Next Article in Journal
The Influence of Virtual Character Design on Emotional Engagement in Immersive Virtual Reality: The Case of Feelings of Being
Next Article in Special Issue
Design of Regenerating Code Based on Security Level in Cloud Storage System
Previous Article in Journal
Research on Adaptive Cruise Systems Based on Adjacent Vehicle Trajectory Prediction
Previous Article in Special Issue
Joint Optimization of Trajectory and Discrete Reflection Coefficients for UAV-Aided Backscatter Communication System with NOMA
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Sensing and Secure NOMA-Assisted mMTC Wireless Networks

by
Urvashi Chaudhary
1,
Mohammad Furqan Ali
1,
Samikkannu Rajkumar
2 and
Dushantha Nalin K. Jayakody
1,2,3,*
1
School of Computer Science and Robotics, National Research Tomsk Polytechnic University, 634034 Tomsk, Russia
2
Centre for Telecommunication Research, School of Engineering, Sri Lanka Technological Campus, Padukka 10500, Sri Lanka
3
Centro de Investigaçä em Tecnologias-Autónoma TechLab, Universidade Autónoma de Lisboa, 1169-023 Lisboa, Portugal
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(10), 2322; https://doi.org/10.3390/electronics12102322
Submission received: 4 November 2022 / Revised: 2 December 2022 / Accepted: 2 December 2022 / Published: 21 May 2023

Abstract

:
Throughout this study, a novel network model for massive machine-type communications (mMTC) is proposed using a compressive sensing (CS) algorithm and a non-orthogonal multiple access (NOMA) scheme. Further, physical-layer security (PLS) is applied in this network to provide secure communication. We first assume that all the legitimate nodes operate in full-duplex mode; then, an artificial noise (AN) signal is emitted while receiving the signal from the head node to confuse eavesdroppers (Eve). A convex optimization tool is used to detect the active number of nodes in the proposed network using a sparsity-aware maximum a posteriori (S-MAP) detection algorithm. The sensing-aided secrecy sum rate of the proposed network is analyzed and compared with the sum rate of the network without sensing, and the closed-form expression of the secrecy outage probability of the proposed mMTC network is derived. Finally, our numerical results demonstrate the impact of an active sensing algorithm in the proposed mMTC network; improvement in the secrecy outage of the proposed network is achieved through increasing the distance of the Eve node.

1. Introduction

The perspective of fifth generation and beyond (5GB) networking technology, including the sixth generation (6G), is expected to fulfill the numerous shortcomings of existing wireless networks by providing mass connection of nodes simultaneously, enhancement of reliability, and reducing network unavailability [1]. Most significantly, 6G is anticipated to provide ultra-reliable communication, ultra-low latency, and wide accessibility. Recently, smart devices have enabled next-generation wireless networks to play an ample role in real-time data encryption/decryption, leading to further heavy data traffic flow. Therefore, the current wireless networks may not be completely supported by the available technologies. To cope with the related issues, the 6G wireless network is proposed with new spectrum and energy-efficient transmission techniques. However, multiple access scheme (MAS) collaborate in the development of large scale wireless networks [2]. Additionally, a potential MAS can be integrated as a non-orthogonal multiple access (NOMA) scheme. It is noteworthy that NOMA has been proposed for its high spectrum efficiency along with massive connectivity in 5G wireless networks. It serves the multiple connectivity of users within the same network with respect to time and frequency variation. At a glance, power-domain NOMA (PD-NOMA) is a subclass of NOMA schemes which allows users to convey their information using varying power levels and in superposition coding terminology. Similarly, the successive interference cancellation (SIC) technique is applied at the receiver end for decoding of signals in NOMA-based communications networks.
Indeed, power distribution scheduling enhances the performance of a full NOMA-based wireless network [3,4]. Moreover, the base station (BS) transmits all users’ information through the same channel in a NOMA scenario. Further, the position of each user is identified by the effective channel gain in the queue. NOMA facilitates and assign a higher fraction of power to the users having weak signal strength [5]. Cooperative communication is an efficient way to enhance capacity while improving transmission reliability and spatial diversity. Users or dedicated relays cooperate among themselves to improve the transmission reliability of the system [6]. Further, to improve the spectrum efficiency and system throughput, the authors in [7] have investigated an amplify-and-forward (AF) relay-based NOMA network by implying Nakagami-m fading channels. Most recently, similar work has been proposed in [8], where the authors use a physical layer network coding (PLNC)-based NOMA wireless network to improve spectral and temporal efficiency.
Intermittent and sporadic user activity in wireless communication is a major characteristic of massive machine-type communications (mMTC) networks, known as machine-to-machine (M2M) communication. Originally, the concept of an mMTC was proposed by the International Telecommunications Union (ITU) to provide large-scale connectivity services through cellular networks for massive machine-type communications devices. As part of new radio technology, the deployment of NOMA in mMTC has attracted the attention of industrial communities [9]. Further, mMTC has been viewed as a promising technology for innovation with numerous smart sensors immersed in machine learning techniques and intelligence [10]. When an mMTC operates with a large number of devices, it mainly faces the issues of scalability, modeling, coverage, and congestion. Due to massive signaling overhead, NOMA schemes have been used to overcome such problems and improve massive access.
In an mMTC system, a limited number of users are expected to transmit short data packets to the Access Point (AP); in each time slot, a large number of user devices are registered to an AP [11]. To obtain massive access, an mMTC network is mainly focused on the uplink NOMA systems, in which a small number of active users can randomly transmit data at any time slot without any trembling process [12]. Therefore, the multiple distribution of active users inspires the formulation of the multi-user detection problem under the compressive sensing (CS) framework. The CS is a novel sampling paradigm used to reconstruct a sparse physical signal that samples signals in a much more efficient way than the established Nyquist sampling theorem [13]. As a result, the CS is a more suitable method for detecting the active nodes in a particular region of an mMTC wireless network.
In contrast, the field of physical layer security (PLS) has been introduced to achieve a secure communication platform, which implies critical issues over wireless networks in different scenarios [14]. The PLS was proposed by Wyner to improve the security of the network as an alternative approach to the cryptographic techniques [15]. The advantage of PLS is that it protects information by exploiting intrinsic characteristics of the communications medium, thereby promising wireless security [16]. In existing works, authors [17,18] have considered the PLS for NOMA-based networks for single-antenna and multiple-antenna networks under the stochastic geometry concept. PLS can be applicable considering the physical layer properties of the communication system, such as noise, interference, and the time-varying property of fading channels [19]. Recently, a NOMA-based uplink mMTC network model was developed in [20] and its performance was studied. The basic idea behind PLS is to reduce the the signal characteristics of the intended receiver for an eavesdropper (hereinafter referred to as Eve) [21]. Due to the broadcast nature of wireless networks, transmission between authorised users can easily be overheard by Eve for interception. It is challenging to deploy an active Eve or multiple Eves within heterogeneous networks [22]. A comprehensive review of PLS techniques for internet of things (IoTs) applications is discussed in [23], followed by a survey of existing PLS techniques and the characteristics of IoT.

1.1. Motivation

Motivated by the existing research, here we propose a novel mMTC network with a view to 6G networking system. As the existing research works have demonstrated that many network nodes are in idle condition, it is necessary to develop a low-power-consumption wireless network that can provide the high capacity needed for massive connectivity. Throughout this study, we propose a system model for massive connectivity within the 6G wireless networking approach. More specifically, we focus on constructing a suitable algorithm for sensing the active nodes in the given region of the mMTC networks, which can greatly improve overall network performance. In fact, mMTC is one of the major requirements of a 6G wireless network that can fulfill real-time data streaming applications in fields such as health care, industrial monitoring, traffic control, agriculture, etc. In another direction, providing secure communication in the mMTC networks, such as for command message passing in military contexts or control messages in industry, is another major concern. Therefore, in this a new network model for mMTC a network is proposed using PLS and CS algorithms to enhance sensing and secure communications.

1.2. Contributions

The main contributions of this paper can be summarized as follows:
  • Throughout this study, we propose novel massive connectivity of machine-type communication system towards the 6G networking system utilizing the PLS.
  • In an mMTC, the detection of inactive/active nodes is challenging; therefore, a new approach for detection is investigated in this study using the CS algorithm.
  • Throughout this study, analytical expressions are provided and then verified by simulation results, and the end-to-end (E2E) performance metrics of the proposed system, such as secrecy and outage probability, are derived in detail.
The rest of the paper is organized as follows. In Section 2, the system model of the proposed network is discussed and the CS algorithm is explained. In Section 3, the performance aspects of the proposed mMTC network, such as the sensing-aided sum rate and secrecy outage probability, are explained. In Section 4, our numerical analysis is discussed, and lastly we provide concluding remarks in Section 5.

2. System Model

In the proposed system model, we consider an mMTC network in which N + 1 number of nodes are distributed randomly in the given region, as in Figure 1. Among the N + 1 nodes, only one node acts as a head node (the blue-colored node), and serves the remaining N nodes using a NOMA scheme. The geometrical model of the region is formulated as a circular region, and based on the distances of the nodes, a set of nodes is located in the inner circular region (near users) and the remaining nodes distributed in the outer circular region (far users). Because the number of nodes in a particular region is dynamic, it can be modeled as an homogeneous Poisson point process (HPPP) [24]. In this mMTC model, the radii of the inner and outer circular regions are denoted by n r and f r , respectively. In practical mMTC networks, there is a security issue that frequently arises due to unauthorized nodes, which are indicated as eavesdroppers (Eves) in this proposed model. An Eve node wants to trace confidential messages from the legitimate nodes. Hence, all nodes are designed in full-duplex mode, such that they always generate artificial noise (AN) while receiving message from the head node, which is intended to confuse any Eve nodes.
In existing mMTC networks, several of the nodes are in inactive condition due to certain practical issues. In such a scenario, random allocation of power to all users is not a favorable approach. Therefore, it is necessary to develop a suitable algorithm to sense all the active nodes in mMTC networks in order to enhance network performance. In this work, a single measurement vector-based CS algorithm [25] is used to sense active nodes.

2.1. Active Nodes Sensing

We assume that each node in the mMTC network is active with a probability of p a c t < < 1 and that the head node identifies the activity of each node by simply checking whether or not a particular node has any useful information. Further, it is assumed that at any time only few nodes are active and that the head node receive the signals from both the active and inactive nodes; hence, the network can be modeled as a sparse vector. Thus, the CS algorithm represents a suitable method for detecting the sparse signals. The i th node ( i 1 , , N ) transmits its message frame to the head node using binary phase shift keying (BPSK) modulation scheme, which is denoted as x i . Each frame consists of M BPSK symbols x i = ( s i , 1 , , s i , M ) . Note that the proposed mMTC network is developed for low power and low data rate communications, such as e-healthcare, industrial automation, home automation, etc.; hence, BPSK modulation is sufficient to transmit control messages. The messages received from all N nodes can be represented as an ( NM × 1 ) sparse vector, as provided by x = ( x 1 , , x N ) T , where x i = 0 if the i th node is inactive. Therefore, the received signal at the head node is
y = G x + z ,
where G is a measurement matrix ( N × NM ) designed using ( N × NM ) channel matrix H in which N = qM + max i ( L i 1 + τ i ) , where L i is the number of channel taps in the i th node, τ is the relative delay and ( NM × NM ) spreading matrix S with spreading factor q [26] of the i th node, and z is additive white Gaussian noise (AWGN) with zero mean and variance σ 2 . Using the sparsity-aware maximum a posteriori (S-MAP) detection algorithm [25], the active nodes are identified as follows:
x ˜ = min x 1 2 y G x 2 2 + μ x 1 1
where μ = ln 1 p a c t p a c t / 2 , p a c t < < 1 is the active devices probability, x ˜ is the estimated sparse vector, and its sum of non-zero elements provides the total number of active nodes, which is denoted as N a c t . By sensing the indices of the non-zero elements of the sparse vector, the head node allocates power to all the active nodes according to the NOMA scheme, thereby enhancing the performance of the mMTC network.
To improve active device detection in mMTC networks, it is necessary to analyze the active device detection error at the receiver. The normalized average mean square error ζ a c t of active device detection can be calculated as follows:
ζ a c t = c = 1 M x x ˜ 2 2 i = 1 M x 2 2 ,
where M is the number of iterations. It is noteworthy that active device detection mainly depends on parameters such as the percentage of active devices κ , spreading factor q, and signal-to-noise ratio (SNR). In addition, the normalized average mean square error is helpful in analysing device detection via the S-MAP algorithm; device detection improvement can be achieved by increasing the SNR values, which is discussed in detail in Section 4.

2.2. Sensing-Aided Downlink Transmission

By applying the S-MAP algorithm, the head node is able to determine the status of the nodes. Thus, the head node allocates power only to active nodes based on the channel conditions. The channel gains are arranged in ascending order ( | h 1 | 2 < | h 2 | 2 < < | h N 1 | 2 < | h N | 2 ), and power allocation is performed correspondingly ( P 1 > P 2 > > P N 1 > P N ). Note that an mMTC networks contains a large number of nodes; hence, allocating power after dividing the nodes into a number of groups is preferable, and is the approach considered in the rest of this work. Using the NOMA scheme, the head node superimposes all active node signals as x = i = 1 T α i P h x i , where P t is the head node’s transmitting power. Here, the power allocation coefficient α i must satisfy the condition α 1 > α 2 , , α N 1 > α N and α 1 + α 2 + + α N = 1.
For downlink transmission, the head node transmits the NOMA signal to all the nodes simultaneously. Because each node adopts full-duplex mode, it can emit the AN signal while receiving the signal from the head node. In addition, each node suffers from loop interference (LI) due to full-duplex operation. Here, let the i th node act as a near node, n and let the i + 1 th node act as a far node, f . Because the transmit signals are in the form of frames, and because each frame consists of M symbols, the k th ( 1 , , M ) NOMA symbol can be written as s k = i = 1 T s i , k . Therefore, the k th ( 1 , , M ) received symbol at the near node n can be written as
y h , n k = h h , n s k + h LI s LI + z h , n k ,
where h h , n = h h , n 1 + d h , n α is the channel coefficient between the head node and near node and subscript h denote the head node. Furthermore, a channel modeled using small- and large-scale fading and its channel gain follow the exponential distribution, with mean 0 and variance υ n . Additionally, the parameters are defined as the follows: the distance from the head node to the near node is d h , n , the path loss exponent is α , the channel coefficient of the LI is h LI , which is exponentially distributed with mean 0 and variance υ LI , and the AWGN is z n , k k , and is defined using CN ( 0 , σ 2 ) . The received signal from the far node can be calculated in a similar way.
At the same time, Eve traces the signal from the head node; the signal received from Eve can be expressed as
y h , e k = h h , e s k + h n , e s AN + z h , e k ,
where h h , e = h h , e 1 + d h , e α is the channel coefficient between the head node and Eve and s AN is the AN signal, which is generated using a pseudo-noise (PN) sequence. Its channel gain follows the exponential distribution, with mean 0 and variance υ e . However, here d h , e is the distance from the head node to Eve, h n , e is the channel coefficient between the near node and Eve, and z h , e k is the AWGN at Eve. Note that the AN signal is received from the far node with channel a coefficient of h f , e .

3. Coverage, Capacity, and Outage Analysis of Proposed mMTC

3.1. Uplink Coverage Probability of the mMTC

The proposed mMTC network is designed for short-distance communications; hence, the propagation model in the uplink is designed using a stretched exponential path loss (SEPL) model [27]. In this SEPL model, multipath fading is modeled by α μ distribution, where α is the average multiplicative attenuation, μ is the integer constant, and the transmit power attenuation is modeled as e α r β , where r is the distance, r β is the number of obstructions in the path, and β is the model parameter. Further, the maximum power needed at a distance r m = l n 1 b e t a P m P o 1 α to avoid outage of an mMTC node is P m . Therefore, the cumulative distribution function (CDF) of this channel is modeled by
F X ( x ) = γ ( μ , μ x α / 2 ) Γ ( μ ) ,
where Γ ( . ) is the Gamma function and γ ( . , . ) is the lower incomplete gamma function. The signal-to-interference plus noise (SINR) of the i th mMTC device at the base station (BS) is expressed as
γ U L i = P i h i n = 1 , n i N P n h n e α r n β + σ 2 ,
The uplink coverage probability of the proposed mMTC network is provided by
P C = 1 E γ ( μ , μ x α / 2 ) Γ ( μ ) ,
In contrast, using γ ( μ , υ ) = ( μ 1 ) ! [ 1 e υ e μ 1 ( υ ) ] and Γ ( μ ) = ( μ 1 ) ! it can be simplified as
P C = 1 E ( μ 1 ) ! [ 1 e υ e μ 1 ( υ ) ] ( μ 1 ) ! ,
Further, (9) can be simplified to obtain (10):
P C = E e υ e μ 1 ( υ ) ,
where υ = ( 2 R 1 ) ( n = 1 , n i N P n h n e α r n β ) P i α / 2 and e μ ( x ) = 1 + x + x 2 / 2 ! + + x μ / μ ! Here, let α = 2 and μ = 1 ; then, the coverage probability of the proposed mMTC network can be simplified as follows:
P C = E e ( ( 2 R 1 ) P o ) ( n = 1 , n i N P n h n e α r n β + σ 2 ) ,
Expression (11) is a complex equation; therefore, by splitting the exponential term into two parts it becomes
P C = e 2 R 1 S N R E e 2 R 1 P o ( n = 1 , n i N P n h n e α r n β ) ,
By taking s = ( 2 R 1 ) / P o , the coverage probability expression can be simplified using the Laplace transform; thus, P C can be written as
P C = e 2 R 1 S N R L I ( s ) ,
where L I ( s ) is the Laplace transform of the interference term. For further integration, (13) can be written as follows:
L I ( s ) = E ( e s n = 1 , n i N P n h n e α r n β 𝟙 ( P n e α r n β < P o ) ) ,
By implying the exponential term, (14) can be modifies as follows:
L I ( s ) = n = 1 , n i N E ( e s P n h n e α r n β 𝟙 ( P n e α r n β < P o ) ) ,
With the Laplace transformation L I ( s ) using [28], the L I ( s ) of the coverage probability can be simplified as follows:
L I ( s ) = e 2 π ρ m λ m N R E l n 1 b e t a P m P o 1 α ( 1 e s P n h n e α r n β ) r n d r n ,
where ρ m is the active device probability, λ m is the increasing density of active devices, and N R is the number of resource blocks. By applying the Laplace transform to e s P n h n e α r n β , we obtain the expression in exponential form, as follows:
L I ( s ) = e 2 π ρ m λ m N R E l n 1 b e t a P m P o 1 α ( 1 1 1 + s P n e α r n β ) r n d r n ,
Let y = s P n e α r n β and L I ( s ) be the coverage probability, which is integrated as follows:
L I ( s ) = e 2 π ρ m λ m β α 2 / β N R E 0 s P o l n ( s P o y ) ( 2 β 1 ) y + 1 d y ,
Setting s = ( 2 R 1 ) / P o and β = 2 , the coverage probability of the proposed mMTC networks is determined as follows:
P C = e ( 2 R 1 ) S N R e 2 π ρ m λ m β α 2 / β N R l n ( 2 R ) ,

3.2. Sensing-Aided Sum Rate

Because there are N nodes and each node transmits M symbols, the total number of symbols is MN. In the downlink, each node receives a NOMA signal, which consist of MN symbols, and decodes it on a symbol-by-symbol basis using an SIC operation. In downlink NOMA, the near node applies SIC and the far node directly decodes its message while treating the near node message as interference. The near node first decodes the far node’s message, then it removes the decoded far node message after decoding its own message. The signal-to-interference plus noise ratio (SINR) of a far node, f for decoding a near node, n in the presence of LI can be written as
Γ f n = | h h , n | 2 α f P h σ 2 + | h h , n | 2 q = 1 q < f α q P h + | h LI | 2 P LI ,
where P L I = q = 1 q = N α q P h is the LI power. For the case of two nodes, this can be further simplified as
Γ f n = | h h , n | 2 α f P h σ 2 + | h h , n | 2 α n P h + | h LI | 2 P L I .
After omitting the far node message, the near node decodes its own message as follows:
Γ n = | h h , n | 2 α n P h σ 2 + | h LI | 2 P LI .
Similarly, the SINR of the far node can be written as
Γ f = | h h , f | 2 α f P h σ 2 + | h h , f | 2 α n P h + | h LI | 2 P LI .
Eve receive NOMA messages from the legitimate nodes as well; therefore, the SINR of the Eve node can be written as
Γ n , e = | h h , e | 2 α n P h σ 2 + | h n , e | 2 P AN ,
Γ f , e = | h h , e | 2 α f P h σ 2 + | h h , e | 2 α n P h + | h f , e | 2 P AN .
Using the above SINR expressions, the secrecy sum rate of the proposed mMTC network can be calculated. The secrecy rate of the near node can be expressed as
C s , n = [ C n C e , n ] + ; C s , f = [ C f C e , f ] + ,
where [ a ] + indicates the m a x ( 0 , a ) , C n and C f are the near node and far node capacities, respectively, and C e , n and C e , f are the near Eve node and far Eve node capacities, respectively. The mathematical expressions for the the secrecy rates C n and C f are provided by
C n = l o g 1 + | h h , n | 2 α n P h σ 2 + | h LI | 2 P LI ,
C f = l o g 1 + | h h , f | 2 α f P h σ 2 + | h h , f | 2 α n P h + | h LI | 2 P LI ,
Similarly, the rates of the C n , e and C f , e are written as
C n , e = l o g 1 + | h h , e | 2 α n P h σ 2 + | h n , e | 2 P AN .
C f , e = l o g 1 + | h h , e | 2 α f P h σ 2 + | h h , e | 2 α n P h + | h f , e | 2 P AN .
Without sensing the active nodes, the total transmit power P h of the head node is shared among N legitimate nodes using the NOMA scheme P h / N . Thus, the performance of the mMTC network falls due to power being allocated to inactive nodes. However, when using the sensing algorithm, the head node shares power only among active nodes P h / T , which significantly improves the secrecy sum rate of the proposed mMTC network.
Finally, the secrecy sum rate of the proposed NOMA-based mMTC network can be expressed as
C m t c = q = 1 q = T C s , q .

3.3. Secrecy Outage Probability

In this section, the secrecy outage probability of the near node is discussed. However, it is easy to extend this analysis to the far node secrecy outage. The secrecy outage probability of the near node can be written as
P s , out ( R ) = P r ( [ C n C n , e ] < R ) ,
where R is the threshold data rate. Substituting C n and C n , e , the secrecy outage becomes
P s , out ( R ) = P r l o g 1 + Γ n 1 + Γ n , e < R ,
By rearranging (18), the secrecy outage probability of the near node is
P s , out ( R ) = 0 P r Γ n < 2 R ( 1 + Γ n , e ) 1 f Y ( y ) d y ,
Here, Γ n and Γ n , e can be modelled as random variables X and Y, allowing the secrecy outage to be simplified as follows:
P s , out ( R ) = 0 2 R ( 1 + y ) 1 f X ( x ) f Y ( y ) d x d y ,
where f X ( x ) and f Y ( y ) denote the probability density function (PDF) of Γ n and Γ e , n , respectively. After integration and simplification, the secrecy outage probability of the near node can determined as
P s , out ( R ) = π 2 N i = 1 N Ψ i π 2 N i = 1 N Ψ i l n e χ i 2 α i 2 l h , e ψ i R t h exp ψ i ( R t h 1 ) α i S N R k = 1 K β i ( x k + η 1 ) 2 + ( x k + η 2 ) π 2 N i = 1 N Ψ i l n , e l h , e α i I N R [ κ l h . e α i l n , e ψ i R t h ] ( exp ( η 1 ) ) Ei ( η 1 ) + exp ( η 2 ) Ei ( η 2 ) ,
where Ei ( . ) is the exponential integral function, κ = ( v L I ψ i R t h α i ψ i v L I ) ,
χ i = S N R × l h , e + I N R × ψ i R t h α i S N R × I N R , η 1 = α i l n , e l h , e Γ i , η 2 = ψ i R t h + α i ψ i ψ i R t h Γ i , β i = ( K ! ) 2 [ L i ( x i ) ] 2 x i ,
L K ( x ) = e x d k d x K ( x K e x ) and x i is the zero point of L K ( x ) .
Proof. 
See Appendix A. □

3.4. Outage Probability without Eve

Without Eve, the outage probability of the far node can be expressed as
P out far ( R ) = P r | h h , f | 2 α f P h σ 2 + | h h , f | 2 α n P h < R .
Let ω 1 = α f P h σ 2 , ω 2 = α n P h σ 2 , then the outage probability of the far node can be simplified as [8].
P out far ( R ) = P r | h h , f | 2 ( ω 1 ω 1 γ t h ) < R t h ,
Let | h h , f | 2 = x ; then, it becomes
P out far ( R ) = R t h ω 1 ω 1 R t h f X ( x ) d x ,
Because x follows an exponential distribution, the outage probability of the far node without Eve can be determined as follows:
P out far ( R ) = 1 e R t h υ ( ω 1 ω 1 R t h ) .

4. Results and Discussion

In this section, the secrecy sum rate and secrecy outage probability of the proposed NOMA-based mMTC network is discussed. In addition, active node detection in the mMTC network using the CS algorithm is described, as well as the use of the convex optimization toolbox ‘ c v x ’ to estimate the sparsity of active nodes. Matlab software was used for all the simulations of performance metrics, including the coverage probability, sum rate, outage probability, and secrecy outage probability of the proposed mMTC network, and the legitimate node channel variance was fixed to 1 for all the simulations. The detailed simulation parameters are listed in Table 1.
The normalized average mean square error of active device detection is shown in Figure 2a. A convex optimization tool is used to detect the active devices in the proposed mMTC network; the active devices are then modeled as a sparse vector. From this figure, it can be observed that the mean square error of active device detection increases when the percentage of active devices increases. Further, the performance of active device detection improves when the SNR values increase. Figure 2b shows the comparison of the total number of active devices detected in the proposed mMTC wireless networks. In this figure, it can be noted that even though the average mean square error increases with the percentage of active devices, the total number of active devices detected increases as well.
Figure 3a shows the uplink coverage probability of the proposed mMTC wireless network. In this simulation, the following parameters are considered: active device probability ρ is varied as 0.12, 0.13, and 0.14, SNR = −130 dBW, noise variance = −151.45 dBW, data rate R = 2 b/s/Hz, β = 1 / 3 , increasing density of active devices λ m = 500 , number of resource blocks N R = 100 , path loss model parameter α = 1.1 . From this figure, it can be observed that the coverage probability of the proposed networked is reduced when increasing the active device probability. Therefore, better coverage of the proposed mMTC network can be achieved by increasing the active device probability. Similarly, the coverage probability of the proposed mMTC network is analyzed for various N R values. In this figure, coverage of the proposed network is improved when increasing the number of resource blocks.
Figure 4a shows the sum rate of the proposed NOMA-based mMTC network without Eve. In this simulation, the number of legitimate nodes is 40 and the LI power is −10 dBW. Active node detection is performed using the convex optimization toolbox. The sum rate of the proposed network is compared with the sensing-aided sum rate and perfect SIC-based sum rate. It can be observed that the active sensing algorithm is not effective when the number of nodes is low. However, the proposed mMTC network achieves significant improvement thanks to the active sensing algorithm as the number of nodes increases. Furthermore, it can be observed that, with perfect SIC and the active sensing approach, the sum rate of the proposed network is even better than the sum rate with sensing. Therefore, it can be concluded that the active node detecting approach plays a vital role in the mMTC network, enhancing overall network performance.
The secrecy sum rate of the proposed NOMA-based mMTC network is shown in Figure 4b. The number of legitimate nodes is 40, and AN and LI power are considered as −10 dBW. The secrecy sum rate is estimated by taking the sum rate difference between legitimate nodes and Eve nodes. The sum rate is compared with and without the sensing algorithm and perfect SIC. From this figure, it can be noted that the active sensing algorithm is effective in the proposed mMTC network even with a lower number of nodes. Furthermore, the sum rate is significantly increased when the number of nodes in the proposed network increases. However, with the presence of Eve, the sum rate of the proposed mMTC network is low compared to the network without Eve. For instance, with 30 nodes the secrecy sum rate with sensing is around 5 b/s/Hz, whereas without Eve the sum rate is 13 b/s/Hz. This makes the effect of the Eve node in the mMTC network very evident; hence, designers ought to change the configuration of the network to obtain high quality of service even when Eve nodes ar present.
Figure 5a shows the outage probability of the proposed mMTC network. In this simulation, the presence of Eve is omitted; hence, LI and AN power are not considered, and other parameters, such as the distance of the far node d h , f = 6 m, distance of the near node d h , n = 4 m, and path loss exponent γ = 2 are used. The analytical results are validated using the presented simulation results. The outage probability of the far node and near node are compared using the rates R = 1 b/s/Hz and R = 0.5 b/s/Hz. At the target outage level of 10 2 , the near node needs 25 dBW SNR, whereas far node requires 28 dBW SNR. For a threshold data rate of R = 0.5 b/s/Hz, this indicates that an additional 3 dBW SNR is needed for the far node.
The secrecy outage performance of the proposed mMTC network is shown in Figure 5b. In this simulation, the following parameters are used: distance of the near node d h , n = 2 m, distance from near node to Eve node d n , e = 3 m, Gauss–Lagurre Quadrature K = 10, path loss exponent γ = 2 , threshold data rate R = 1 b/s/Hz, and LI and AN power −10 dBW. From this figure, it can be observed that the outage performance of the proposed mMTC network is degraded due to the presence of LI and AN power. When the Eve node is near the head node, it receives a strong signal from the head node, degrading the network’s outage performance. Therefore, it is better to always keep Eve nodes a certain distance away from the head node to ensure better network performance.

5. Conclusions

In this study, a novel network model for an mMTC network is proposed using a NOMA scheme and the CS algorithm. Additionally, the PLS scheme is applied in this network to provide secure communication. Active node detection is performed in the proposed network using the S-MAP algorithm to improve the secrecy sum rate. Using the Laplace’ transform, the mathematical expression for the coverage probability of the proposed network is derived, along with a closed-form expression of the secrecy outage probability of the proposed mMTC network. Finally, our numerical results demonstrate that the active device sensing algorithm plays a vital role in the proposed mMTC network by enhancing the efficient utilization of resources. Finally, the secrecy outage performance ensures secure communication while maintaining the QoS of the active nodes in the network.

Author Contributions

Conceptualization, U.C., S.R.; methodology, U.C., S.R., M.F.A.; validation, U.C., S.R., M.F.A.; formal analysis, U.C., S.R., D.N.K.J.; writing—original draft preparation, U.C., S.R., M.F.A.; writing—review and editing, S.R., M.F.A., D.N.K.J.; visualization, D.N.K.J.; funding acquisition, D.N.K.J. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded, in part, by the CEU-Cooperativa de Ensino Universitário, Portugal and by the framework of Competitiveness Enhancement Program of the National Research Tomsk Polytechnic University, Russia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

This study did not report any data.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this study:
5GbFifth Generation and beyond
6GSixth Generation
ANArtificial Noise
AWGNAdditive White Gaussian Noise
BPSKBinary Phase-Shift Keying
BSBase Station
CDFCumulative Distribution Function
CSCompressive Sensing
EveEavesdropper
E2EEnd-to-End
HPPPHomogeneous Poisson Point Process
ITUInternational Telecommunications Union
LILoop Interference
mMTCmassive Machine-Type Communications
M2MMachine-to-Machine Communication
NOMANon-Orthogonal Multiple Access
PDFProbability Density Function
PNPseudo-Noise
PLNCPhysical Layer Network Coding
PLSPhysical Layer Security
RBResource Block
S-MAPSparsity-aware Maximum A Posteriori
SELPStretched Exponential Path Loss
SCSuperposition Coding
SICSuccessive Interference Cancellation
SINRSignal-to-Interference plus Noise Ratio
SNRSignal-to-Noise Ratio

Appendix A

Because the sets of nodes are distributed randomly in the inner circular region, which can be modeled using HPPP, in (20) we can write 2 R 1 f X ( x ) d x as
2 R 1 f X ( x ) d x = P r ( | h h , n | 2 α n P h σ 2 + | h LI | 2 P LI < R t h ) ,
where R t h = 2 R 1 is the threshold SNR. Let x = | h h , n | 2 , y 1 = | h LI | 2 ; then, (A1) can be written as
F X ( x ) = 0 P r x < R t h ( y 1 P L I + σ 2 ) α n P h × f Y 1 ( y 1 ) d y 1 .
Inside the inner circular regions, all node distances are random in nature; thus, d h , n = y 2 and its PDF can be written as
f Y 2 ( y 2 ) = 1 π n r 2 ,
The cumulative distributive function (CDF) of x can be written as follows [25]:
F X ( x ) = ( 1 e ( 1 + y 2 α ) x ) f Y 2 ( y 2 ) d y 2 .
By applying limits, this can be modified as follows:
F X ( x ) = 2 n r 2 0 n r ( 1 e ( 1 + y 2 α ) x ) f Y 2 ( y 2 ) d y 2 .
Using Gauss–Chebyshev quadrature [29], this can be further simplified as
F X ( x ) π 2 N i = 1 N ( 1 η i 2 ) ( η i + 1 ) ( 1 e ( 1 + ψ i ) x ) ,
where η i = c o s ( 2 i 1 2 N π ) and ψ i = 1 + ( n r 2 ( η i + 1 ) ) α . By substituting (A6) and f Y 1 ( y 1 ) in (A2), the outage probability of the near user can be computed as
F X ( x ) π 2 N i = 1 N Ψ i ( 1 α i α i + v L I ψ i x e ψ i R t h α i S N R ) ,
where S N R = P h σ 2 is the signal-to-noise ratio (SNR) of the head node. Recall that the secrecy outage probability of the near node is
P s , out ( R ) = 0 F X ( 2 R ( 1 + y ) 1 ) f Y ( y ) d y ,
where f Y ( y ) is the PDF of Eve’s SINR and Γ n , e , and can be determined as follows. First, compute the CDF of Eve; then, the PDF can be computed using the corresponding CDF. The CDF of Γ e , n can be expressed as
F Y ( y ) = P r | h h , e | 2 α n P h σ 2 + | h n , e | 2 P AN < R t h .
Note that α n = α i . Let y = | h h , e | 2 , y 3 = | h n , e | 2 ; then, the above can be rewritten as
F Y ( y ) = 0 P r y < R t h ( y 3 P A N + σ 2 ) α i P h f Y 3 ( y 3 ) d y 3 ,
Moreover, (A9) can be written in PDF form as
F Y ( y ) = 0 R t h 2 f Y ( y ) f Y 3 ( y 3 ) d y d y 3 ,
where R t h 2 = R t h ( y 3 P A N + σ 2 ) α i P h . After integrating and simplifying, the CDF of the Eve’s SINR Γ n , e can be computed as follows:
F Y ( y ) = 1 α i l e , n α i l n , e + R t h l h , e e R t h l h , e α i × I N R ,
where I N R = P L I σ 2 is the interference-to-noise ratio (INR) of the legitimate node. By integrating (A12), the PDF of Γ n , e can be determined as follows:
f Y ( y ) = α i l n , e l h , e ( α i l n , e + y l h , e ) 2 + l n , e l h , e I N R ( α i l n , e + y l h , e ) exp ( y l h , e α i I N R ) ,
where l n , e = 1 + d n , e α , l h , e = 1 + d h , e α . By substituting (A7) and (A13) into (A8), the secrecy outage probability of the near node is determined as follows:
p s , out ( R ) = π 2 N i = 1 N Ψ i 0 ( 1 α i α i + υ LI ψ i ( 2 R ( 1 + y ) 1 ) e ϕ i ( 2 R ( 1 + y ) 1 ) α i S N R ) α i l n , e l h , e ( α i l n , e + y l h , e ) 2 + l n , e l h , e I N R ( α i l n , e + y l h , e ) e y l h , e α i I N R d y .
The above expression in (A13) consists of four terms; hence, the secrecy outage probability can be rewritten as
p s , out ( R ) = G ( S 1 + S 2 + S 3 + S 4 ) ,
where G = π 2 N i = 1 N Ψ i . The parameters S 1 , S 2 , S 3 , and S 4 are determined as follows:
S 1 = 0 α i l n , e l h , e ( α i l n , e + y l h , e ) 2 e y l h , e α i I N R d y ,
S 2 = 0 l n , e l h , e I N R ( α i l n , e + y l h , e ) e y l h , e α i I N R d y ,
S 3 = 0 α i I N R ( α i l n , e + y l h , e ) + ( α i + υ L I ψ i R t h 3 ) e ψ i R t h 3 α i S N R e y l h , e α i I N R ,
where R t h 3 = ( 2 R ( 1 + y ) 1 ) .
S 4 = 0 α i 2 ( α i l n , e + y l h , e ) 2 + ( α i + υ L I ψ i R t h 3 ) e ψ i R t h 3 α i S N R e y l h , e α i I N R .
Using [30], (3.353.3), (3.352.4), and (3.352.4), the Gauss–Laguarre Quadrature, secrecy, and outage probability of the near user can obtained as in (25).

References

  1. De Alwis, C.; Kalla, A.; Pham, Q.-V.; Kumar, P.; Dev, K.; Hwang, W.-J.; Liyanage, M. Survey on 6G frontiers: Trends, applications, requirements, technologies and future research. IEEE Open J. Commun. Soc. 2021, 2, 836–886. [Google Scholar] [CrossRef]
  2. Hakeem, S.A.A.; Hussein, H.H.; Kim, H. Vision and research directions of 6G technologies and applications. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 2419–2442. [Google Scholar]
  3. Melki, R.; Noura, H.N.; Chehab, A. Physical layer security for NOMA: Limitations, issues, and recommendations. Ann. Telecommun. 2021, 76, 375–397. [Google Scholar] [CrossRef]
  4. Men, J.; Ge, J.; Zhang, C. Performance Analysis for Downlink Relaying Aided Non-Orthogonal Multiple Access Networks With Imperfect CSI Over Nakagami-m Fading. IEEE Access 2017, 5, 998–1004. [Google Scholar] [CrossRef]
  5. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K.-S. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun. Surv. Tut. 2016, 19, 721–742. [Google Scholar] [CrossRef]
  6. Ding, Z.; Peng, M.; Poor, H.V. Cooperative non-orthogonal multiple access in 5G systems. IEEE Commun. Lett. 2015, 19, 1462–1465. [Google Scholar] [CrossRef]
  7. Men, J.; Ge, J.; Zhang, C. Performance analysis of nonorthogonal multiple access for relaying networks over Nakagami-m fading channels. IEEE Trans. Veh. Technol. 2016, 66, 1200–1208. [Google Scholar] [CrossRef]
  8. Rajkumar, S.; Jayakody, D.N.K.; Chang, Z.A. Hybrid NOMA-PLNC Wireless Relay Scheme. In Proceedings of the IEEE 18th Annual Consumer Commun & Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2021. [Google Scholar]
  9. Arora, K.; Singh, J.; Randhawa, Y.S. A survey on channel coding techniques for 5G wireless networks. Telecommun. Syst. 2020, 73, 637–663. [Google Scholar] [CrossRef]
  10. Mahmood, N.H.; Alves, H.; López, O.A.; Shehab, M.; Osorio, D.P.M.; Latva-Aho, M. Six Key Features of Machine Type Communication in 6G. In Proceedings of the 2020 2nd 6G Wireless Summit (6G SUMMIT), Levi, Finland, 17–20 March 2020. [Google Scholar]
  11. Yu, W. On the fundamental limits of massive connectivity. In Proceedings of the 2017 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 12–17 February 2017. [Google Scholar]
  12. Hong, J.-P.; Choi, W.; Rao, B.D. Sparsity controlled random multiple access with compressed sensing. IEEE Trans. Wirel. Commun. 2014, 14, 998–1010. [Google Scholar] [CrossRef]
  13. Du, Y.; Dong, B.; Chen, Z.; Wang, X.; Liu, Z.; Gao, P.; Li, S. Efficient multi-user detection for uplink grant-free NOMA: Prior-information aided adaptive compressive sensing perspective. IEEE J. Sel. Areas Commun. 2017, 35, 2812–2828. [Google Scholar] [CrossRef]
  14. ElHalawany, B.M.; Wu, K. Physical-Layer Security of NOMA Systems Under Untrusted Users. In Proceedings of the 2018 IEEE Global Communications Conference GLOBECOM, Abu Dhabi, United Arab Emirates, 9–13 December 2018. [Google Scholar]
  15. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  16. Wang, D.; Bai, B.; Zhao, W.; Han, Z. A survey of optimization approaches for wireless physical layer security. IEEE Commun. Surv. Tutor. 2018, 21, 1878–1911. [Google Scholar] [CrossRef]
  17. Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access-NOMA in Large-Scale Networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
  18. Rajkumar, S.; Jayakody, D.N.K.; Alkanhel, R.; Muthanna, A. Physical Layer Security in N-Pair NOMA-PLNC Wireless Networks. IEEE Access 2022, 10, 91356–91371. [Google Scholar] [CrossRef]
  19. Furqan, H.M.; Hamamreh, J.; Arslan, H. Physical layer security for NOMA: Requirements, merits, challenges, and recommendations. arXiv 2019, arXiv:1905.05064. [Google Scholar]
  20. Han, S.; Xu, X.; Tao, X.; Zhang, P. Joint power and sub-channel allocation for secure transmission in NOMA-based MMTC networks. IEEE Syst. J. 2019, 13, 2476–2487. [Google Scholar] [CrossRef]
  21. Singh, P.; Pawar, P.; Trivedi, A. Physical Layer Security Approaches in 5G Wireless Communication Networks. In Proceedings of the 2018 FirstInternational Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, 15–17 December 2018. [Google Scholar]
  22. Wang, W.; Teh, K.C.; Li, K.H.; Luo, S. On the impact of adaptive eavesdroppers in multi-antenna cellular networks. IEEE Trans. Inf. Forensics Secur. 2017, 13, 269–279. [Google Scholar] [CrossRef]
  23. Sun, L.; Du, Q. A review of physical layer security techniques for Internet of Things: Challenges and solutions. Entropy 2018, 20, 730. [Google Scholar] [CrossRef]
  24. Gong, C.; Yue, X.; Wang, X.; Dai, X. Enhancing Physical Layer Security With Artificial Noise in Large-Scale NOMA Networks. IEEE Trans. Veh. Technol. 2021, 70, 2349–2361. [Google Scholar] [CrossRef]
  25. Alam, M.; Zhang, Q. A Survey: Nonorthogonal Multiple Access with Compressed Sensing Multiuser Detection for mMTC. Wirel. Commun. Mob. Comput. 2021, 2021, 8840519. [Google Scholar] [CrossRef]
  26. Dekorsy, A.; Brueck, S. Is multiuser detection beneficial to mixed service UMTS networks? Int. J. Electron. Commun. 2005, 59, 473–482. [Google Scholar] [CrossRef]
  27. Liu, Y.; Ding, Z.; Elkashlan, M.; Poor, H.V. Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer. IEEE J. Sel. Areas Commun. 2016, 34, 938–953. [Google Scholar] [CrossRef]
  28. Kamel, M.; Hamouda, W.; Youssef, A. Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks. IEEE Trans. Veh. Technol. 2020, 69, 746–759. [Google Scholar] [CrossRef]
  29. Hildebrand, F.B. Introduction to Numerical Analysis; Dover: New York, NY, USA, 1987. [Google Scholar]
  30. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 6th ed.; Academic Press: New York, NY, USA, 2000. [Google Scholar]
Figure 1. The proposed NOMA-assisted mMTC Wireless Networking System model, with active (green) and inactive (block) nodes distributed randomly in the circular region; an Eve node (red) tries to trace the confidential message information, and the blue node acts as the head node.
Figure 1. The proposed NOMA-assisted mMTC Wireless Networking System model, with active (green) and inactive (block) nodes distributed randomly in the circular region; an Eve node (red) tries to trace the confidential message information, and the blue node acts as the head node.
Electronics 12 02322 g001
Figure 2. (a) Normalized average mean square error of active device detection and (b) active device detection of the proposed mMTC network.
Figure 2. (a) Normalized average mean square error of active device detection and (b) active device detection of the proposed mMTC network.
Electronics 12 02322 g002
Figure 3. (a) Uplink coverage probability of the proposed mMTC network for various ρ values and (b) uplink coverage probability of the proposed mMTC network for various N R values.
Figure 3. (a) Uplink coverage probability of the proposed mMTC network for various ρ values and (b) uplink coverage probability of the proposed mMTC network for various N R values.
Electronics 12 02322 g003
Figure 4. (a) Sum rate of the proposed NOMA-based mMTC network without Eve and (b) secrecy sum rate of the proposed NOMA-based mMTC network with Eve.
Figure 4. (a) Sum rate of the proposed NOMA-based mMTC network without Eve and (b) secrecy sum rate of the proposed NOMA-based mMTC network with Eve.
Electronics 12 02322 g004
Figure 5. (a) Outage probability of downlink NOMA-based mMTC network and (b) secrecy outage probability of downlink NOMA-based mMTC network.
Figure 5. (a) Outage probability of downlink NOMA-based mMTC network and (b) secrecy outage probability of downlink NOMA-based mMTC network.
Electronics 12 02322 g005
Table 1. Simulation parameters used to obtain the expected results of the proposed mMTC system model.
Table 1. Simulation parameters used to obtain the expected results of the proposed mMTC system model.
S. No.ParametersSymbolsValue
1.Radius of the inner circle n r 4 m
2.Power allocation coefficient α i 0.7
3.Path loss exponent α 2
4.Distance of the near node to Eve d n , e 3 m
5.Data rateR1 b/s/Hz
6.LI power P L I −10 dBW
7.AN power P A N −10 dBW
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chaudhary, U.; Ali, M.F.; Rajkumar, S.; Jayakody, D.N.K. Sensing and Secure NOMA-Assisted mMTC Wireless Networks. Electronics 2023, 12, 2322. https://doi.org/10.3390/electronics12102322

AMA Style

Chaudhary U, Ali MF, Rajkumar S, Jayakody DNK. Sensing and Secure NOMA-Assisted mMTC Wireless Networks. Electronics. 2023; 12(10):2322. https://doi.org/10.3390/electronics12102322

Chicago/Turabian Style

Chaudhary, Urvashi, Mohammad Furqan Ali, Samikkannu Rajkumar, and Dushantha Nalin K. Jayakody. 2023. "Sensing and Secure NOMA-Assisted mMTC Wireless Networks" Electronics 12, no. 10: 2322. https://doi.org/10.3390/electronics12102322

APA Style

Chaudhary, U., Ali, M. F., Rajkumar, S., & Jayakody, D. N. K. (2023). Sensing and Secure NOMA-Assisted mMTC Wireless Networks. Electronics, 12(10), 2322. https://doi.org/10.3390/electronics12102322

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop