1. Introduction
The perspective of fifth generation and beyond (5GB) networking technology, including the sixth generation (6G), is expected to fulfill the numerous shortcomings of existing wireless networks by providing mass connection of nodes simultaneously, enhancement of reliability, and reducing network unavailability [
1]. Most significantly, 6G is anticipated to provide ultra-reliable communication, ultra-low latency, and wide accessibility. Recently, smart devices have enabled next-generation wireless networks to play an ample role in real-time data encryption/decryption, leading to further heavy data traffic flow. Therefore, the current wireless networks may not be completely supported by the available technologies. To cope with the related issues, the 6G wireless network is proposed with new spectrum and energy-efficient transmission techniques. However, multiple access scheme (MAS) collaborate in the development of large scale wireless networks [
2]. Additionally, a potential MAS can be integrated as a non-orthogonal multiple access (NOMA) scheme. It is noteworthy that NOMA has been proposed for its high spectrum efficiency along with massive connectivity in 5G wireless networks. It serves the multiple connectivity of users within the same network with respect to time and frequency variation. At a glance, power-domain NOMA (PD-NOMA) is a subclass of NOMA schemes which allows users to convey their information using varying power levels and in superposition coding terminology. Similarly, the successive interference cancellation (SIC) technique is applied at the receiver end for decoding of signals in NOMA-based communications networks.
Indeed, power distribution scheduling enhances the performance of a full NOMA-based wireless network [
3,
4]. Moreover, the base station (BS) transmits all users’ information through the same channel in a NOMA scenario. Further, the position of each user is identified by the effective channel gain in the queue. NOMA facilitates and assign a higher fraction of power to the users having weak signal strength [
5]. Cooperative communication is an efficient way to enhance capacity while improving transmission reliability and spatial diversity. Users or dedicated relays cooperate among themselves to improve the transmission reliability of the system [
6]. Further, to improve the spectrum efficiency and system throughput, the authors in [
7] have investigated an amplify-and-forward (AF) relay-based NOMA network by implying Nakagami-m fading channels. Most recently, similar work has been proposed in [
8], where the authors use a physical layer network coding (PLNC)-based NOMA wireless network to improve spectral and temporal efficiency.
Intermittent and sporadic user activity in wireless communication is a major characteristic of massive machine-type communications (mMTC) networks, known as machine-to-machine (M2M) communication. Originally, the concept of an mMTC was proposed by the International Telecommunications Union (ITU) to provide large-scale connectivity services through cellular networks for massive machine-type communications devices. As part of new radio technology, the deployment of NOMA in mMTC has attracted the attention of industrial communities [
9]. Further, mMTC has been viewed as a promising technology for innovation with numerous smart sensors immersed in machine learning techniques and intelligence [
10]. When an mMTC operates with a large number of devices, it mainly faces the issues of scalability, modeling, coverage, and congestion. Due to massive signaling overhead, NOMA schemes have been used to overcome such problems and improve massive access.
In an mMTC system, a limited number of users are expected to transmit short data packets to the Access Point (AP); in each time slot, a large number of user devices are registered to an AP [
11]. To obtain massive access, an mMTC network is mainly focused on the uplink NOMA systems, in which a small number of active users can randomly transmit data at any time slot without any trembling process [
12]. Therefore, the multiple distribution of active users inspires the formulation of the multi-user detection problem under the compressive sensing (CS) framework. The CS is a novel sampling paradigm used to reconstruct a sparse physical signal that samples signals in a much more efficient way than the established Nyquist sampling theorem [
13]. As a result, the CS is a more suitable method for detecting the active nodes in a particular region of an mMTC wireless network.
In contrast, the field of physical layer security (PLS) has been introduced to achieve a secure communication platform, which implies critical issues over wireless networks in different scenarios [
14]. The PLS was proposed by Wyner to improve the security of the network as an alternative approach to the cryptographic techniques [
15]. The advantage of PLS is that it protects information by exploiting intrinsic characteristics of the communications medium, thereby promising wireless security [
16]. In existing works, authors [
17,
18] have considered the PLS for NOMA-based networks for single-antenna and multiple-antenna networks under the stochastic geometry concept. PLS can be applicable considering the physical layer properties of the communication system, such as noise, interference, and the time-varying property of fading channels [
19]. Recently, a NOMA-based uplink mMTC network model was developed in [
20] and its performance was studied. The basic idea behind PLS is to reduce the the signal characteristics of the intended receiver for an eavesdropper (hereinafter referred to as Eve) [
21]. Due to the broadcast nature of wireless networks, transmission between authorised users can easily be overheard by Eve for interception. It is challenging to deploy an active Eve or multiple Eves within heterogeneous networks [
22]. A comprehensive review of PLS techniques for internet of things (IoTs) applications is discussed in [
23], followed by a survey of existing PLS techniques and the characteristics of IoT.
1.1. Motivation
Motivated by the existing research, here we propose a novel mMTC network with a view to 6G networking system. As the existing research works have demonstrated that many network nodes are in idle condition, it is necessary to develop a low-power-consumption wireless network that can provide the high capacity needed for massive connectivity. Throughout this study, we propose a system model for massive connectivity within the 6G wireless networking approach. More specifically, we focus on constructing a suitable algorithm for sensing the active nodes in the given region of the mMTC networks, which can greatly improve overall network performance. In fact, mMTC is one of the major requirements of a 6G wireless network that can fulfill real-time data streaming applications in fields such as health care, industrial monitoring, traffic control, agriculture, etc. In another direction, providing secure communication in the mMTC networks, such as for command message passing in military contexts or control messages in industry, is another major concern. Therefore, in this a new network model for mMTC a network is proposed using PLS and CS algorithms to enhance sensing and secure communications.
1.2. Contributions
The main contributions of this paper can be summarized as follows:
Throughout this study, we propose novel massive connectivity of machine-type communication system towards the 6G networking system utilizing the PLS.
In an mMTC, the detection of inactive/active nodes is challenging; therefore, a new approach for detection is investigated in this study using the CS algorithm.
Throughout this study, analytical expressions are provided and then verified by simulation results, and the end-to-end (E2E) performance metrics of the proposed system, such as secrecy and outage probability, are derived in detail.
The rest of the paper is organized as follows. In
Section 2, the system model of the proposed network is discussed and the CS algorithm is explained. In
Section 3, the performance aspects of the proposed mMTC network, such as the sensing-aided sum rate and secrecy outage probability, are explained. In
Section 4, our numerical analysis is discussed, and lastly we provide concluding remarks in
Section 5.
2. System Model
In the proposed system model, we consider an mMTC network in which
number of nodes are distributed randomly in the given region, as in
Figure 1. Among the
nodes, only one node acts as a head node (the blue-colored node), and serves the remaining N nodes using a NOMA scheme. The geometrical model of the region is formulated as a circular region, and based on the distances of the nodes, a set of nodes is located in the inner circular region (near users) and the remaining nodes distributed in the outer circular region (far users). Because the number of nodes in a particular region is dynamic, it can be modeled as an homogeneous Poisson point process (HPPP) [
24]. In this mMTC model, the radii of the inner and outer circular regions are denoted by
and
, respectively. In practical mMTC networks, there is a security issue that frequently arises due to unauthorized nodes, which are indicated as eavesdroppers (Eves) in this proposed model. An Eve node wants to trace confidential messages from the legitimate nodes. Hence, all nodes are designed in full-duplex mode, such that they always generate artificial noise (AN) while receiving message from the head node, which is intended to confuse any Eve nodes.
In existing mMTC networks, several of the nodes are in inactive condition due to certain practical issues. In such a scenario, random allocation of power to all users is not a favorable approach. Therefore, it is necessary to develop a suitable algorithm to sense all the active nodes in mMTC networks in order to enhance network performance. In this work, a single measurement vector-based CS algorithm [
25] is used to sense active nodes.
2.1. Active Nodes Sensing
We assume that each node in the mMTC network is active with a probability of
and that the head node identifies the activity of each node by simply checking whether or not a particular node has any useful information. Further, it is assumed that at any time only few nodes are active and that the head node receive the signals from both the active and inactive nodes; hence, the network can be modeled as a sparse vector. Thus, the CS algorithm represents a suitable method for detecting the sparse signals. The
node (
) transmits its message frame to the head node using binary phase shift keying (BPSK) modulation scheme, which is denoted as
. Each frame consists of M BPSK symbols
. Note that the proposed mMTC network is developed for low power and low data rate communications, such as e-healthcare, industrial automation, home automation, etc.; hence, BPSK modulation is sufficient to transmit control messages. The messages received from all N nodes can be represented as an
sparse vector, as provided by
, where
if the
node is inactive. Therefore, the received signal at the head node is
where
is a measurement matrix
designed using
channel matrix
in which
, where
is the number of channel taps in the
node,
is the relative delay and
spreading matrix
with spreading factor q [
26] of the
node, and z is additive white Gaussian noise (AWGN) with zero mean and variance
. Using the sparsity-aware maximum a posteriori (S-MAP) detection algorithm [
25], the active nodes are identified as follows:
where
,
is the active devices probability,
is the estimated sparse vector, and its sum of non-zero elements provides the total number of active nodes, which is denoted as
. By sensing the indices of the non-zero elements of the sparse vector, the head node allocates power to all the active nodes according to the NOMA scheme, thereby enhancing the performance of the mMTC network.
To improve active device detection in mMTC networks, it is necessary to analyze the active device detection error at the receiver. The normalized average mean square error
of active device detection can be calculated as follows:
where
is the number of iterations. It is noteworthy that active device detection mainly depends on parameters such as the percentage of active devices
, spreading factor q, and signal-to-noise ratio (SNR). In addition, the normalized average mean square error is helpful in analysing device detection via the S-MAP algorithm; device detection improvement can be achieved by increasing the SNR values, which is discussed in detail in
Section 4.
2.2. Sensing-Aided Downlink Transmission
By applying the S-MAP algorithm, the head node is able to determine the status of the nodes. Thus, the head node allocates power only to active nodes based on the channel conditions. The channel gains are arranged in ascending order (), and power allocation is performed correspondingly (). Note that an mMTC networks contains a large number of nodes; hence, allocating power after dividing the nodes into a number of groups is preferable, and is the approach considered in the rest of this work. Using the NOMA scheme, the head node superimposes all active node signals as , where is the head node’s transmitting power. Here, the power allocation coefficient must satisfy the condition and = 1.
For downlink transmission, the head node transmits the NOMA signal to all the nodes simultaneously. Because each node adopts full-duplex mode, it can emit the AN signal while receiving the signal from the head node. In addition, each node suffers from loop interference (LI) due to full-duplex operation. Here, let the
node act as a near node,
and let the
node act as a far node,
. Because the transmit signals are in the form of frames, and because each frame consists of M symbols, the
NOMA symbol can be written as
. Therefore, the
received symbol at the near node
can be written as
where
is the channel coefficient between the head node and near node and subscript h denote the head node. Furthermore, a channel modeled using small- and large-scale fading and its channel gain follow the exponential distribution, with mean 0 and variance
. Additionally, the parameters are defined as the follows: the distance from the head node to the near node is
, the path loss exponent is
, the channel coefficient of the LI is
, which is exponentially distributed with mean 0 and variance
, and the AWGN is
, and is defined using
. The received signal from the far node can be calculated in a similar way.
At the same time, Eve traces the signal from the head node; the signal received from Eve can be expressed as
where
is the channel coefficient between the head node and Eve and
is the AN signal, which is generated using a pseudo-noise (PN) sequence. Its channel gain follows the exponential distribution, with mean 0 and variance
. However, here
is the distance from the head node to Eve,
is the channel coefficient between the near node and Eve, and
is the AWGN at Eve. Note that the AN signal is received from the far node with channel a coefficient of
.
4. Results and Discussion
In this section, the secrecy sum rate and secrecy outage probability of the proposed NOMA-based mMTC network is discussed. In addition, active node detection in the mMTC network using the CS algorithm is described, as well as the use of the convex optimization toolbox ‘
’ to estimate the sparsity of active nodes. Matlab software was used for all the simulations of performance metrics, including the coverage probability, sum rate, outage probability, and secrecy outage probability of the proposed mMTC network, and the legitimate node channel variance was fixed to 1 for all the simulations. The detailed simulation parameters are listed in
Table 1.
The normalized average mean square error of active device detection is shown in
Figure 2a. A convex optimization tool is used to detect the active devices in the proposed mMTC network; the active devices are then modeled as a sparse vector. From this figure, it can be observed that the mean square error of active device detection increases when the percentage of active devices increases. Further, the performance of active device detection improves when the SNR values increase.
Figure 2b shows the comparison of the total number of active devices detected in the proposed mMTC wireless networks. In this figure, it can be noted that even though the average mean square error increases with the percentage of active devices, the total number of active devices detected increases as well.
Figure 3a shows the uplink coverage probability of the proposed mMTC wireless network. In this simulation, the following parameters are considered: active device probability
is varied as 0.12, 0.13, and 0.14, SNR = −130 dBW, noise variance = −151.45 dBW, data rate R = 2 b/s/Hz,
, increasing density of active devices
, number of resource blocks
, path loss model parameter
. From this figure, it can be observed that the coverage probability of the proposed networked is reduced when increasing the active device probability. Therefore, better coverage of the proposed mMTC network can be achieved by increasing the active device probability. Similarly, the coverage probability of the proposed mMTC network is analyzed for various
values. In this figure, coverage of the proposed network is improved when increasing the number of resource blocks.
Figure 4a shows the sum rate of the proposed NOMA-based mMTC network without Eve. In this simulation, the number of legitimate nodes is 40 and the LI power is −10 dBW. Active node detection is performed using the convex optimization toolbox. The sum rate of the proposed network is compared with the sensing-aided sum rate and perfect SIC-based sum rate. It can be observed that the active sensing algorithm is not effective when the number of nodes is low. However, the proposed mMTC network achieves significant improvement thanks to the active sensing algorithm as the number of nodes increases. Furthermore, it can be observed that, with perfect SIC and the active sensing approach, the sum rate of the proposed network is even better than the sum rate with sensing. Therefore, it can be concluded that the active node detecting approach plays a vital role in the mMTC network, enhancing overall network performance.
The secrecy sum rate of the proposed NOMA-based mMTC network is shown in
Figure 4b. The number of legitimate nodes is 40, and AN and LI power are considered as −10 dBW. The secrecy sum rate is estimated by taking the sum rate difference between legitimate nodes and Eve nodes. The sum rate is compared with and without the sensing algorithm and perfect SIC. From this figure, it can be noted that the active sensing algorithm is effective in the proposed mMTC network even with a lower number of nodes. Furthermore, the sum rate is significantly increased when the number of nodes in the proposed network increases. However, with the presence of Eve, the sum rate of the proposed mMTC network is low compared to the network without Eve. For instance, with 30 nodes the secrecy sum rate with sensing is around 5 b/s/Hz, whereas without Eve the sum rate is 13 b/s/Hz. This makes the effect of the Eve node in the mMTC network very evident; hence, designers ought to change the configuration of the network to obtain high quality of service even when Eve nodes ar present.
Figure 5a shows the outage probability of the proposed mMTC network. In this simulation, the presence of Eve is omitted; hence, LI and AN power are not considered, and other parameters, such as the distance of the far node
= 6 m, distance of the near node
= 4 m, and path loss exponent
are used. The analytical results are validated using the presented simulation results. The outage probability of the far node and near node are compared using the rates R = 1 b/s/Hz and R = 0.5 b/s/Hz. At the target outage level of
, the near node needs 25 dBW SNR, whereas far node requires 28 dBW SNR. For a threshold data rate of R = 0.5 b/s/Hz, this indicates that an additional 3 dBW SNR is needed for the far node.
The secrecy outage performance of the proposed mMTC network is shown in
Figure 5b. In this simulation, the following parameters are used: distance of the near node
= 2 m, distance from near node to Eve node
= 3 m, Gauss–Lagurre Quadrature K = 10, path loss exponent
, threshold data rate R = 1 b/s/Hz, and LI and AN power −10 dBW. From this figure, it can be observed that the outage performance of the proposed mMTC network is degraded due to the presence of LI and AN power. When the Eve node is near the head node, it receives a strong signal from the head node, degrading the network’s outage performance. Therefore, it is better to always keep Eve nodes a certain distance away from the head node to ensure better network performance.