Cooperative nonorthogonal multiple access (CNOMA); covert communication; modify and forward (MF); physical-layer security (PLS); simultaneous wireless information and power transfer (SWIPT); Cooperative non-orthogonal multiple access; Covert communications; Information and power transfers; Modify and forward; Multiple access; Multiple access systems; Non-orthogonal; Physical layer security; Simultaneous wireless information and power transfer; Signal Processing; Information Systems; Hardware and Architecture; Computer Science Applications; Computer Networks and Communications; Security; Relays; Jamming; NOMA; Wireless communication; Internet of Things; Communication systems; Optimization; IP networks
Abstract :
[en] With the rapid advancement of physical-layer security technology, the covert and secure communication has become crucial in safeguarding wireless communication systems. In this article, we propose a joint covert and secure transmission scheme for simultaneous wireless information and power transfer (SWIPT) assisted cooperative nonorthogonal multiple access (CNOMA) systems. In the CNOMA system, a greedy relay transmits the confidential information to the far user (Carol), with the assistance of the near user (Bob). Meanwhile, as a SWIPT node, Bob is self-sustained by harvesting energy from relay. What is more, a warden (Alice) and noncolluding eavesdroppers (Eves) always attempt to detect and capture the confidential information, respectively. To counteract the attacks from Alice and Eves, a jamming-assisted scheme is employed. For the proposed system model, we derive closed-form expressions for the detection error probability (DEP) and the average minimum detection error probability (AMDEP) of Alice. Additionally, closed-form expressions for the outage probability (OP) of users and the intercept probability (IP) of Eves are obtained. Furthermore, to maximize the effective covert rate (ECR) of Carol, an optimization problem is formulated, subject to covertness and security constraints. Numerical results are provided to demonstrate the impact of the system parameters on covert and secure performance, with the results showing perfect agreement with the theoretical analysis.
Disciplines :
Electrical & electronics engineering
Author, co-author :
Huang, Gaojian ; Henan Polytechnic University, School of Physics and Electronic Information Engineering, School of Surveying and Land Information Engineering, Photoelectric Detection and Sensing Integrated Engineering Technology Research Center of Henan Province, Jiaozuo, China ; City University of Macau, Faculty of Data Science, Macao
Lei, Yuxin ; Henan Polytechnic University, School of Physics and Electronic Information Engineering, Jiaozuo, China
Li, Xingwang ; Southeast University, National Mobile Communications Research Laboratory, Nanjing, China ; University of Luxembourg, Interdisciplinary Center for Security, Reliability and Trust, Luxembourg City, Luxembourg
KHAN, Wali Ullah ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
Wang, Gongpu ; Queen Mary University of London, School of Electronic Engineering and Computer Science, London, United Kingdom
Nallanathan, Arumugam ; Kyung Hee University, Department of Electronic Engineering, Yongin, South Korea
External co-authors :
yes
Language :
English
Title :
Joint Covert and Secure Communication for SWIPT-Assisted CNOMA Systems
Publication date :
2025
Journal title :
IEEE Internet of Things Journal
eISSN :
2327-4662
Publisher :
Institute of Electrical and Electronics Engineers Inc.
China Postdoctoral Science Foundation Key Scientific Research Projects of Higher Education Institutions in Henan Province Henan Scientific and Technological Research Project under Grant Henan Polytechnic University Fundamental Scientific Research Operating Expense Youth Exploration and Innovation Fund Project Surveying and Mapping Science and Technology Double First-Class Discipline Establishment Project for Nurturing High Level Research Topics Fundamental Research Program of Shanxi Province Open Research Fund of National Mobile Communications Research Laboratory
Funding text :
Received 8 January 2025; accepted 14 February 2025. Date of publication 19 February 2025; date of current version 9 June 2025. This work was supported in part by the China Postdoctoral Science Foundation under Grant 2024M750801; in part by the Key Scientific Research Projects of Higher Education Institutions in Henan Province under Grant 24A510004 and Grant 25A510003; in part by the Henan Scientific and Technological Research Project under Grant 242102210193 and Grant 252102211118; in part by the Henan Polytechnic University Fundamental Scientific Research Operating Expense Youth Exploration and Innovation Fund Project under Grant NSFRF230421; in part by the Surveying and Mapping Science and Technology Double First-Class Discipline Establishment Project for Nurturing High Level Research Topics under Grant GCCYJ202408; in part by the Fundamental Research Program of Shanxi Province under Grant 202303021211340; and in part by the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University under Grant 2024D15. (Corresponding author: Xingwang Li.) Gaojian Huang is with the School of Physics and Electronic Information Engineering, the School of Surveying and Land Information Engineering, and the Photoelectric Detection and Sensing Integrated Engineering Technology Research Center of Henan Province, Henan Polytechnic University, Jiaozuo 454003, China, and also with the Faculty of Data Science, City University of Macau, Macau, China (e-mail: g.huang@hpu.edu.cn).
R. Kaur, B. Bansal, S. Majhi, S. Jain, C. Huang, and C. Yuen, “A survey on reconfigurable intelligent surface for physical layer security of next-generation wireless communications,” IEEE Open J. Veh. Technol., vol. 5, pp. 172–199, 2024.
A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, “Transmit antenna selection for security enhancement in MIMO wiretap channels,” IEEE Trans. Commun., vol. 61, no. 1, pp. 144–154, Jan. 2013.
T. Lv, H. Gao, and S. Yang, “Secrecy transmit beamforming for heterogeneous networks,” IEEE J. Sel. Areas Commun., vol. 33, no. 6, pp. 1154–1170, Jun. 2015.
N. Zhao, Y. Cao, F. R. Yu, Y. Chen, M. Jin, and V. C. M. Leung, “Artificial noise assisted secure interference networks with wireless power transfer,” IEEE Trans. Veh. Technol., vol. 67, no. 2, pp. 1087–1098, Feb. 2018.
L. Wang, Y. Cai, Y. Zou, W. Yang, and L. Hanzo, “Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6259–6274, Aug. 2016.
X. Hu, P. Mu, B. Wang, and Z. Li, “On the secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers,” IEEE Trans. Veh. Technol., vol. 66, no. 5, pp. 4457–4462, May 2017.
Y. Zheng et al., “Overlay cognitive ABCom-NOMA-based ITS: An in-depth secrecy analysis,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 2, pp. 2217–2228, Feb. 2023.
X. Li et al., “Cognitive AmBC-NOMA IoV-MTS networks with IQI: Reliability and security analysis,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 2, pp. 2596–2607, Feb. 2023.
M. Asif, X. Bao, A. Ihsan, W. U. Khan, M. Ahmed, and X. Li, “Securing NOMA 6G communications leveraging intelligent OMNI-surfaces under residual hardware impairments,” IEEE Internet Things J., vol. 11, no. 14, pp. 25326–25336, Jul. 2024.
X. Li, Y. Zheng, M. Zeng, Y. Liu, and O. A. Dobre, “Enhancing secrecy performance for STAR-RIS NOMA networks,” IEEE Trans. Veh. Technol., vol. 72, no. 2, pp. 2684–2688, Feb. 2023.
X. Li et al., “Reliability and security of CR-STAR-RIS-NOMA-assisted IoT networks,” IEEE Internet Things J., vol. 11, no. 17, pp. 27969–27980, Sep. 2024.
T. M. Hoang, L. T. Dung, B. C. Nguyen, X. N. Tran, and T. Kim, “Secrecy outage performance of FD-NOMA relay system with multiple non-colluding eavesdroppers,” IEEE Trans. Veh. Technol., vol. 70, no. 12, pp. 12985–12997, Dec. 2021.
B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013.
X. Lu, S. Yan, W. Yang, M. Li, and D. W. K. Ng, “Covert communication with time uncertainty in time-critical wireless networks,” IEEE Trans. Wireless Commun., vol. 22, no. 2, pp. 1116–1129, Feb. 2023.
Y. Zhang et al., “Covert communication in downlink NOMA systems with channel uncertainty,” IEEE Sensors J., vol. 22, no. 19, pp. 19101–19112, Oct. 2022.
R. He, G. Li, H. Wang, Y. Jiao, and J. Cai, “Adaptive power control for cooperative covert communication with partial channel state information,” IEEE Wireless Commun. Lett., vol. 11, no. 7, pp. 1428–1432, Jul. 2022.
Z. Duan, X. Yang, Y. Gong, D. Wang, and L. Wang, “Covert communication in uplink NOMA systems under channel distribution information uncertainty,” IEEE Commun. Lett., vol. 27, no. 5, pp. 1282–1286, May 2023.
L. Lv, Z. Li, H. Ding, N. Al-Dhahir, and J. Chen, “Achieving covert wireless communication with a multi-antenna relay,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 760–773, 2022.
W. He et al., “Optimal transmission probabilities of information and artificial noise in covert communications,” IEEE Commun. Lett., vol. 26, no. 12, pp. 2865–2869, Dec. 2022.
Y. Wen et al., “Covert communications aided by cooperative jamming in overlay cognitive radio networks,” IEEE Trans. Mobile Comput., vol. 23, no. 12, pp. 12878–12891, Dec. 2024.
X. Li et al., “Covert communication of STAR-RIS aided NOMA networks,” IEEE Trans. Veh. Technol., vol. 73, no. 6, pp. 9055–9060, Jun. 2024.
S. Feng, X. Lu, D. Niyato, Y. Wu, S. X. Shen, and W. Wang, “System-level security solution for hybrid D2D communication in heterogeneous D2D-underlaid cellular network,” IEEE Trans. Wireless Commun., vol. 23, no. 10, pp. 15054–15069, Oct. 2024.
Y. Zhang, R. D. Candia, H. Yig̈itler, R. Jäntti, and Z. Yan, “Covert backscatter communication in the presence of multi-antenna eavesdropper,” IEEE Commun. Lett., vol. 28, no. 8, pp. 1770–1774, Aug. 2024.
M. Forouzesh, P. Azmi, and A. Kuhestani, “Secure transmission with covert requirement in untrusted relaying networks,” in Proc. 9th Int. Symp. Telecommun. (IST), 2018, pp. 670–675.
M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, “Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens,” IEEE Trans. Commun., vol. 68, no. 6, pp. 3737–3749, Jun. 2020.
R. Sun, B. Yang, Y. Shen, X. Jiang, and T. Taleb, “Covertness and secrecy study in untrusted relay-assisted D2D networks,” IEEE Internet Things J., vol. 10, no. 1, pp. 17–30, Jan. 2023.
M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, “Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden,” IEEE Internet Things J., vol. 8, no. 9, pp. 7170–7181, May 2021.
C. Wang, Z. Li, H. Zhang, D. W. K. Ng, and N. Al-Dhahir, “Achieving covertness and security in broadcast channels with finite blocklength,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 7624–7640, Sep. 2022.
M. Forouzesh, F. S. Khodadad, P. Azmi, A. Kuhestani, and H. Ahmadi, “Simultaneous secure and covert transmissions against two attacks under practical assumptions,” IEEE Internet Things J., vol. 10, no. 12, pp. 10160–10171, Jun. 2023.
Y. Yang, S. Shen, Y. She, W. Wang, B. Yang, and Y. Gao, “Joint covert and secure communications for intelligent reflecting surface (IRS)-aided wireless networks,” in Proc. Int. Conf. Netw. Netw. Appl. (NaNA), 2023, pp. 138–142.
L. Yang et al., “Covert transmission and secrecy analysis of RS-RIS-NOMA-aided 6G wireless communication systems,” IEEE Trans. Veh. Technol., vol. 72, no. 8, pp. 10659–10670, Aug. 2023.
P. Chen et al., “Covert transmission and physical-layer security of active RIS-RS-NOMA-aided communication systems,” IEEE Internet Things J., vol. 11, no. 19, pp. 31507–31520, Oct. 2024.
H. Xiao et al., “STAR-RIS enhanced joint physical layer security and covert communications for multi-antenna mmWave systems,” IEEE Trans. Wireless Commun., vol. 23, no. 8, pp. 8805–8819, Aug. 2024.
L. R. Varshney, “Transporting information and energy simultaneously,” in Proc. Int. Symp. Inf. Theory, 2008, pp. 1612–1616.
O. Maraqa, A. S. Rajasekaran, S. Al-Ahmadi, H. Yanikomeroglu, and S. M. Sait, “A survey of rate-optimal power domain NOMA with enabling technologies of future wireless networks,” IEEE Commun. Surveys Tuts., vol. 22, no. 4, pp. 2192–2235, 4th Quart., 2020.
Y. Liu, W. Yi, Z. Ding, X. Liu, O. A. Dobre, and N. Al-Dhahir, “Developing NOMA to next generation multiple access: Future vision and research opportunities,” IEEE Wireless Commun., vol. 29, no. 6, pp. 120–127, Dec. 2022.
S. Timotheou and I. Krikidis, “Fairness for non-orthogonal multiple access in 5G systems,” IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1647–1651, Oct. 2015.
M. Ghous, A. K. Hassan, Z. H. Abbas, G. Abbas, A. Hussien, and T. Baker, “Cooperative power-domain NOMA systems: An overview,” Sensors, vol. 22, no. 24, p. 9652, Dec. 2022.
O. Alamu, T. O. Olwal, and K. Djouani, “Cooperative NOMA networks with simultaneous wireless information and power transfer: An overview and outlook,” Alexandria Eng. J., vol. 71, pp. 413–438, May 2023.
A. A. Amin and S. Y. Shin, “Investigate the dominating factor of hybrid SWIPT protocol by performance analysis of the far user of hybrid SWIPT based CNOMA downlink transmission,” in Proc. Int. Conf. Electr. Comput. Commun. Eng. (ECCE), 2019, pp. 1–6.
X. Yin, W. Wu, H. Dai, P. Li, and B. Wang, “Energy-efficient transceiver design for full-duplex cooperative NOMA systems with SWIPT,” in Proc. 10th Int. Conf. Wireless Commun. Signal Process. (WCSP), 2018, pp. 1–6.
Z. Zhang, H. Qu, J. Zhao, W. Wang, and S. Wang, “Fairness based power allocation optimization of cooperative NOMA with SWIPT network,” in Proc. IEEE 4th Int. Conf. Signal Image Process. (ICSIP), 2019, pp. 555–560.
Y. Ye, Y. Li, D. Wang, and G. Lu, “Power splitting protocol design for the cooperative NOMA with SWIPT,” in Proc. IEEE Int. Conf. Commun. (ICC), 2017, pp. 1–5.
R. Lei and D. Xu, “On the outage performance of JT-CoMP-CNOMA networks with SWIPT,” IEEE Commun. Lett., vol. 25, no. 2, pp. 432–436, Feb. 2021.
A. S. Parihar, P. Swami, and V. Bhatia, “On performance of SWIPT enabled PPP distributed cooperative NOMA networks using stochastic geometry,” IEEE Trans. Veh. Technol., vol. 71, no. 5, pp. 5639–5644, Feb. 2022.
T.-T. Nguyen, S. Q. Nguyen, P. X. Nguyen, and Y.-H. Kim, “Evaluation of full-duplex SWIPT cooperative NOMA-based IoT relay networks over Nakagami-m fading channels,” Sensors, vol. 22, no. 5, p. 1974, 2022.
A. Baranwal, S. Sharma, S. D. Roy, and S. Kundu, “On performance of a full duplex SWIPT enabled cooperative NOMA network,” Wireless Netw., vol. 30, no. 3, pp. 1643–1656, Apr. 2024.
D. P. P. R. Baduge, T. D. P. Perera, and D. N. K. Jayakody, “Flight to efficiency: Trajectory optimization in SWIPT-enabled UAV-assisted NOMA for future wireless networks,” in Proc. IEEE 100th Veh. Technol. Conf. (VTC-Fall), Washington, DC, USA, 2024, pp. 1–7.
X. Sun, W. Yang, and Y. Cai, “Secure communication in NOMA-assisted millimeter-wave SWIPT UAV networks,” IEEE Internet Things J., vol. 7, no. 3, pp. 1884–1897, Mar. 2020.
K. Shim, T.-V. Nguyen, and B. An, “Exploiting opportunistic scheduling schemes to improve physical-layer security in MU-MISO NOMA systems,” IEEE Access, vol. 7, pp. 180867–180886, 2019.
R. Chen, J. Yang, H. Zhou, R. Lu, and D. Zeng, “Covert communication in two-hop cooperative cognitive radio system,” IEEE Trans. Veh. Technol., vol. 72, no. 12, pp. 16567–16581, Dec. 2023.
Y. Zeng and R. Zhang, “Full-duplex wireless-powered relay with self-energy recycling,” IEEE Wireless Commun. Lett., vol. 4, no. 2, pp. 201–204, Apr. 2015.
H. Liu, K. J. Kim, K. S. Kwak, and H. V. Poor, “Power splitting-based SWIPT with decode-and-forward full-duplex relaying,” IEEE Trans. Wireless Commun., vol. 15, no. 11, pp. 7561–7577, Nov. 2016.
K. Agrawal, M. F. Flanagan, and S. Prakriya, “NOMA with battery-assisted energy harvesting full-duplex relay,” IEEE Trans. Veh. Technol., vol. 69, no. 11, pp. 13952–13957, Nov. 2020.
S.-I. Chu, “Secrecy analysis of modify-and-forward relaying with relay selection,” IEEE Trans. Veh. Technol., vol. 68, no. 2, pp. 1796–1809, Feb. 2019.