OMA system. From Fig. 7, due to every retransmission signals being utilized efficiently in
we can find that the EST of both MRC and SC schemes the MRC scheme. However, the SC scheme has the potential
first increases due to the increase of Rm,t when δ0 ̸= 0. to outperform the MRC scheme by optimizing αn /αm . It

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

11

also demonstrates that the lightweight SC scheme can achieve [10] X. Yan, J. Ge, Y. Zhang, and L. Gou, “NOMA-Based Multiple-Antenna
better performance. and Multiple-Relay Networks Over Nakagami-m Fading Channels with
Imperfect CSI and SIC Error,” IET Commun., vol. 12, no. 17, pp. 2087–
2098, Sep. 2018.
[11] Z. Shi, S. Ma, H. ElSawy, G. Yang, and M. Alouini, “Cooperative
VI. C ONCLUSIONS HARQ-Assisted NOMA Scheme in Large-Scale D2D Networks,” IEEE
Trans. Commun., vol. 66, no. 9, pp. 4286–4302, Sep. 2018.
In this paper, we have explored the PLS of HARQ-assisted
[12] Z. Yu, C. Zhai, and J. Liu, “Non-Orthogonal Multiple Access Relaying
NOMA networks, where HARQ is utilized to ensure the SIC with Truncated ARQ,” IET Commun., vol. 11, no. 4, pp. 514–521, Oct.
process at the SR user being implemented successfully. Both 2017.
MRC and SC schemes are considered, where the MRC scheme [13] J. Choi, “On Multiple Access Using H-ARQ with SIC Techniques for
Wireless Ad Hoc Networks,” Wirel. Pers. Commun., vol. 69, no. 1, pp.
is designed to make full use of retransmission signals and the 187–212, Mar. 2013.
SC scheme chooses the best signal among the transmissions [14] ——, “On HARQ-IR for Downlink NOMA Systems,” IEEE Trans.
for demodulation. In addition, a more practical wiretapping Commun., vol. 64, no. 8, pp. 3576–3584, Aug. 2016.
[15] D. Cai, Z. Ding, P. Fan, and Z. Yang, “On the Performance of NOMA
scenario is considered, where when SIC cannot be imple- With Hybrid ARQ,” IEEE Trans. Veh. Technol., vol. 67, no. 10, pp.
mented successfully at Eve, the signal of the OS user will 10 033–10 038, Oct. 2018.
be regarded as interference when demodulating the signal of [16] A. Burg, A. Chattopadhyay, and K. Y. Lam, “Wireless Communication
the SR user. The closed-form expressions for the COP of the and Security Issues for Cyber-Physical Systems and the Internet-of-
Things,” Proc. IEEE, vol. 106, no. 1, pp. 38–60, Jan. 2018.
SR and OS users in both MRC and SC schemes are derived, [17] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A Survey on Wireless
which show that the QoS of OS user can be ensured by Security: Technical Challenges, Recent Advances, and Future Trends,”
pairing an SR user who is far away from the transmitter. We Proc. IEEE, vol. 104, no. 9, pp. 1727–1765, Sep. 2016.
[18] Y. Liu, H.-H. Chen, and L. Wang, “Physical Layer Security for Nex-
also derive the closed-form expressions for the SOP, RSP, and t Generation Wireless Networks: Theories, Technologies, and Chal-
EST of SR user in both MRC and SC schemes. The results lenges,” IEEE Commun. Surv. Tutorials, vol. 19, no. 1, pp. 347–376,
show that RSP and RST performances improve significantly Firstquarter 2017.
when applying HARQ in the low transmit power region. [19] W. Yang, L. Tao, X. Sun, R. Ma, Y. Cai, and T. Zhang, “Secure
On-Off Transmission in mmWave Systems With Randomly Distributed
It demonstrates that HARQ has the capability to improve Eavesdroppers,” IEEE Access, vol. 7, pp. 32 681–32 692, Mar. 2019.
secrecy performance from the perspective of both Eve and [20] X. Xu, W. Yang, Y. Cai, and S. Jin, “On the Secure Spectral-Energy
legitimate user. Simulations show that the HARQ-assisted Efficiency Tradeoff in Random Cognitive Radio Networks,” IEEE J.
Sel. Areas Commun., vol. 34, no. 10, pp. 2706–2722, Oct. 2016.
NOMA network outperforms the traditional HARQ-assisted [21] X. Sun, W. Yang, Y. Cai, L. Tao, Y. Liu, and Y. Huang, “Secure
OMA network by deploying the code rate of the OS user Transmissions in Wireless Information and Power Transfer Millimeter-
properly. Furthermore, in the low transmit power region, the Wave Ultra-Dense Networks,” IEEE Trans. Inf. Forensics Secur., vol. 14,
no. 7, pp. 1817–1829, Jul. 2019.
MRC scheme achieves better performance than the SC scheme [22] Z. Xiang, W. Yang, G. Pan, Y. Cai, and X. Sun, “Secure Transmission in
in terms of EST. However, the SC scheme has the potential Non-Orthogonal Multiple Access Networks With an Untrusted Relay,”
to outperform the MRC scheme by optimizing the transmit IEEE Wirel. Commun. Lett., vol. 8, no. 3, pp. 905–908, Jun. 2019.
power or power allocation factor. [23] K. Xiao, L. Gong, and M. Kadoch, “Opportunistic Multicast NOMA
with Security Concerns in a 5G Massive MIMO System,” IEEE Com-
mun. Mag., vol. 56, no. 3, pp. 91–95, Mar. 2018.
[24] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the
R EFERENCES Physical Layer Security of Non-Orthogonal Multiple Access in Large-
Scale Networks,” IEEE Trans. Wirel. Commun., vol. 16, no. 3, pp. 1656–
[1] Z. Xiang, W. Yang, Y. Cai, Y. Song, and M. Wang, “Physical Layer Se-
1672, Oct. 2017.
curity in HARQ-Assisted Non-Orthogonal Multiple Access Networks,”
in 2019 IEEE 2nd Int. Conf. Electron. Inf. Commun. Technol. Harbin: [25] J. Chen, L. Yang, and M. S. Alouini, “Physical Layer Security for
IEEE, Jan. 2019, pp. 127–132. Cooperative NOMA Systems,” IEEE Trans. Veh. Technol., vol. 67, no. 5,
[2] A. Mukherjee, “Physical-Layer Security in the Internet of Things: Sens- pp. 4645–4649, May 2018.
ing and Communication Confidentiality Under Resource Constraints,” [26] B. Zheng, M. Wen, C.-X. X. Wang, X. Wang, F. Chen, J. Tang, and
Proc. IEEE, vol. 103, no. 10, pp. 1747–1761, Oct. 2015. F. Ji, “Secure NOMA Based Two-Way Relay Networks Using Artificial
[3] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. K. Noise and Full Duplex,” IEEE J. Sel. Areas Commun., vol. 36, no. 7,
Bhargava, “A Survey on Non-Orthogonal Multiple Access for 5G pp. 1426–1440, Jul. 2018.
Networks: Research Challenges and Future Trends,” IEEE J. Sel. Areas [27] Z. Ding, Z. Zhao, M. Peng, and H. V. Poor, “On the Spectral Efficien-
Commun., vol. 35, no. 10, pp. 2181–2195, Oct. 2017. cy and Security Enhancements of NOMA Assisted Multicast-Unicast
[4] M. Shirvanimoghaddam, M. Condoluci, M. Dohler, and S. J. Johnson, Streaming,” IEEE Trans. Commun., vol. 65, no. 7, pp. 3151–3163, Jul.
“On the Fundamental Limits of Random Non-Orthogonal Multiple 2017.
Access in Cellular Massive IoT,” IEEE J. Sel. Areas Commun., vol. 35, [28] B. He, A. Liu, N. Yang, and V. K. N. Lau, “On the Design of
no. 10, pp. 2238–2252, Oct. 2017. Secure Non-Orthogonal Multiple Access Systems,” IEEE J. Sel. Areas
[5] M. Shirvanimoghaddam, M. Dohler, and S. J. Johnson, “Massive Non- Commun., vol. 35, no. 10, pp. 2196–2206, Oct. 2017.
Orthogonal Multiple Access for Cellular IoT: Potentials and Limitation- [29] L. Lv, Z. Ding, Q. Ni, and J. Chen, “Secure MISO-NOMA Transmission
s,” IEEE Commun. Mag., vol. 55, no. 9, pp. 55–61, Sep. 2017. With Artificial Noise,” IEEE Trans. Veh. Technol., vol. 67, no. 7, pp.
[6] Y. Gu, H. Chen, Y. Zhou, Y. Li, and B. Vucetic, “Timely Status Update 6700–6705, Jul. 2018.
in Internet of Things Monitoring Systems: An Age-Energy Tradeoff,” [30] F. Zhou, Z. Chu, H. Sun, R. Q. Hu, and L. Hanzo, “Artificial Noise
IEEE Internet Things J., vol. 6, no. 3, pp. 5324–5335, Jun. 2019. Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA
[7] M. S. Mohammadi, I. B. Collings, and Q. Zhang, “Simple Hybrid ARQ Using SWIPT,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 918–
Schemes Based on Systematic Polar Codes for IoT Applications,” IEEE 931, Apr. 2018.
Commun. Lett., vol. 21, no. 5, pp. 975–978, May 2017. [31] M. L. Treust, L. Szczecinski, and F. Labeau, “Rate Adaptation for Secure
[8] “Study on Downlink Multiuser Superposition Transmission for LTE,” HARQ Protocols,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 12,
3rd Gener. Partnersh. Proj., Mar. 2015. pp. 2981–2994, Dec. 2018.
[9] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C. L. I, and H. V. [32] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “On the Throughput of
Poor, “Application of Non-Orthogonal Multiple Access in LTE and 5G Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels,”
Networks,” IEEE Commun. Mag., vol. 55, no. 2, pp. 185–191, Feb. 2017. IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1575–1591, Apr. 2009.

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2955792, IEEE
Transactions on Information Forensics and Security

12

[33] Z. Mheich, M. L. Treust, F. Alberge, and P. Duhamel, “Rate Adaptation Gaofeng Pan (M’12) received the B.Sc. degree in
for Incremental Redundancy Secure HARQ,” IEEE Trans. Commun., communication engineering from Zhengzhou Uni-
vol. 64, no. 2, pp. 765–777, Feb. 2016. versity, Zhengzhou, China, in 2005 and the Ph.D.
[34] Z. Rezki, A. Khisti, and M. S. Alouini, “Ergodic Secret Message degree in communication and information systems
Capacity of the Wiretap Channel with Finite-Rate Feedback,” IEEE from Southwest Jiaotong University, Chengdu, Chi-
Trans. Wirel. Commun., vol. 13, no. 6, pp. 3364–3379, Jun. 2014. na, in 2011.
[35] X. Guan, Y. Cai, and W. Yang, “On the Reliability-Security Tradeoff He was with Ohio State University, Columbus,
and Secrecy Throughput in Cooperative ARQ,” IEEE Commun. Lett., OH, USA, from 2009 to 2011 as a joint-trained
vol. 18, no. 3, pp. 479–482, Mar. 2014. Ph.D. student under the supervision of Prof. E. Ekici.
[36] D. Wang, P. Ren, Q. Du, Y. Wang, and L. Sun, “Secure Cooperative From 2012 to 2019, he was with Southwest Univer-
Transmission Against Jamming-Aided Eavesdropper for ARQ Based sity, Chongqing, China, and he was also with the
Wireless Networks,” IEEE Access, vol. 5, pp. 3763–3776, Apr. 2017. School of Computing and Communications, Lancaster University, Lancaster,
[37] H. He and P. Ren, “Secure ARQ Protocol for Wireless Communications: U.K., from 2016 to 2018, where he was a Post-Doctoral Fellow under
Performance Analysis and Packet Coding Design,” IEEE Trans. Veh. the supervision of Prof. Z. Ding. His research interests span special topics
Technol., vol. 67, no. 8, pp. 7158–7169, Aug. 2018. in communications theory, signal processing and protocol design, including
[38] Y. Zou, B. Champagne, W.-P. P. Zhu, and L. Hanzo, “Relay-Selection visible light communications, secure communications, CR/cooperative com-
Improves the Security-Reliability Trade-Off in Cognitive Radio System- munications, UAV communications, and MAC protocols. From Aug. 2019,
s,” IEEE Trans. Commun., vol. 63, no. 1, pp. 215–228, Jan. 2015. he has been a visiting researcher with The Communication Theory Lab, King
[39] Y. Zou, X. Wang, W. Shen, and L. Hanzo, “Security Versus Reliability Abdullah University of Science and Technology (KAUST), Thuwal, Saudi
Analysis of Opportunistic Relaying,” IEEE Trans. Veh. Technol., vol. 63, Arabia. He was a recipient of the Exemplary Reviewer Award 2017 given by
no. 6, pp. 2653–2661, Jul. 2014. the IEEE Transactions on Communications.
[40] D. Xu, P. Ren, and J. A. Ritcey, “Independence-Checking Coding for
OFDM Channel Training Authentication: Protocol Design, Security,
Stability, and Tradeoff Analysis,” IEEE Trans. Inf. Forensics Secur.,
vol. 14, no. 2, pp. 387–402, Feb. 2019.
[41] A. D. Wyner, “The Wire-tap Channel,” Bell Syst. Tech. J., vol. 54, no. 8,
pp. 1355–1387, Oct. 1975. Yueming Cai received the B.S. degree in physics
[42] Z. Xiang, W. Yang, G. Pan, Y. Cai, and Y. Song, “Physical Layer from Xiamen University, Xiamen, China, in 1982,
Security in Cognitive Radio Inspired NOMA Network,” IEEE J. Sel. and the M.S. degree in microelectronics engineering
Top. Signal Process., vol. 13, no. 3, pp. 700–714, Jun. 2019. and the Ph.D. degree in communications and infor-
[43] J. Yao, X. Zhou, Y. Liu, and S. Feng, “Secure Transmission in Linear mation systems from Southeast University, Nanjing,
Multihop Relaying Networks,” IEEE Trans. Wirel. Commun., vol. 17, China, in 1988 and 1996, respectively. His current
no. 2, pp. 822–834, Jan. 2018. research interests include MIMO systems, OFD-
[44] Y. Feng, S. Yan, and Z. Yang, “Secure Transmission to the Strong User in M systems, signal processing in communications,
Non-Orthogonal Multiple Access,” IEEE Commun. Lett., vol. 22, no. 12, cooperative communications, and wireless sensor
pp. 2623–2626, Dec. 2018. networks.
[45] G. Caire and D. Tuninetti, “The Throughput of Hybrid-ARQ Protocols
for the Gaussian Collision Channel,” IEEE Trans. Inf. Theory, vol. 47,
no. 5, pp. 1971–1988, Jul. 2001.

Yi Song received the M.S. degree from the Nan-


jing University Of Aeronautics And Astronautics
in 2011, and he is currently pursuing the Ph.D.
degree with the Institution of Communications En-
Zhongwu Xiang received the B.S. degree from gineering in Army Engineering University of PLA.
South China Normal University, in 2014, and M.S. His research interests include millimeter-wave, non-
degree from the PLA University of Science and orthogonal multiple access, physical-layer security
Technology in 2017, and he is currently pursuing the and cognitive radio.
Ph.D. degree with the Institution of Communication-
s Engineering in Army Engineering University of
PLA. His research interests include non-orthogonal
multiple access, physical-layer security and cogni-
tive radio.

Yulong Zou (SM’13) is a Full Professor and Doctor-


al Supervisor at the Nanjing University of Posts and
Telecommunications (NUPT), Nanjing, China. He
received the B.Eng. degree in information engineer-
ing from NUPT, Nanjing, China, in July 2006, the
Weiwei Yang received the B.S., M.S., and Ph.D. first Ph.D. degree in electrical engineering from the
degrees from the College of Communications En- Stevens Institute of Technology, New Jersey, USA,
gineering, PLA University of Science and Tech- in May 2012, and the second Ph.D. degree in signal
nology, Nanjing, China, in 2003, 2006, and 2011, and information processing from NUPT, Nanjing,
respectively. His research interests include orthogo- China, in July 2012.
nal frequency domain multiplexing systems, signal Dr. Zou was awarded the 9th IEEE Commu-
processing in communications, millimeter-wave, co- nications Society Asia-Pacific Best Young Researcher in 2014. He has
operative communications, wireless sensor networks, served as an editor for the IEEE Communications Surveys & Tutorials,
and network security. IEEE Communications Letters, EURASIP Journal on Advances in Signal
Processing, IET Communications, and China Communications. In addition,
he has acted as TPC members for various IEEE sponsored conferences, e.g.,
IEEE ICC/GLOBECOM/WCNC/VTC/ICCC, etc.

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

You might also like