Next Article in Journal
IMPEC: An Integrated System for Monitoring and Processing Electricity Consumption in Buildings
Previous Article in Journal
A Highly Linear CMOS Image Sensor Design Based on an Adaptive Nonlinear Ramp Generator and Fully Differential Pipeline Sampling Quantization with a Double Auto-Zeroing Technique
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming

Department of Information & Communication Engineering, Kongju National University, 1223-24 Cheonan-dae-ro, Cheonan 31080, Korea
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(4), 1047; https://doi.org/10.3390/s20041047
Submission received: 1 January 2020 / Revised: 4 February 2020 / Accepted: 10 February 2020 / Published: 14 February 2020
(This article belongs to the Section Sensor Networks)

Abstract

:
This paper studies the secure communication of a non-orthogonal multiple-access (NOMA) relaying system in the presence of an eavesdropper in which the NOMA communication between a source and two users is assisted by an energy-harvesting (EH) relay. The relay extracts a part of its received signal strength using a power-splitting (PS) policy then harvests energy using a non-linear EH (NLEH) circuit. A friendly jammer sends jamming signals to help secure communication. The jammer is exploited as an additional energy source. A store-and-transmit (SaT) scheme which allows the EH relay to perform energy storing and information transmitting is proposed. For performance evaluation, the closed-form expressions for three metrics, secrecy outage probability (SOP), average achievable secrecy rate (AASR) and average stored energy (ASE) are derived. These results enable studies on the effects of various system parameters, such as NOMA power-allocation factors, target secrecy rates, jammer’s location, and relay’s power levels, on the system performance.

1. Introduction

The rapidly growing demand for radio connectivity in both industrial and residential use has caused various issues in wireless networks: faster battery drain at the device, various access required at the base station, and higher security risk. This motivated studies on relevant efficient techniques. Wireless energy harvesting (WEH), which enables devices charging by scavenging energy from ambient radio signals, physical layer security (PLS), which provides secure communication by exploiting the physical nature of wireless channels, and non-orthogonal multiple access (NOMA), which supports high spectral efficiency, low latency, and massive access by modulating signal on the power domain, are expected as strong candidates to help the future wireless systems overcome these issues.
Based on the fact that radio signal can carry both the energy and information, the author of [1] designed two WEH receiver architectures to allow a simultaneous wireless information and power transfer (SWIPT), time-switching (TS) and power-splitting (PS) where the energy harvesting (EH) and information decoding (ID) functions are separated in time domain and power domain, respectively. The trade-off between harvested energy and information rate of diverse SWIPT systems using TS and PS policies was characterized in [1,2,3]. The works of [4,5] examined different techniques to improve the performance of SWIPT systems via enhancing the amount of harvested energy, such as multi-antenna energy harvester, multi-band energy harvester, and interference-aided WEH. In addition, the work of [6] proposed to exploit both downlink and uplink transmissions of a multi-user TMDA-based system to boost the harvested energy at users. The presence of WEH receivers can be regarded as a potential security threat to wireless communication; hence, security in SWIPT has gained much interest from recent studies. The works of [7,8] used a beamforming technique to increase the secrecy capacity and/or harvested energy of multi-antenna SWIPT systems by optimizing the beamforming vectors. On the other studies, friendly jamming signals were employed to improve secure communication via an EH relay in which the jammer can interfere with wire-tapped information and provide additional energy at the relay [9]. Another approach presented in [10,11] is to use WEH nodes as jammers that employ their harvested energy to assist the secure links.
In the NOMA scenario, the work of [12] designed strategies for a wireless-powered uplink NOMA to maximize the system throughput or achieve the high fairness in throughput of users. A similar work concerning the energy-and-rate efficiency was presented in [13]. The authors of [14] exploited the advantage in distance of the near user (NU) to perform a SWIPT-based cooperative communication; hence, NU can set up an additional link to the far user (FU) using its harvested energy. The work of [15] designed a strategy to maximize the harvested energy of each harvester in a cognitive radio (CR) NOMA system, especially, the non-linear energy harvesting (NLEH) model was considered. The works of [16,17] investigated the NOMA communications for the WEH machine-to-machine networks and focused on minimizing the total energy consumption at the devices and gateways via joint power control and time allocation. To guarantee security in multi-user networks, the studies on secure communication of SWIPT-based NOMA systems are needed. The work of [18] investigated the secure transmission of a WEH relaying networks via analyzing the secrecy outage probability (SOP) and secrecy throughput in a delay-limited mode. The works of [19] considered a downlink NOMA system containing several EH receivers that can wiretap confidential information. To maximize the sum secrecy rate of this system, a strategy for optimizing NOMA power-allocation factors was proposed. The authors of [20] studied secrecy energy efficient in a CR-NOMA system with NLEH. This work focused on developing strategies to find the optimal transmit powers of WEH secondary transmitters for given conditions of energy channels.
It is seen that most studies on PLS in SWIPT-based NOMA systems were performed under the assumption of a linear energy harvesting (LEH) model. In addition, the NLEH model proposed in [21] is not mathematically tractable [22]; hence, simpler alternative NLEH models are employed to obtain analytical results for system performance. Motivated by the above assessments, this paper studies the secure communication of a SWIPT-based cooperative NOMA system with NLEH and friendly jamming, and derives analytical results that facilitate performance evaluation and system design. In this system, a source communicates with two users via a NLEH relay that harvests energy form the source signal and jamming signal. The use of friendly jammer can reduce the security risk from a passive eavesdropper. The contributions of this paper are described as follows.
  • We propose a store-and-transmit (SaT) scheme providing multi-transmit-power levels (MTPLs) at the EH relay. This simplifies the design of EH transceivers, reduces the energy wasted due to ineffective connectivity, and enables the relay to store a part of energy to maintain its important activities (for the harvest-to-transmit (HtT) scheme, the EH relay uses all the harvested energy to transmit information and maintains its important activities with its limited battery reserves). Moreover, the SaT scheme allows the calculations in performance to become analytically tractable. By using accordant MTPLs, the obtained analytical results for the SaT scheme can allow evaluations in the system performance of the HtT scheme.
  • Three performance metrics, SOP, average achievable secrecy rate (AASR) and average stored energy (ASE), are studied for performance evaluation. We derive closed-form expressions for the SOP (for the whole communication and for the case that the relay is active) and the AASR of each user; in addition, we derive an exact analytical expression for the ASE. We use Montes-Carlo simulations to verify the accuracy of the analytical results.
  • Finally, the effect of various key system parameters, the location of jammer, target secrecy rates, NOMA power-allocation factors, transmit-power strategies (TPSs) at the EH relay, on the system performance, is studied to provide insight into the system design.
The rest of this paper is organized as follows. The system model and preliminary results are presented in Section 2. In Section 3, analytical expressions for the SOP, AASR and ASE are derived. Simulation results and discussions are presented in Section 4. Finally, the conclusion is presented in Section 5. Appendix AAppendix D present the proofs of the propositions.
Notation: We use A B to denote the link from node A to node B; ⊗ is the XOR operator; CN ( 0 , N 0 ) is a complex Gaussian distribution with zero mean and variance N 0 ; E i ( · ) is the exponential integral function [23] (Eq. (8.211.1)); p F q ( ; ; ) is the generalized hypergeometric function [23] (Eq. (9.14.1)); E { X } is the expectation of a random variable (RV) X; E { X | Y } is the conditional expectation of X given an event Y; and [ X ] + = max { X , 0 } .

2. System Model and Preliminary Results

2.1. System Model

We consider an EH relaying NOMA system, as shown in Figure 1a, including a source S, a destination D, a decode-and-forward (DF) NLEH relay R, a friendly jammer J, an eavesdropper E and two users, i.e., a NU U 1 and a FU U 2 . Due to the presence of E, which tries to overhear the user’s confidential information, J is employed to send jamming signals to interfere with E and these signals can be exploited as an additional energy source for R. All nodes are single–antenna devices. We assume that (i) U 1 , U 2 and E are close to the cell edge; hence, there are no direct links from S to U 1 , U 2 and E, and the users and E decode the source’s information via relay’s forwarded signal; (ii) the channels undergo independently and non-identically distributed (i.n.i.d.) Rayleigh fading; (iii) the channels are constants during a block time T; (iv) local channel state information (CSI) is available at each node; and (v) the jamming signal is only revealed to legitimate nodes.
Assumption (v) is explained as the follows. Each legitimate node U { R , U 1 , U 2 } and J establish a shared secret key, i.e., K ( U J ) , using CSI-based key generation method [24]. Then J broadcasts two combined keys K ( R J ) K ( U 1 J ) and K ( R J ) K ( U 2 J ) . Using their own key, all legitimate nodes can discover all secret keys while E cannot do that due to lack of global CSI; hence, only legitimate nodes can eliminate the jamming signal on their received signals. Let τ setup denote the duration for the setup phase consuming for channel estimation and secret key generation. The remain of block time T is separated into two equal time slots, τ 0 = ( T τ setup ) / 2 , (illustrated in Figure 1b) and the communication during each time slot is described in Section 2.3 and Section 2.4.

2.2. Non-Liner Energy Harvesting Model and Store-and-Transmit Protocol

Figure 2a–c show the relations between the received power P Rx and harvested power P EH for the LEH and NLEH models. The LEH model assumes a linear relationship P EH = η P Rx at the harvester where η is energy conversion efficiency. However, measurements in [25,26] show the non-linear relationship between P Rx and P EH which is well modeled using a logistic function as [18]
P EH = Φ EH P Rx = P EH max 1 1 + e a EH b EH e a EH P Rx + e a EH b EH ,
where P EH max is the maximum harvested power of the harvester, and a EH and b EH are EH parameters of the harvester. It is seen from (1) that the random variables in P Rx are input variables of an exponential function, this leads to the impossibility of grouping or separating independent random variables to perform further calculations. For that reason, the studies on SWIPT systems commonly adopt the LEH model to simplify calculations instead of using (1).
In this paper, we propose a new SaT scheme aiming to support the SWIPT relaying systems. Specifically, this scheme allows the EH relay to choose the appropriate transmit-power level and then perform the energy-storing and information-forwarding tasks simultaneously (as illustrated in Figure 2d). The SaT scheme includes MTPLs represented by an output-power space (OPS) O R , OPS { 0 , P R , 1 , , P R , N , P EH max } where P R , n , n = 1 , , N , are transmit-power levels supported at R and satisfy 0 < P R , 1 < < P R , n < < P R , N < P EH max . For a given O R , OPS , the instantaneous transmit power of R, P R , is a function of P Rx determined by a TPS as the follows.
P R = G R ( Φ EH ( P Rx ) ) P R , N ; If P R , N Φ EH ( P Rx ) < P EH max P R , n ; If P R , n Φ EH ( P Rx ) < P R , n + 1 , n = 1 , , N 1 0 ; If Φ EH ( P Rx ) < P R , 1 ,
The remaining harvested energy after sending information at power P R is stored in the battery of R for maintaining other important activities. The power for energy storing is given by
P SE = P EH P R = Φ EH ( P Rx ) G R ( Φ EH ( P Rx ) ) .
The randomness of P Rx effects on both P SE and P R . The ASE is discussed in Section 3.3 and the cumulative distribution function (CDF) of P R is presented in Proposition 1. By using the SaT scheme, the calculations for system performance of NLEH relaying systems become analytically tractable. Moreover, with sufficient number of transmits-power levels and a small “power gap” between two consecutive transmit-power levels in O R , OPS , the system performance for the SaT scheme is close to that for the HtT scheme; hence, the SaT scheme can be considered to be an approximate solution to access the system performance of the HtT-based NLEH relaying systems.

2.3. Communication in the First Time Slot

During this time slot, S broadcasts an information x S = a 1 x 1 + a 2 x 2 at power E { | x s | 2 } = P S where x 1 and x 2 are the desired information of U 1 and U 2 , respectively, a 1 and a 2 are NOMA power-allocation factors at S and a 1 + a 2 = 1 . R uses PS policy, as shown in Figure 1b, to harvest energy. Moreover, J gives an addition energy at R by sending jamming signal x J at power E { | x J | 2 } = P J . Letting h A B and d A B be the channel coefficient and distance of the A B link (node A and node B can be S , R , U 1 , U 2 , E and J), respectively, the received information signal at the antenna of R is y R = h S R x S + h J R x J . Next, R uses a portion 1 θ y R for EH and the rest portion θ y R for information decoding (ID); hence, the received power at the EH component and input signal at the ID component are expressed as
P Rx = 1 θ g S R P S + g J R P J ,
y R ID = θ h S R x S + θ h J R x J + n R ,
where g A B = | h A B | 2 ; and n R CN ( 0 , N 0 ) is an additive white Gaussian noise (AWGN) at R. From Assumption (ii), g A B is an exponential RV with parameter λ A B = d A B α where α is path loss exponent. The probability density function (PDF) and CDF of g A B are given by f g A B ( x ) = λ A B e λ A B x and F g A B ( x ) = 1 e λ A B x , respectively.
Since R can eliminate the effect of the jamming signal in (5), the SNR for x 1 and the SINR for x 2 obtained at R by using successive interference cancellation (SIC) receiver are given by
γ R x 1 = μ 1 g S R ,
γ R x 2 = μ 2 g S R μ 1 g S R + 1 ( a ) a 2 a 1 ,
where the parameters μ k , 1 k 11 , are defined in Table 1. The approximation at (a) is based on the assumption that the noise power is small as compared to the interference caused by x 1 .
Proposition 1.
The CDF and PDF of a RV X P Rx 1 θ = g S R P S + g J R P J are respectively expressed by
F X ( x ) = 1 + λ J R P S μ 3 e λ S R P S x λ S R P J μ 3 e λ J R P J x ; If μ 3 0 1 1 + λ S R x P S e λ S R P S x ; If μ 3 = 0 ,
f X ( x ) = λ S R λ J R μ 3 e λ J R P J x e λ S R P S x ; If μ 3 0 λ S R 2 P S 2 x e λ S R P S x ; If μ 3 = 0 .
The CDF of P R , F P R ( Y ) , where Y O R , OPS and the probability Pr P R = P R , n , 1 n N , are respectively expressed by
F P R ( Y ) = Pr P R < Y = F X P ( Y ) ,
Pr ( P R = P R , n ) = F X ( P n + 1 ) F X ( P n ) ,
where P ( Y ) = 1 a EH ( 1 θ ) ln P EH max e a EH b EH + 1 P EH max Y e a EH b EH , P n = P ( P R , n ) and P N + 1 = P ( P EH max ) = .
Proof. 
(8) is obtained via solving F X ( x ) = Pr g 0 x g J R P J P S . Next, (9) is obtained by taking the derivative of (8). Finally, using (1) and (8), (10) and (11) can be proven. □

2.4. Communication in the Second Time Slot

After decoding x 1 and x 2 , R encodes them as x R = b 1 x 1 + b 2 x 2 then forwards x R to the users at power E { | x R | 2 } = P R where b 1 and b 2 are NOMA power-allocation factors at R and b 1 + b 2 = 1 . During this time slot, J also sends jamming signal x J at power P J to interfere with E. The received signals at nodes { U 1 , U 2 , E } are respectively given by
y { U 1 , U 2 , E } = h R { U 1 , U 2 , E } x R + h J { U 1 , U 2 , E } x J + n { U 1 , U 2 , E } ,
where n U 1 , U 2 , E is the AWGN at { U 1 , U 2 , E } .
Since U 1 and U 2 can eliminate the effect of x J on its signal, the SINRs for x 2 at U 1 and U 2 are respectively given as
γ U 1 x 2 = b 2 P R g R U 1 b 1 P R g R U 1 + N 0 ( b ) b 2 b 1 ,
γ U 2 x 2 = b 2 P R g R U 2 b 1 P R g R U 2 + N 0 ( c ) b 2 b 1 .
Using the SIC receiver, U 1 can decode x 1 with the SNR given as
γ U 1 x 1 = b 1 P R g R U 1 N 0 .
Since E cannot eliminate the effect of x J on its signal, the SNR for x 1 and SINR for x 2 obtained at E by using SIC receiver are given as
γ E x 1 = b 1 P R g R E g J E P J + N 0 ( d ) b 1 Z ^ ,
γ E x 2 = b 2 P R g R E b 1 P R g R E + P J g J E + N 0 ( e ) b 2 b 1 + Z ^ 1 ,
where Z ^ = P R g R E P J g J E . Moreover, we denote Z = P R , n g R E P J g J E as a RV which represents for Z ^ as P R = P R , n .
The approximations at ( b ) , ( c ) , ( d ) and ( e ) are based on the assumption that the noise power is small as compared to the interference caused by x 1 and x J .
Proposition 2.
The CDF and the PDF of Z are given by
F Z ( z ) = z z + μ 5 ,
f Z ( z ) = μ 5 ( z + μ 5 ) 2 .
Proof. 
(18) and (19) are obtained via solving F Z ( z ) = Pr g R E < g J E P J P R , n z and f Z ( z ) = z F Z ( z ) , respectively. □

2.5. The Achievable Secrecy Rates

By definition, the achievable secrecy rate is the maximum secrecy rate for sending confidential information to a legitimate node while the eavesdropper is unable to decode any information. Letting C { R , U 1 , U 2 , E } x m = 1 2 log 2 1 + γ { R , U 1 , U 2 , E } x m , m { 1 , 2 } , be the achievable rate for x m at the node { R , U 1 , U 2 , E } , the achievable secrecy rate for x m for overall system is calculated by.
C sec x 1 = min C R x 1 , C U 1 x 1 C E x 1 + ,
C sec x 2 = min C R x 2 , C x 2 C E x 2 + ,
where C x 2 = min { C U 1 x 2 , C U 2 x 2 } is the condition for successfully decoding x 2 at both U 1 and U 2 , hence, SIC at U 1 operates correctly.

3. System Performance Analysis

3.1. The Secrecy Outage Probability (SOP)

For NOMA communications, the SOP is defined as the probability of occurring the secrecy outage event, i.e., the achievable secrecy rate of a user is less than its target secrecy rate, at any user. We study the SOP in two scenarios where the outage events are counted over the relay’s transmission duration (i.e., R is "ON"), SOP ON , and the whole communication duration (i.e., for both cases R is "ON" and "OFF"), SOP All . With given target secrecy rates for x 1 , R th x 1 , and x 2 , R th x 2 , SOP All and SOP ON are respectively calculated as
P All = Pr C sec x 1 < R th x 1 , C sec x 2 < R th x 2 = F X ( P 1 ) + Pr C sec x 1 < R th x 1 , C sec x 2 < R th x 2 , P R > 0 P 1 ,
where F X ( P 1 ) is the probability of the event that R is "OFF" and the expression for P 1 is presented in Proposition 3. P 1 represents for the outage event that occurs when R forwards the information but the instantaneous secrecy rates at the users do not satisfy the user’s target secrecy rates. P 1 is counted for whole the communication duration, hence, the expression for SOP ON is obtained using Bayes’s law as follows:
P ON = P 1 1 F X ( P 1 ) ,
Proposition 3.
The analytical approximate expression for P 1 is given by
P 1 n = 1 N P b ( n ) + P c ( n ) P d ( n ) ,
where P b ( n ) , P c ( n ) and P d are presented inTable 2.
Proof. 
See Appendix A. □
It is seen from (22) that F X ( P 1 ) is a lower bound for SOP All . When P R , 1 is set at high values, the increase in F X ( P 1 ) can result the worse SOP All and better SOP ON (note that F X ( P 1 ) is an increasing function of P R , 1 ; for practical scenarios, P R , 1 should be greater than a minimum threshold of the incident power, i.e., P th act , to activate the EH circuit). An appreciate choice for OPS could be exploited to guarantee different goals of the system. For providing reliable communication, the OPS includes high power levels to reduce ineffective communication caused by low relay transmit powers. For frequent communication, the OPS can exploit low power levels. The jamming signal strengths are also an important factor in the SOP. Specifically, the harvested energy is enhanced, and the overhearing rate is decreased when the jamming signal strengths at R and E increase, respectively. This leads to improvement in the SOP.

3.2. The Average Achievable Secrecy Rate (AASR)

3.2.1. The Average Achievable Secrecy Rate for x 1

Let O P R , n be the event that the transmit power of R is P R , n , i.e., P R = P R , n , O P R be an event space defined as O P R = { O P R , 1 , , O P R , N } , and O Z ^ { Z ^ < P R g R U 1 N 0 } = { g R E P J g J E < g R U 1 N 0 } be the event of existing secure communication for x 1 during the second time-slot communication (or O Z ^ { C E x 1 < C U 1 x 1 } ). The AASR of x 1 , C ¯ sec x 1 , is calculated by averaging the random variable C sec x 1 for all possible cases of P R (represented by O P R ) and O Z ^ (due to the presences of random channel gains, O P R , n and O Z ^ are random events). Using the law of total expectation, C ¯ sec x 1 is calculated as
C ¯ sec x 1 = 2 τ 0 T E E E C sec x 1 | O P R , O Z ^ | O { P R , Z ^ } .
The factor 2 τ 0 T = T τ setup T indicates the effect of the setup phase duration on the AASRs. In the multiple-user scenario, the increase in τ setup causes a significant influence on the amount of the received confidential data. Using the fact that E { min { x , y } } min { E { x } , E { y } } , we can obtain an upper bound for C ¯ sec x 1 as follows.
C ¯ sec , up x 1 = 2 τ 0 T min E E E C R x 1 | O P R , O Z ^ | O Z ^ , E E E C U 1 x 1 C E x 1 | O P R , O Z ^ | O P R .
Since C R x 1 and O Z ^ are independent, and ( C U 1 x 1 C E x 1 ) and O P R , n are independent, (26) can be expressed as in (27).
Proposition 4.
The analytical expression for C ¯ sec , up x 1 is given by the following equation.
C ¯ sec , up x 1 = 2 τ 0 T min Pr ( O Z ^ ) n = 1 N C a ( n ) , n = 1 N C b ( n ) Pr ( O P R , n ) ,
where Pr ( O Z ^ ) , Pr ( O P R , n ) and C a ( n ) are given in (28)–(30), and the expressions for C a , 1 ( n ) and C b ( n ) are presented inTable 3.
Pr ( O Z ^ ) = 1 + λ R U 1 N 0 μ 5 P R , n e λ R U 1 N 0 μ 5 P R , n E i λ R U 1 N 0 μ 5 P R , n ,
Pr ( O P R , n ) = F X ( P n + 1 ) F X ( P n ) ,
C a ( n ) = C a 1 ( P n + 1 ) C a 1 ( P n ) .
Proof. 
See Appendix B. □

3.2.2. The Average Achievable Secrecy Rate for x 2

The AASR for x 2 is calculated by
C ¯ sec x 2 = 2 τ 0 T E E min C R x 2 , C x 2 C E x 2 + O P R ( e ) 2 τ 0 T n = 1 N E min log 4 ( a 1 ) , log 4 ( b 1 ) log 4 1 + b 2 b 1 + Z 1 Pr O P R , n .
The approximation at ( e ) is achieved by using ( a ) , ( b ) and ( d ) . Similarity, we can attain an upper bound for C ¯ sec x 2 as follows
C ¯ sec , up x 2 = 2 τ 0 T min log 4 ( a 1 ) , log 4 ( b 1 ) n = 1 N E log 4 1 + b 2 b 1 + 1 Z C ¯ E x 2 ( n ) Pr ( O P R , n ) .
Proposition 5.
The analytical expression for C ¯ sec , up x 2 is given by the following equation.
C ¯ sec , up x 2 = 2 τ 0 T min log 4 ( a 1 ) , log 4 ( b 1 ) C ¯ E x 2 .
where C ¯ sec , up x 2 is calculated by
C ¯ E x 2 = n = 1 N μ 5 μ 5 b 1 1 μ 10 log 4 ( b 1 μ 5 ) + μ 11 log 4 ( b 1 ) F X ( P n + 1 ) F X ( P n ) .
Proof. 
See Appendix C. □
For C ¯ sec , up x 1 , it is seen from the definition of O Z ^ and (A17) that the increase in the jamming signal strength at E leads to the increase in Pr ( O Z ^ ) and C b ( n ) (by degrading C E x 1 ), and the increase in the jamming signal strength at R leads to the increase in C b ( n ) (by enhancing C U 1 x 1 ). For C ¯ sec , up x 2 , there is an upper limit for C ¯ sec , up x 2 , i.e., R limit x 2 = log 4 ( max ( a 1 , b 1 ) ) (as observed in (33)), and C ¯ sec , up x 2 reaches R limit x 2 iff b 1 a 1 or C ¯ E x 2 ( n ) is very small. With the presence of jammer, the eavesdropping rate can be reduced, hence, a 1 and b 1 can be set at the same value to gain the high AASRs for both users.

3.3. The Average Stored Energy (ASE)

After extracting the amount of energy for information forwarding, the average remaining energy at R for energy storing is given by
ASE = τ 0 0 Φ EH ( ( 1 θ ) x ) f X ( x ) d x τ 0 n = 1 N P R , n P n P n + 1 f X ( x ) d x .
Proposition 6.
The analytical expression for the ASE is given by the following equation.
ASE = τ 0 P ¯ R , EH Total τ 0 n = 1 N P R , n F X ( P n + 1 ) F X ( P n ) ,
where P ¯ R , EH Total = 0 Φ EH ( ( 1 θ ) x ) f X ( x ) d x , for the case of μ 3 0 ,
P ¯ R , EH Total = P EH max + λ S R λ J R 1 + e a EH b EH P EH max μ 3 I 1 λ S R a EH ( 1 θ ) P S , a EH ( 1 θ ) , e a EH b EH I 1 λ J R a EH ( 1 θ ) P J , a EH ( 1 θ ) , e a EH b EH ,
and for the case of μ 3 = 0 ,
P ¯ R , EH Total = P EH max λ S R 2 P EH max 1 + e a EH b EH P S 2 I 2 λ S R a EH ( 1 θ ) P S , a EH ( 1 θ ) , e a EH b EH ,
with I 1 ( k , p , c ) and I 2 ( k , p , c ) defined as
I 1 ( k , p , c ) = Γ ( k + 1 ) p Γ ( k + 2 ) 2 F 1 ( 1 , k + 1 ; k + 2 ; c ) ,
I 2 ( k , p , c ) = 3 F 2 ( k + 1 , 1 , k + 1 ; k + 2 , k + 2 ; c ) p 2 ( k + 1 ) 2
Proof. 
See Appendix D. □
The first element of the right-hand side (RHS) of (36), i.e., τ 0 P ¯ R , EH Total , is the average harvested energy of R, and it is a constant for a given system configuration. The remain of the RHS of (36) is the portion of harvested energy employed for information forwarding. Therefore, the ASE depends on the selected MTPLs in OPS. To enhance SOP All and AASR, R should store less energy and use higher portion of harvested energy to assist the communication. This means that the OPS should include more MTPLs with small “power gap”. To guarantee a target values of ASE, the OPS should include fewer MTPLs with equal “power gaps”. As shown Figure 2d, the equal “power gaps” can allow R to send information at more effective power levels. For the HtT scheme, the ASE is equal to 0. Since the ASE depends on τ 0 , it receives lower values when the system spends more time for the setup phase.

4. Results and Discussions

In this section, we present numerical results to validate the analytical expressions presented in Section 3. Unless otherwise specified, we set P S = P D = 30 dBm, a 1 = b 1 = 0.1 , R th x 1 = 1.1 bits/sec/Hz, R th x 2 = 1 bits/sec/Hz, α = 2.3 , θ = 0.5 , P EH max = 24 mW, a EH = 150 , b EH = 0.014 and N 0 = 1 (We use the parameters of the NLEH model given in [27]). We assume that τ setup T for the two-user case; hence, we do not examine the effects of τ setup on the AASR results. The coordinates (in meters) in the two-dimensional plane of S , R , U 1 , U 2 , E and J (as illustrated in Figure 1a) are set at S ( 6 , 1.5 ) , R ( 0 , 0 ) , U 1 ( 6 , 1.5 ) , U 2 ( 9 , 1.5 ) , E ( 1.5 , 6 ) and J ( 4.5 , 3 ) , respectively. We consider the SaT scheme in two scenarios, MTPL and STPL. The STPL is a simpler case of the MTPL where R supports only one transmit-power level. For the MTPL, we examined four OPSs given as O R , HtT = { 0 , 0.2 , , 23.8 , P EH max } mW, O R , OPS ( a ) = { 0 , 5 , 10 , 15 , 20 , P EH max } mW, O R , OPS ( b ) = { 0 , 10 , 15 , 20 , P EH max } mW and O R , OPS ( c ) = { 0 , 15 , 20 , P EH max } mW. For the STPL, the supported transmit-power level of R is examined in four cases, i.e., 5 mW, 10 mW, 15 mW, and 20 mW. Moreover, we consider the case that R uses the HtT scheme to assist the communication and show that the SaT scheme using O R , HtT approximates well the HtT scheme.
In Figure 3, we show the effects of required secrecy rates, R th x 1 and R th x 2 , on the SOP. SOP All and SOP ON show increasing trends with the increases in R th x 1 and/or R th x 2 . It is easy to show that R limit x 2 = 0.5 log 2 max a 1 , b 1 = 1.66 bits/s/Hz. The analytical results match well with the simulation results except for the case that R th x 2 gets close to R limit x 2 and P R gets relatively low values. At higher values of P R , i.e., 15 mW and 20 mW, the accuracy of the analytical results is improved significantly. The reason is the approximations at (13), (14) and (A13) become less accurate when P R is low and R th x 2 approximates R limit x 2 , respectively. It is seen in Figure 3a that there is a change in the effective values of P R , which yields the lowest SOP All for the STPL. With the increase in R th x 1 , R chooses higher transmit-power levels to achieve the lowest SOP All . This disadvantage is overcome by the MTPL. By sending information at diverse transmits powers, the MTPL shows its superiority in improving the secrecy outage performance. The HtT scheme achieves the best performance and the analytical results for the SaT scheme using O R , HtT approximate well with the simulation results for the HtT scheme.
In Figure 4, we show the effects of NOMA power-allocation factors, β = a 1 = b 1 , on the secrecy performance. Similarly, for given value of R th x 2 , there is an upper limit for β , denoted as β max (using (7), (13) and (14), we can show that max { a 1 , b 1 } β max = 2 2 R th x 2 ). The SOP is equal to zero as β = 0 or β > β max , and achieves good values as β is around 1 2 β max . The less accuracy of the analytical results when β approximates β max and P R gets relatively low values can be explained in a similar way as discussed in Figure 3. For the AASR results, the secrecy rates of U 1 and U 2 follow different trends, i.e., increasing function and decreasing function of β , respectively, that are the common trends for all NOMA systems. The AASR of U 1 for the MTPL outperforms that for the STPL due to the great advantage in using multiple transmit-power levels. The analytical results of the AASR of U 2 for both STPL and MTPL are the same; however, their simulation results indicate that the MTPL gives higher secrecy rates and fits the analytical results better than the STPL.
In Figure 5, we present the effect of the energy harvesting coefficient θ on the secrecy performance. As shown that the secrecy performance improves when θ increases from 0 to an optimal value of θ , denoted by θ * , then it degrades with further increase in θ . These trends are explained using the effect of θ on the signal strength employed for information decoding and energy harvesting (i.e., θ y R and ( 1 θ ) y R , respectively). As shown in Figure 5, θ * varies in the range of [0.1,0.2]. The trend for SOP ON is similar to that for SOP All except for the case θ shifts to 1. Because the SOP ON is calculated for the case that R harvests enough energy to send information at power P R P R , 1 ; hence, if P R , 1 0 mW, SOP ON does not tend to 0 when θ shifts to 1. Moreover, the probability that R is ON becomes very small when θ is close to 1; hence, this causes the less accuracy in simulation results. For the O R , HtT , since R almost assists the communication during all block times, SOP ON and SOP All get similar values. The effect of θ observed in Figure 5 agrees with previous studies in SWIPT relaying system. The obtained results indicate that NLEH relay uses higher portions (i.e., lower values of θ ) of its received signal strength for energy harvesting to archive the optimal performance as compared to studies with the LEH model (e.g., θ * ( 0.23 , 0.38 ) in [4] and θ * ( 0.5 , 0.6 ) in [28]).
In Figure 6, we show the effect of jammer’s location on the secrecy performance. When J moves far from R, the decrease in received power of R and the increase in wiretapping rate of E cause the lower secrecy performance. The SOP All and AASR converge to low positive values when J shifts to the coordinate (9,−10).This result indicates that without jammer, the system can satisfy low security-level requirements, such as 0.6 < SOP All < 0.93 . In this case, the secrecy capacity only depends on the relay’s active-state probability and the difference in channel gains between legitimate links (i.e., R U 1 and R U 2 ) and illegitimate link (i.e., R E ). Considering the SOP ON of the STPL, the SOP ON improves during range x J ( 1 , 2 ) , then it degrades with the further increase in x J . The reason is when J moves toward the coordinate (3,-4), the shorter J E distance causes the higher interference at E (note that the signal strength at E is constant due to fixed values of P R in the STPL) leading to the enhancement in secrecy rate. This trend is unclear in Figure 6b because the J E distance can also affect the values of P R . The results in Figure 6 confirm that the jamming signal plays an important role in improving the security rates.
In Figure 7, we examine the system performance under two TPSs, at R, i.e., G R 0 mW and G R 5 mW ( G R 5 mW involves a practical harvester where 0 < P th act < 5 mW, and G R 0 mW involves an ideal harvester with P th act = 0 mW), and different transmit-power configurations at the energy sources, i.e., 23 dBm, 27 dBm and 30 dBm schemes. The output-power levels, P R , n , for G R P EH min is determined by P R , n = P EH min + n N + 1 P EH max P EH min , n = 1 , , N , where P EH min is the minimum power supported at EH transceiver ( P EH min = 0 mW and P EH min = 5 mW for G R 0 mW and G R 5 mW , respectively). There are two effects of increasing N on the TPSs. The first effect is the smaller “power gap” between two successive power levels when N increases. Since R uses the remaining energy for energy storing after it extracts amount energy for assisting the communication, the smaller “power gap” causes the lower stored energy at R; hence, the ASE is a decreasing function of N. When P EH min lifts, the higher remaining energy attained in range ( 0 , P EH min ) can yield the greater ASE (as shown in Figure 7, the ASE for G R 5 mW is greater than that for G R 0 mW ). The second effect is that the transmit powers of R are spread over ( P EH min , P EH max ) , such as P R , 1 and P R , N shift to P EH min and P EH max , respectively. This makes R help the communication more frequently with more appropriate transmit powers. Therefore, the SOP All and AASR achieve better values as N increases. The frequent operation of R achieved by low values of P R , 1 does not give any advantages in enhancing SOP ON . On the other hand, lower values of P R , 1 causes more outage events. As a result, the SOP ON becomes worse as N increases.
For three transmit-power configurations, the higher transmit powers yield better results in SOP All and AASR. The ASEs of G R 0 mW are increasing functions of P S and P J . An interesting result is the ASEs of G R 5 mW can achieve better values at lower values of P S and P J . For instance, when N 3 , the 27 dBm scheme yields a higher ASE as compared to the rest schemes. This result can be explained using the relay’s received power and the “power gap”. The relay’s received power for the 27 dBm scheme is not too low to gain low ASEs as observed at the 23 dBm scheme (the SOP All verify that R is almost idle in the 23 dBm scheme due to too low received power), and it is not too high to lose the great advantage in harvesting energy in range ( 0 , 5 ) mW. These results provide useful insight in designing practical systems, such as choosing appropriate powers at the energy sources and the optimum transmit-power strategies at the EH transceivers to satisfy the requirements in secrecy capacity and amount of stored energy.

5. Conclusions

This paper studied the secrecy performance of a NOMA cooperative system via a NLEH relay. A friendly jammer, which can be an authorized node in the network, was employed to enhance the secrecy performance by rising the received power at the relay and interfering with the wiretapping link. A SaT scheme was proposed aiming to design feasible NLEH transceivers and enable energy-storing mechanism. Moreover, this scheme allowed the calculations for the SOP All , SOP ON and AASR to become mathematical tractable. The analytical results obtained using the SaT scheme can enable analytical performance evaluations for the HtT-based NLEH relaying systems, which cannot be achieved by the direct approaches. The current study considers NOMA communications for two users; however, the analysis results for this study can be extended to the multiple-user scenario. The accuracy of the calculation was verified by simulation which showed that the analytical results agree well with simulation results for most considered cases. In addition, it pointed out the special cases causing the less accuracy for the analytical results, i.e., the target secrecy rate of the FU is chosen with inappropriate values or the relay’s transmit power is too low. The STPL was examined to confirm the superiority of the MTPL in enhancing the secrecy performance. Moreover, the effects of system parameters on the SOP, AASR and ASE were investigated. These effects provided insight into the system design. For instance, the OPS should include both high and low MTPLs with equal “power gaps” to archive the best secrecy performance, and the number of MTPLs is smaller enough to allow energy storing at relay; for a given OPS, the transmit powers at the source and jammer could be appropriately selected to guarantee the ASE at relay; the use of jammer produces a great advantages in enhancing harvested energy and secrecy performance; and the analytical results allow network designers to find optimal values for key system parameters, e.g., the optimal power-splitting ratio for the considered system is around 0.2. The more general model where the eavesdropper is not close to the cell edge and is capable of receiving signals from both the source and relay will be our future works. To confine the eavesdropping capability for this model, different transmit codewords can be exploited [29].

Author Contributions

Conceptualization, V.P.T. and I.-P.H.; Investigation, V.P.T.; Methodology, V.P.T. and I.-P.H.; Writing–original draft preparation, V.P.T.; Writing–review and editing, V.P.T. and I.-P.H.; Project administration, I.-P.H.; Funding acquisition, I.-P.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Basic Science Research Program(2018R1A2B6001680) and the Priority Research Centers Program(2019R1A6A1A03032988) through the National Research Foundation of Korea.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof for Proposition 3

Since C x 2 = min { C U 1 x 2 , C U 2 x 2 } , P 1 is considered in two cases: C U 1 x 2 C U 2 x 2 (i.e., g R U 1 g R U 2 ) and C U 1 x 2 < C U 2 x 2 (i.e., g R U 1 < g R U 2 ), as follows.
P 1 = Pr C sec x 1 < R th x 1 ; C sec x 2 < R th x 2 , P R > 0 , g R U 1 g R U 2 P 2 + Pr C sec x 1 < R th x 1 ; C sec x 2 < R th x 2 , P R > 0 , g R U 1 < g R U 2 P 3 .
By substituting (20) and (21) into (A1), and analyzing the independent elements in P 2 and P 3 , we can rewrite P 2 as the follows
P 2 = Pr C R x 1 < R th x 1 ; C R x 2 < R th x 2 ; C U 1 x 1 C E x 1 < R th x 1 ; C U 2 x 2 C E x 2 < R th x 2 , g R U 1 g R U 2 , P R > 0 = n = 1 N P a P b ( n ) + P c ( n ) P d 1 ( n ) P 2 ( n ) .
Similarly, P 3 is rewritten as
P 3 = n = 1 N ( 1 P a ) P b ( n ) + P c ( n ) P d 2 ( n ) P 3 ( n ) .
Using (A2) and (A3), P 1 is rewritten as
P 1 = n = 1 N P b ( n ) + P c ( n ) P d 1 ( n ) + P d 2 ( n ) P d ( n ) .
where P a , P b ( n ) , P c ( n ) , P d 1 ( n ) and P d 2 ( n ) are given by
P a = Pr g R U 1 g R U 2 ,
P b ( n ) = Pr C R x 1 < R th x 1 ; C R x 2 < R th x 2 , P R = P R , n = Pr P n X < P n + 1 P c ( n ) ,
P c ( n ) = Pr C R x 1 > R th x 1 , C R x 2 > R th x 2 , P R = P R , n O non - OP 1 st - hop ( n ) ,
P d 1 ( n ) = Pr C U 1 x 1 C E x 1 < R th x 1 ; C U 2 x 2 C E x 2 < R th x 2 , g R U 1 g R U 2 O non - OP 1 st - hop ( n ) ,
P d 2 ( n ) = Pr C U 1 x 1 C E x 1 < R th x 1 ; C U 1 x 2 C E x 2 < R th x 2 , g R U 1 < g R U 2 O non - OP 1 st - hop ( n ) ,
In (A7), O non - OP 1 st - hop ( n ) denotes the event that the first-hop communication is not outage and P R = P R , n .

Appendix A.1. Calculation for P c ( n )

Using the expressions for C R x 1 and C R x 2 , we can rewrite P c ( n ) as
P c ( n ) = Pr g S R 2 2 R th x 1 1 μ 1 , 1 a 1 2 2 R th x 2 g S R 2 2 R th x 2 1 μ 1 , P n g S R P S + g J R P J < P n + 1
The calculations for P c ( n ) are considered in three cases
  • For 1 a 1 2 2 R th x 2 1 > a 1 2 2 R th x 2 , P n + 1 μ 4 P S , we have P c ( n ) = 0 .
  • For 1 > a 1 2 2 R th x 2 , P n μ 4 P S < P n + 1 , P 2 c ( n ) is rewritten as
    P c ( n ) = Pr μ 4 g S R P n + 1 g J R P J P S , P n + 1 μ 4 P S P J > g J R ,
    after some manipulation, the expression for P c ( n ) in this case is obtained as in Table 2.
  • For 1 > a 1 2 2 C th x 2 , μ 4 P s < P n , P c ( n ) is rewritten as
    P c ( n ) = Pr μ 4 g S R P n + 1 g J R P J P S , P n μ 4 P S P J g J R P n + 1 μ 4 P S P J + Pr P n g J R P J P s g S R P n + 1 g J R P J P s g J R P n μ 4 P s P J
    after some manipulations, the expression for P c ( n ) in this case is obtained as in Table 2.

Appendix A.2. Calculation for P d ( n )

It is seen that P d 1 ( n ) and P d 2 ( n ) do not have any exact close-form expressions due to their complexity. However in the case that the noise power, N 0 , is small as compared to the interference caused by x 1 and x J , we have C U 1 x 2 C U 2 x 2 1 2 log 2 ( b 1 ) , hence, P d ( n ) can be approximated by
P d ( n ) = Pr g R U 1 < A 1 ( Z ) ; μ 6 < b 2 b 1 + Z 1 O non - OP 1 st - hop ( n )
where A 1 ( Z ) = 2 2 C th x 1 N 0 b 1 P R b 1 Z 2 2 R th x 1 + 1 .
The calculations for P d ( n ) are considered in two cases:
  • For { 1 < μ 6 0 } , we have P d ( n ) = 1 .
  • For { 0 < μ 6 < b 2 b 1 } , P d ( n ) is rewritten by
    P d n = 1 Pr g R U 1 > A 1 Z , Z < μ 7 O non - OP 1 st - hop n = 1 0 μ 7 f Z z 1 F g R U 1 A 1 z d z .
    Substituting (19) and the CDF of g R U 1 into (A14) yields
    P d ( n ) = 1 μ 5 μ 8 0 μ 7 e μ 9 z z + μ 5 2 d z .
    Using partial integration and [23] (Eq. (3.352.1)) we can show that
    0 a e b x ( x + c ) 2 d x = 1 c e b a a + c b e b c ( E i ( b a b c ) E i ( b c ) ) .
    Using (A16), the expression for P d ( n ) in this case is obtained as in Table 2.
Finally, Proposition 3 is proven.

Appendix B. Proof for Proposition 4

Using the expressions for C R x 1 , C U 1 x 1 and C E x 1 , and analyzing the independently elements in (26), we can rewrite (26) as
C ¯ sec , up x 1 = min Pr ( O Z ^ ) n = 1 N E E C R x 1 | O P R , n C a ( n ) , n = 1 N E E C U 1 x 1 C E x 1 O P R , n , O Z ^ C b ( n ) Pr ( O P R , n ) .

Appendix B.1. Calculation for Pr ( O Z ^ )

We rewrite Pr ( O Z ^ ) as
Pr O Z ^ = 0 f g R U 1 x F Z P R , n x N 0 d x .
Using CDF of g R U 1 and (18), the expression for (A18) is obtained as in (28) after some calculation steps.

Appendix B.2. Calculation for C a ( n )

Using expression of C R x 1 , C a ( n ) can be rewritten as
C a ( n ) = E E log 4 1 + μ 1 g S R g S R < P n + 1 g J R P J P s C a 1 ( P n + 1 ) E E log 4 ( 1 + μ 1 g S R ) g S R < P n g J R P J P s C a 1 ( P n ) .
Using partial integration, we can prove the following equation
0 a f T ( t ) ln ( θ + μ t ) d t = ( F T ( a ) 1 ) ln ( a μ + θ ) + ln ( θ ) + 0 a 1 F T ( t ) t + θ μ d t ,
where F T ( t ) is an antiderivative of a continuous function f T ( t ) on [ 0 , a ] and satisfies F T ( 0 ) = 0 . Please note that F T ( t ) does not need to be a CDF.
Using (A20) for solving E ln ( 1 + μ 1 g S R ) g S R < P g J R P J P S , and then using [23] (Eq. (8.211.1)), C a 1 ( P ) is rewritten as in (A21). After some manipulations and using [30] (Eq. (4.2.1) and Eq. (4.2.9)), C a 2 ( P ) can be expressed as in (A22). It is seen that C a 3 ( P ) follows the form of (A20) (for μ 3 0 , F T ( t ) = e t 1 on [ 0 , P P J ] ; and for μ 3 = 0 , F T ( t ) = t on [ 0 , P P J ] ). By reformulating the integral in C a 3 ( P ) with (A20) and using [23] (Eq. (8.211.1)) (only for μ 3 0 ). The expressions for C a 3 ( P ) are expressed as in (A23). Using (A21)–(A23), the expression for C a 1 ( P ) is obtained as in Table 3.
C a 1 ( P ) = λ J R e λ S R μ 1 ln ( 4 ) 0 P P J e λ J R x E i x λ S R P J λ S R P P S λ S R μ 1 d x e λ S R μ 1 1 e λ J R P P J E i λ S R μ 1 C a 2 ( P ) λ J R e λ S R P P S ln ( 4 ) S R P P J e μ 3 P S x ln μ 1 P x P J μ 1 P S + 1 d x C a 3 ( P ) .
C a 2 ( P ) = 1 ln ( 4 ) e λ S R μ 1 E i λ S R P P S λ S R μ 1 E i λ S R μ 1 + exp μ 3 μ 1 P J λ J R P P J E i μ 3 μ 1 P J E i μ 3 P J P P S + 1 μ 1 ; If μ 3 0 e λ S R μ 1 E i λ S R P P S λ S R μ 1 E i λ S R μ 1 e λ S R P P S ln 1 + μ 1 P P S ; If μ 3 = 0
C a 3 ( P ) = 1 ln ( 4 ) λ J R P S μ 3 e λ S R P P s ln 1 + μ 1 P P s λ J R P S μ 3 exp μ 3 μ 1 P J λ J R P P J E i μ 3 μ 1 P J E i μ 3 P J 1 μ 1 + P P s ; If μ 3 0 λ S R e λ S R P P S P S P S μ 1 + P ln 1 + μ 1 P P S P ; If μ 3 = 0

Appendix B.3. Calculation for C b ( n )

By substituting the expressions for C U 1 x 1 and C E x 1 , C b ( n ) can be rewritten as
C b ( n ) = 1 ln ( 4 ) 0 f g R U 1 ( x ) F Z ζ x ln 1 + b 1 ζ x 0 ζ x f Z ( z ) ln ( 1 + b 1 z ) d z C b 1 ( n ) d x ,
where ζ = P R , n N 0 .
Using F Z ( t ) H ( t ) 0 ζ x 0 ζ x f Z ( t ) H ( t ) d t = 0 ζ x F Z ( t ) h ( t ) d t where H ( t ) = ln ( 1 + b 1 t ) and h ( t ) = b 1 1 + b 1 t , we can rewrite C b ( n ) as
C b ( n ) = 1 ln ( 4 ) 0 f g R U 1 ( x ) 0 P R , n N 0 x b 1 z ( z + μ 5 ) ( 1 + b 1 z ) d z d x .
Solving the second integral with the help of partial fraction expansion method, C b ( n ) is obtained as
C b ( n ) = 1 ln ( 4 ) 0 f g R U 1 ( x ) b 1 μ 5 μ 5 b 1 1 ln P R , n x μ 5 N 0 + 1 1 μ 5 b 1 1 ln 1 + b 1 P R , n x N 0 d x .
Since (A26) follows the form of (A20), (A26) can be solved using (A20) and [23] (Eq. (8.211.1)). The expression for C b ( n ) is given as in Table 3.
Finally, Proposition 4 is proven.

Appendix C. Proof for Proposition 5

From (32) and (33), it is seen that C ¯ E x 2 = n = 1 N C ¯ E x 2 ( n ) Pr ( O P R , n ) . To derive the expression for C ¯ E x 2 , we need the CDF of the RV U = b 2 b 1 + Z 1 . The CDF of U can be obtained using the (18) as follows.
F U ( x ) = 1 ; If x b 2 b 1 x μ 5 b 2 + ( 1 μ 5 b 1 ) x ; If x < b 2 b 1 .
Next, we rewrite C ¯ E x 2 ( n ) as
C ¯ E x 2 ( n ) = 1 ln ( 4 ) 0 b 2 b 1 f U ( x ) ln ( 1 + x ) d x = μ 5 ln ( 4 ) ( 1 μ 5 b 1 ) μ 10 ln ( b 1 μ 5 ) μ 11 ln ( b 1 ) .
The integral in (A28) is solved using (A20). Substituting (A28) into C ¯ E x 2 , Proposition 5 is proved.

Appendix D. Proof for Proposition 6

Before analyzing P ¯ R , EH Total , we study two integrals I 1 ( k , p , c ) = 0 e k p x e p x + c d x and I 2 ( k , p , c ) = 0 x e k p x e p x + c d x , which are useful to find the expression for P ¯ R , EH Total , where k , p and c are positive real numbers. Letting y = e p x , we can rewrite I 1 ( · ) and I 2 ( · ) as
I 1 ( k , p , c ) = 1 p 0 1 y k 1 + c y d y
I 2 ( k , p , c ) = 1 p 2 0 1 ln ( y ) y k 1 + c y d y
Using [23] (Eq. (9.111)), I 1 ( · ) can be expressed as in (39).
In the following, we show the steps to solve I 2 ( · ) . First, we find the antiderivative of f Y ( y ) = y k 1 + y c using the Taylor series ( 1 + y c ) 1 = l = 0 ( c y ) l as the follows.
f Y ( y ) d y = y k + 1 n = 0 ( c y ) n k + n + 1 = ( f ) y k + 1 k + 1 2 F 1 ( 1 , k + 1 ; k + 2 ; y c ) .
The equality at ( f ) is obtained using [23] (Eq. (9.14.1)). Then, we perform partial integration on I 2 ( · ) for the two functions ln ( y ) and f ( a ) ( y ) , hence, I 2 ( · ) is rewritten as
I 2 ( k , p , c ) = 1 p 2 ( k + 1 ) 0 1 y k 2 F 1 ( 1 , k + 1 ; k + 2 ; y c ) d y
Finally, with the help of [23] (Eq. (7.512.12)), I 2 ( · ) is be expressed as in (40).

Appendix D.1. Calculation for P ¯ R , EH Total in the case of μ 3 0

In this case, P ¯ R , EH Total is rewritten by using (9) as follows.
P ¯ R , EH Total = P EH max + λ S R λ J R P EH max ( 1 + e a EH b EH ) μ 3 × 0 exp λ S R P S x exp a EH ( 1 θ ) x + exp a EH b EH d x 0 exp λ J R P J x exp a EH ( 1 θ ) x + exp a EH b EH d x .
Using I 1 ( · ) , P ¯ R , EH Total is calculated as in (37).

Appendix D.2. Calculation for P ¯ R , EH Total in the case of μ 3 = 0

In this case, P ¯ R , EH Total is rewritten by using (9) as follows.
P ¯ R , EH Total = P EH max λ S R 2 P EH max 1 + e a EH b EH P S 2 0 x exp λ S R P S x exp a EH ( 1 θ ) x + exp a EH b eh d x .
Using I 2 ( · ) , P ¯ R , EH Total is calculated as in (38).
Finally, Proposition 6 is proven.

References

  1. Zhang, R.; Ho, C. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [Google Scholar] [CrossRef] [Green Version]
  2. Liu, L.; Zhang, R.; Chua, K. Wireless Information Transfer with Opportunistic Energy Harvesting. IEEE Trans. Wirel. Commun. 2013, 12, 288–300. [Google Scholar] [CrossRef] [Green Version]
  3. Liu, L.; Zhang, R.; Chua, K. Wireless Information; Power Transfer: A Dynamic Power Splitting Approach. IEEE Trans. Commun. 2013, 61, 3990–4001. [Google Scholar] [CrossRef] [Green Version]
  4. Zhu, G.; Zhong, C.; Suraweera, H.; Karagiannidis, G.; Zhang, Z.; Tsiftsis, T. Wireless Information and Power Transfer in Relay Systems With Multiple Antennas and Interference. IEEE Trans. Commun. 2015, 63, 1400–1418. [Google Scholar] [CrossRef]
  5. Muncuk, U.; Alemdar, K.; Sarode, J.; Chowdhury, K. Multiband Ambient RF Energy Harvesting Circuit Design for Enabling Batteryless Sensors and IoT. IEEE Internet Things 2018, 5, 2700–2714. [Google Scholar] [CrossRef]
  6. Yang, Z.; Xu, W.; Pan, Y.; Pan, C.; Chen, M. Optimal Fairness-Aware Time and Power Allocation in Wireless Powered Communication Networks. IEEE Trans. Commun. 2018, 66, 3122–3135. [Google Scholar] [CrossRef] [Green Version]
  7. Niu, H.; Zhang, B.; Guo, D. Outage Constrained Robust Beamforming and Power Splitting for Secure MISO SWIPT Channel. IEEE Wirel. Commun. Lett. 2017, 6, 826–829. [Google Scholar] [CrossRef]
  8. Zhu, Z.; Chu, Z.; Zhou, F.; Niu, H.; Wang, Z.; Lee, I. Secure Beamforming Designs for Secrecy MIMO SWIPT Systems. IEEE Wirel. Commun. Lett. 2018, 7, 424–427. [Google Scholar] [CrossRef]
  9. Nguyen-Huu, P.; Ho-Van, K.; Bao, V. Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer. IET Commun. 2019, 13, 1877–1885. [Google Scholar] [CrossRef]
  10. Liu, W.; Zhou, X.; Durrani, S.; Popovski, P. Secure Communication with a Wireless-Powered Friendly Jammer. IEEE Trans. Wirel. Commun. 2016, 15, 401–415. [Google Scholar] [CrossRef] [Green Version]
  11. Xing, H.; Wong, K.; Chu, Z.; Nallanathan, A. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying. IEEE Trans. Signal Process. 2015, 63, 6616–6631. [Google Scholar] [CrossRef] [Green Version]
  12. Diamantoulakis, P.; Pappi, K.; Ding, Z.; Karagiannidis, G. Wireless-Powered Communications With Non-Orthogonal Multiple Access. IEEE Trans. Wirel. Commun. 2016, 15, 8422–8436. [Google Scholar] [CrossRef] [Green Version]
  13. Tang, J.; Yu, Y.; Liu, M.; So, D.; Zhang, X.; Li, Z.; Wong, K. Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems. IEEE Trans. Wirel. Commun. 2020, 19, 120–133. [Google Scholar] [CrossRef] [Green Version]
  14. Liu, Y.; Ding, H.; Shen, J.; Xiao, R.; Yang, H. Outage Performance Analysis for SWIPT-Based Cooperative Non-Orthogonal Multiple Access Systems. IEEE Commun. Lett. 2019, 23, 1501–1505. [Google Scholar] [CrossRef]
  15. Wang, Y.; Wu, Y.; Zhou, F.; Chu, Z.; Wu, Y.; Yuan, F. Multi-Objective Resource Allocation in a NOMA Cognitive Radio Network With a Practical Non-Linear Energy Harvesting Model. IEEE Access 2018, 6, 12973–12982. [Google Scholar] [CrossRef]
  16. Yang, Z.; Xu, W.; Pan, Y.; Pan, C.; Chen, M. Energy Efficient Resource Allocation in Machine-to-Machine Communications With Multiple Access and Energy Harvesting for IoT. IEEE Internet Things 2018, 5, 229–245. [Google Scholar] [CrossRef]
  17. Yang, Z.; Pan, Y.; Xu, W.; Guan, R.; Wang, Y.; Chen, M. Energy efficient resource allocation for machine-to-machine communications with NOMA and energy harvesting. In Proceedings of the 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 1–4 May 2017; pp. 145–150. [Google Scholar]
  18. Vo, V.; So-In, C.; Tran, H.; Tran, D.; Heng, S.; Aimtongkham, P.; Nguyen, A. On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA. IEEE Access 2019, 7, 149341–149354. [Google Scholar] [CrossRef]
  19. Tang, J.; Dai, T.; Cui, M.; Zhang, X.; Shojaeifard, A.; Wong, K.; Li, Z. Optimization for Maximizing Sum Secrecy Rate in SWIPT-Enabled NOMA Systems. IEEE Access 2018, 6, 43440–43449. [Google Scholar] [CrossRef]
  20. Wang, D.; Men, S. Secure Energy Efficiency for NOMA Based Cognitive Radio Networks with Nonlinear Energy Harvesting. IEEE Access 2018, 6, 62707–62716. [Google Scholar] [CrossRef]
  21. Boshkovska, E.; Ng, D.; Zlatanov, N.; Schober, R. Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems. IEEE Commun. Lett. 2015, 19, 2082–2085. [Google Scholar] [CrossRef] [Green Version]
  22. Chen, Y.; Zhao, N.; Alouini, M. Wireless Energy Harvesting Using Signals From Multiple Fading Channels. IEEE Trans. Commun. 2017, 65, 5027–5039. [Google Scholar] [CrossRef]
  23. Gradshteyn, I.; Ryzhik, I.; Jeffrey, A.; Zwillinger, D. Table of Integral, Series and Products, 7th ed.; Elsevier: Amsterdam, The Netherlands, 2007. [Google Scholar]
  24. Li, H.; Zhang, Q.; Yuan, H. Channel state information based key generation vs. side-channel analysis key information leakage. In Proceedings of the 2011 5th International Conference on Network and System Security, Milan, Italy, 6–8 September 2011. [Google Scholar]
  25. Le, T.; Mayaram, K.; Fiez, T. Efficient Far-Field Radio Frequency Energy Harvesting for Passively Powered Sensor Networks. IEEE J. Solid-State Circuits 2008, 43, 1287–1302. [Google Scholar] [CrossRef]
  26. Guo, J.; Zhu, X. An improved analytical model for RF-DC conversion efficiency in microwave rectifiers. In Proceedings of the 2012 IEEE/MTT-S International Microwave Symposium Digest, Montreal, QC, Canada, 17–22 June 2012. [Google Scholar]
  27. Boshkovska, E.; Ng, D.; Zlatanov, N.; Koelpin, A.; Schober, R. Robust Resource Allocation for MIMO Wireless Powered Communication Networks Based on a Non-Linear EH Model. IEEE Trans. Commun. 2017, 65, 1984–1999. [Google Scholar] [CrossRef] [Green Version]
  28. Nasir, A.; Zhou, X.; Durrani, S.; Kennedy, R. Relaying Protocols for Wireless Energy Harvesting and Information Processing. IEEE Trans. Wirel. Commun. 2013, 12, 3622–3636. [Google Scholar] [CrossRef] [Green Version]
  29. Zheng, T.; Wang, H.; Liu, F.; Lee, M. Outage Constrained Secrecy Throughput Maximization for DF Relay Networks. IEEE Trans. Commun. 2015, 63, 1741–1755. [Google Scholar] [CrossRef]
  30. Murray, G.; Edward, W. A Table of Integrals of the Exponential Integral. NIST J. Res. 1969, 73B, 191–210. [Google Scholar]
Figure 1. (a) The system model and (b) The power-splitting policy at R.
Figure 1. (a) The system model and (b) The power-splitting policy at R.
Sensors 20 01047 g001
Figure 2. (a) The received power at the harvester, (b) the LEH and NLEH models, (c) the harvested energy and (d) the SaT scheme with NLEH.
Figure 2. (a) The received power at the harvester, (b) the LEH and NLEH models, (c) the harvested energy and (d) the SaT scheme with NLEH.
Sensors 20 01047 g002
Figure 3. The effect of R th x 1 and R th x 2 on (a) SOPAll for the STPL scheme, (b) SOPAll for the MTPL scheme, and (c) SOPON for both STPL and MTPL schemes.
Figure 3. The effect of R th x 1 and R th x 2 on (a) SOPAll for the STPL scheme, (b) SOPAll for the MTPL scheme, and (c) SOPON for both STPL and MTPL schemes.
Sensors 20 01047 g003
Figure 4. The effect of NOMA power-allocation factors on (a) the SOP for the STPL scheme, (b) the SOP for the MTPL scheme, (c) the AASR for the STPL scheme, and (d) the AASR for the MTPL scheme. Other parameters: J(1.5,−3).
Figure 4. The effect of NOMA power-allocation factors on (a) the SOP for the STPL scheme, (b) the SOP for the MTPL scheme, (c) the AASR for the STPL scheme, and (d) the AASR for the MTPL scheme. Other parameters: J(1.5,−3).
Sensors 20 01047 g004
Figure 5. The effect of θ on (a) the SOP and (b) the AASR. Other parameters: PS = PJ = 27 dBm, a1 = b1 = 0.1, ( R th x 1 , R th x 2 ) = (1, 0.6) bits/sec/Hz.
Figure 5. The effect of θ on (a) the SOP and (b) the AASR. Other parameters: PS = PJ = 27 dBm, a1 = b1 = 0.1, ( R th x 1 , R th x 2 ) = (1, 0.6) bits/sec/Hz.
Sensors 20 01047 g005
Figure 6. The effect of the jammer’s location on (a) the SOP for the STPL scheme, (b) the SOP for the MTPL scheme, (c) the AASR for the STPL scheme, and (d) the AASR for the MTPL scheme.
Figure 6. The effect of the jammer’s location on (a) the SOP for the STPL scheme, (b) the SOP for the MTPL scheme, (c) the AASR for the STPL scheme, and (d) the AASR for the MTPL scheme.
Sensors 20 01047 g006
Figure 7. The trade-off between the SOP and the ASE for (a) G R 0 mW and (b) G R 5 mW ; and the trade-off between the AASR and the ASE for (c) G R 0 mW and (d) G R 5 mW .
Figure 7. The trade-off between the SOP and the ASE for (a) G R 0 mW and (b) G R 5 mW ; and the trade-off between the AASR and the ASE for (c) G R 0 mW and (d) G R 5 mW .
Sensors 20 01047 g007
Table 1. The list of parameters μ k , 1 k 11 .
Table 1. The list of parameters μ k , 1 k 11 .
Parameters μ 1 μ 4 Parameters μ 5 μ 8 Parameters μ 9 μ 11
μ 1 = 2 a 1 θ P s 1 + θ N 0 μ 5 = λ J E P R , n λ R E P J μ 9 = λ R U 1 2 2 R th x 1 N 0 P R
μ 2 = 2 a 2 θ P s 1 + θ N 0 μ 6 = 2 2 R th x 2 b 1 1 , μ 6 1 , b 2 b 1 μ 10 = b 2 μ 2 1
μ 3 = λ S R P J λ J R P S μ 7 = 1 b 2 μ 6 b 1 = 2 2 R th x 2 b 1 b 1 1 2 2 R th x 2 μ 11 = 1 μ 2 b 1 μ 2 1
μ 4 = 2 2 R th x 2 1 μ 1 max 1 , a 1 1 a 1 2 2 R th x 2 μ 8 = exp λ R U 1 N 0 ( 1 2 2 R th x 1 ) b 1 P R
Table 2. The analytical expressions for P b ( n ) , P c ( n ) and P d ( n )
Table 2. The analytical expressions for P b ( n ) , P c ( n ) and P d ( n )
FunctionsAnalytical ExpressionsCases
P b ( n ) = F X ( P n + 1 ) F X ( P n ) P c ( n ) .
P c ( n ) = 0 , 1 a 1 2 2 R th x 2 1 > a 1 2 2 R th x 2 , P n + 1 μ 4 P S . exp λ S R μ 4 + λ J R P S μ 3 exp λ S R P n + 1 P S λ S R P J μ 3 exp λ J R P n + 1 + μ 4 μ 3 P J , 1 > a 1 2 2 R th x 2 , P n μ 4 P S < P n + 1 , μ 3 0 . exp λ S R μ 4 λ S R P n + 1 μ 4 P s P J exp λ S R P n + 1 P S exp λ J R P n + 1 + μ 4 μ 3 P J , 1 > a 1 2 2 R th x 2 , P n μ 4 P S < P n + 1 , μ 3 = 0 . λ S R P J μ 3 exp μ 4 μ 3 P J exp λ J R P n P J exp λ 4 P n + 1 P J + λ J R P S μ 3 exp λ S R P n + 1 P S exp λ S R P n P S , 1 > a 1 2 2 R th x 2 , μ 4 P S < P n , μ 3 0 . exp μ 4 μ 3 P J exp λ J R P , n P J exp λ J R P n + 1 P J + λ J R exp λ S R P n P S P n μ 4 P S P J λ J R exp λ S R P n + 1 P s P n + 1 μ 4 P s P J , 1 > a 1 2 2 R th x 2 , μ 4 P S < P n , μ 3 = 0 .
P d ( n ) = 1 , μ 6 ( 1 , 0 ] . 1 μ 8 + μ 5 μ 8 exp μ 7 μ 9 μ 7 + μ 5 + μ 5 μ 8 μ 9 exp μ 5 μ 9 × E i μ 7 μ 9 μ 5 μ 9 E i μ 5 μ 9 , μ 6 0 , b 2 b 1 .
Table 3. The analytical expressions for C b ( n ) and C a 1 ( P ) .
Table 3. The analytical expressions for C b ( n ) and C a 1 ( P ) .
FunctionsAnalytical ExpressionsCases
C b ( n ) = 1 ln 4 μ 5 b 1 1 exp λ R U 1 N 0 b 1 P R , n E i λ R U 1 N 0 b 1 P R , n b 1 μ 5 exp μ 5 λ R U 1 N 0 P R , n E i μ 5 λ R U 1 N 0 P R , n .
C a 1 ( P ) = 1 ln ( 4 ) exp λ S R μ 1 E i λ S R μ 1 + exp λ S R μ 1 E i λ S R P P S λ S R μ 1 + λ J R P S μ 3 exp λ S R P P s ln 1 + μ 1 P P s + λ S R P J μ 3 exp μ 3 μ 1 P J λ J R P P J E i μ 3 μ 1 P J E i μ 3 P J P P S + 1 μ 1 , μ 3 0 . 1 ln ( 4 ) exp λ S R μ 1 E i λ S R P P S λ S R μ 1 exp λ S R μ 1 E i λ S R μ 1 + λ S R exp λ S R P P s P S P λ S R μ 1 + λ S R P P S + 1 exp λ S R P P s ln 1 + μ 1 P P S , μ 3 = 0 .

Share and Cite

MDPI and ACS Style

Tuan, V.P.; Hong, I.-P. Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming. Sensors 2020, 20, 1047. https://doi.org/10.3390/s20041047

AMA Style

Tuan VP, Hong I-P. Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming. Sensors. 2020; 20(4):1047. https://doi.org/10.3390/s20041047

Chicago/Turabian Style

Tuan, Van Phu, and Ic-Pyo Hong. 2020. "Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming" Sensors 20, no. 4: 1047. https://doi.org/10.3390/s20041047

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop