Next Article in Journal
Quantitative Strain Measurements of Kevlar Fibers in Composite Concrete Using Raman Spectroscopy
Previous Article in Journal
Inverse Judd–Ofelt Formalism Based on Radiative Lifetime for Comparative Spectroscopy of RE3+ Ions in Glass
Previous Article in Special Issue
Design and Simulation of Cross-Medium Two-Hop Relaying Free-Space Optical Communication System Based on Multiple Diversity and Multiplexing Technologies
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Downlink Transmission with NOMA-Based Mixed FSO/RF Communications in Space–Air–Ground Integrated Networks

1
School of Information and Navigation, Air Force Engineering University, Xi’an 710077, China
2
Optical Communication Networks Department, Engineering University of the Information Support Force, Wuhan 430014, China
*
Author to whom correspondence should be addressed.
Photonics 2025, 12(10), 1012; https://doi.org/10.3390/photonics12101012
Submission received: 15 September 2025 / Revised: 7 October 2025 / Accepted: 7 October 2025 / Published: 14 October 2025
(This article belongs to the Special Issue Emerging Technologies for 6G Space Optical Communication Networks)

Abstract

Security is paramount in space–air–ground integrated networks (SAGINs) due to their inherent openness and the broadcast characteristics of wireless transmission. In this paper, we propose a secure downlink transmission scheme with NOMA-based mixed FSO/RF communications for SAGINs. Specifically, the satellite communicates with two ground users through an unmanned aerial vehicle (UAV) relay, where FSO and RF transmissions are adopted for the satellite–relay and relay–user links, respectively. Furthermore, the NOMA technique is integrated to further enhance secrecy performance. Subsequently, exact closed-form expressions for the secrecy outage probability of the downlink transmission link in SAGINs are derived. Finally, Monte Carlo simulations are performed to validate the effectiveness of the proposed secure downlink transmission scheme and the accuracy of the analytical expressions.

1. Introduction

1.1. Background

The space–air–ground integrated network (SAGIN) has emerged as a critical architecture for future wireless communications, envisioned to deliver seamless, high-capacity, and ubiquitous connectivity on the global scale [1,2]. By integrating satellite networks, aerial networks, and terrestrial communications, SAGINs significantly extend the communication coverage, particularly in remote rural regions, oceans and mountainous areas where traditional terrestrial networks are unavailable [3]. The extensive coverage and broadcast nature of wireless transmission also make SAGINs vulnerable to security risks, including malicious eavesdropping. However, ensuring secure transmission in SAGINs has garnered substantial research attention.
Free-space optical (FSO) communication is regarded as a highly promising technology for SAGINs, especially in satellite-to-ground scenarios. It offers a compelling combination of exceptionally high data rates, license-free spectrum, and inherent security advantages [4,5,6]. Despite these benefits, FSO links are highly susceptible to atmospheric conditions in practical deployment. Adverse weather and atmospheric turbulence can induce intense signal fading and scintillation, which in turn lead to degraded link reliability and frequent outages [7]. These limitations can be effectively mitigated through the adoption of a mixed FSO and RF communication architecture [8].
Extensive recent research has focused on improving transmission stability of communication systems by integrating UAV-based relaying with mixed FSO-RF technology. The UAV relay acts as an intermediate node, establishing a stable FSO link to the Low Earth Orbit (LEO) satellite and subsequently forwarding the data to the ground station [9]. Owing to the scarcity of licensed RF spectrum coupled with exponential growth in wireless traffic, non-orthogonal multiple access (NOMA) has the potential to further increase spectral efficiency [10,11,12]. However, in NOMA systems, the same spectrum resources are shared among multiple users. Once the system is eavesdropped on, the information of multiple users will be leaked simultaneously. Moreover, due to the open medium and long-distance communication, security is a critical issue in the wireless communication. Recently, information-theoretic physical layer security (PLS) has emerged as a prevalent technique for addressing secrecy issues at the physical layer [13,14]. PLS enables secure wireless communication by leveraging the inherent randomness of the communication medium. This approach has been successfully incorporated into both NOMA and mixed FSO-RF systems, offering innovative pathways to address critical security challenges [15,16].

1.2. Related Works

We investigated various mixed FSO-RF relaying communication systems and presented a comprehensive in Table 1. According to Table 1, it is evident that the majority of studies on this system focus on decode-and forward (DF) relaying protocols [17,18,19,20,21,22,23,24], and amplify-and-forward (AF) relays which encompass fixed-gain [24,25,26]. In FSO-RF systems, signal fading is predominantly induced by atmospheric turbulence and pointing errors. The Gamma-Gamma distribution [17,20,25,26] is considered as the most typical distribution for the irradiance, and the Málaga ( M ) distribution [18,19,21,22,24,27] is presented in [28] to model the variability in irradiance of an infinite optical wavefront as it propagates through turbulent media across all levels of irradiance. Heterodyne detection (HD) and indirect modulation/direct detection (IM/DD) are widely adopted in FSO systems, with HD offering higher sensitivity at the cost of increased complexity compared to IM/DD. For the RF links, the Nakagami-m distribution and the Shadowed-Rician distribution are the most commonly used models [17,18,19,20,21,22,23,24,25,26], as well as Rayleigh [27]. In the existing literature, only a limited number of studies have considered the application of NOMA technology [20,22,26]. Liu et al. [20] propose the use of a Reconfigurable Intelligent Surface (RIS) as a passive means to enhance secrecy performance. While the study in [22] considers the impact of fog absorption on FSO links and the random spatial distribution of terrestrial users, Osman et al. [26] explore MIMO and Artificial Noise (AN) as active countermeasures for colluding eavesdroppers.

1.3. Motivations and Contributions

The existing literature reveals that the investigation of physical layer security (PLS) for NOMA-based mixed FSO-RF systems in SAGIN remains largely unexplored, yet this area represents a pressing and critical research need. To address this gap, we propose a novel framework integrating NOMA with mixed FSO-RF transmission in the presence of an eavesdropper (E). The PLS performance is rigorously analyzed, with key contributions summarized as follows:
  • We propose a novel secure transmission scheme for the SAGIN downlinks, which is a NOMA-based mixed FSO-RF communication system. Additionally, we analyze the secure transmission performance of this system.
  • An analytical expression for the secrecy outage probability (SOP) in the presence of an eavesdropper was derived. Furthermore, extensive experiments were conducted to validate the advantages of the proposed NOMA-based mixed FSO-RF communication system and the accuracy of the derived SOP analytical expression.
  • We investigated the impact of both amplify-and-forward (AF) and decode-and-forward (DF) relay protocols on the secure transmission performance within SAGIN. Experimental results demonstrate that the DF relay protocol achieves superior secrecy performance compared to the AF scheme.
The remainder of this paper is organized as follows. The system and channel models of the proposed are discussed in Section 2. In Section 3, the security performance of proposed system is analyzed. Afterwards, Section 4 discusses the results of numerical analysis and simulation. Finally, Section 5 summarizes the paper.

2. System and Channel Models

Traditional satellite-terrestrial communication systems suffer from significant security issues due to the open nature of their channels and the broadcast characteristics of their signals. In contrast, satellite–terrestrial laser communication links, benefiting from the characteristics of free-space optical (FSO) communication, hold promise for addressing this security issue. However, laser communication is highly susceptible to channel influences. Atmospheric turbulence and pointing errors can severely degrade transmission performance. Moreover, laser communication is limited to line-of-sight (LOS) transmission, resulting in poor channel resistance to obstruction [28]. Therefore, the introduction of UAV relays can effectively mitigate this issue.
Based on the above analysis, we propose a secure transmission scheme for a NOMA-based mixed FSO-RF system in SAGIN. The FSO link is employed between the LEO satellite and the UAV relay, with the UAV establishing connections to multiple users via RF links. Moreover, NOMA technology is utilized to further improve spectral efficiency. The specific scheme is illustrated in Figure 1. The source (S) transmits mutually independent information to the two ground users (U1 and U2) simultaneously via an UAV relay (R). The communication system is designed as a two-hop transmission process. In the first phase transmission, S transmits a non-orthogonal multiple access (NOMA) signal to the relay (R) via the FSO link. In the second phase transmission, an optical-to-electrical (O/E) conversion is first performed at R, and the resulting electrical signal is then forwarded to multiusers over RF links using either an amplify-and-forward (AF) or decode-and-forward (DF) protocol, in the presence of an eavesdropper (E). The NOMA technique is utilized in this RF link. We assume that the source node has a single aperture, and the relay node has an optical receiving aperture and an RF transmitting antenna. The ground user employs a single antenna. All devices operate in half-duplex mode to avoid self-interference.

2.1. S-R FSO Link

In the first hop, the FSO link is assumed to follow Gamma-Gamma fading channels with atmospheric attenuation and pointing errors. The signal received at the UAV relay (R) is expressed as
y R = P s I S R η S R x s + n R
and instantaneous signal-to-noise ratio (SNR) at node R can be given as
γ S R = P s I S R η S R 2 σ R 2
where P S is the transmit power of LEO satellite S, nR is the additive white Gaussian noise (AWGN) variable at the relay with mean zero and variance σ R 2 . And the channel coefficient of the overall FSO link can be expressed as I S R = I S R l I S R a I S R p , where I S R p indicates geometric spreading and pointing errors; I S R a denotes the impact of atmospheric turbulence; I S R l represents the atmospheric attenuation due to path loss. η S R is the optical-to-electrical conversion coefficient. Furthermore, x s represents the superimposed signal denoted as
x s = a 1 x 1 + a 2 x 2
where x 1 and x 2 denote the transmitting signals of U1 and U2, a 1 and a 2 are the power allocation coefficients of x 1 and x 2 , respectively. Based on the NOMA approach, we assumed that U1 is a far-user requiring a higher transmission power, while U2 is a near-user requiring a lower transmission power. Then, it has a 1 > a 2 with a 1 2 + a 2 2 = 1 .
The probability density function (PDF) of instantaneous SNR can be written in terms of Meijer G-function G p , q m , n ( ) which is defined in (Ref. [29], Equation (9.301)), and (Ref. [30], Equation (07.34.02.0001.01)), and given as (Ref. [31], Equation (4))
f γ S R γ S R = ξ 2 r γ S R Γ α Γ β G 1,3 3,0 h α β γ S R μ r 1 r ξ 2 + 1 ξ 2 , α , β
where ξ is the pointing error coefficient, which is used to quantify the severity of beam misalignment. h = ξ 2 / ξ 2 + 1 , and μ r indicates the average electrical SNR of pertinent link. α and β are parameters that indicate large-scale and small-scale irradiance fluctuations, parameter r signifies the detection method used at the UAV relay node (i.e., r = 1 is associated with heterodyne detection (HD), and r = 2 is associated with IM/DD). Specifically, μ 1 = γ S R for HD and μ 2 = h α β ξ 2 + 2 ξ 2 + 1 α + 1 β + 1 γ S R for IM/DD technology. Moreover, Γ ( ) represents the Gamma function defined in (Ref. [29], Equation. (8.310)). The cumulative distribution function (CDF) of γ S R can be deduced by using (Ref. [30], Equation (07.34.21.0084.01)) as follow:
F γ S R γ S R = ξ 2 r α + β 2 2 π r 1 Γ α Γ β G r + 1,3 r + 1 3 r , 1 h α β r r 2 r μ r γ S R 1 E 1 E 2 0
In addition, E 1 = ξ 2 + 1 r , , ξ 2 + r r , and E 2 = ξ 2 r , , ξ 2 + r 1 r , α r , , α + r 1 r , β r , β + r 1 r .

2.2. R-U RF Link

For the R-U RF link, optical-to-electrical conversion is performed at node R, and the resulting electrical signals are transmitted to U1 and U2 via RF links in the presence of an eavesdropper E. At node R, both amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols are employed.
1.
AF Relaying
The AF relaying protocol works by simply amplifying the received mixed signal, which includes both Gaussian noise and the transmitted signal. It then forwards the amplified signal to the receiver. This approach offers simple operation and low complexity. However, it has a drawback: noise is also amplified in the process. This makes it harder for the receiver to correctly decode the desired signal.
R first processes an optical-to-electrical conversion and then amplifies and broadcasts the multiplexed signal to Uk. The signals received at node Z, Z U 1 , U 2 , E can be given
y Z = P S G I S R I R Z η S R x s + G I R Z n R + n Z
where G = P R / P S | I S R | 2 + σ R 2 is the amplifying coefficient defined in [32], and P R indicates the transmission power of R. I R U k and I R E are the channel gains between R and Uk as well as E, n U k and n E are the AWGN at Uk and E with zero mean and variances of σ U k 2 and σ E 2 , respectively. The RF channels are modeled as Nakagami-m distribution with a shape parameter m R Z that determines the fading severity.
The probability density function (PDF) and the CDF expressions of γ R Z can be denoted, respectively, as
f γ R Z γ = Ω R Z m R Z γ m R Z 1 Γ m R Z e x p Ω R Z γ
and
F γ R Z γ = 1 l = 1 m R Z 1 Ω R Z γ l l ! e x p Ω R Z γ
where Ω R Z = m R Z / γ ¯ R Z , and γ ¯ R Z represents the average SNR.
In the NOMA networks, successive interference cancelation (SIC) is adopted at each ground user to mitigate the interference of the others. The decoding order is the increasing order of the channel gain. For the remote user U1, it decodes its own information while considering x 2 as interference. Hence, the end-to-end signal-to-interference-plus-noise ratio (SINR) for U1 to decode x 1 can be written as
γ U 1 , x 1 = γ S R γ R U 1 a 1 2 a 2 2 γ S R γ R U 1 + γ S R + γ R U 1 + 1
For the near user U2, successive interference cancelation (SIC) is employes to eliminate x 1 from the superimposed signal, and then decodes its own information x 2 . Therefore, the end-to-end SINR received at U2 is
γ U 2 , x 2 = γ S R γ R U 2 a 2 2 γ S R + γ R U 2 + 1
Besides, the end-to-end instantaneous SNR for E to decode x k is given by
γ E , x k = γ S R γ R E a k 2 γ S R + γ R E + 1
2.
DF Relaying
For the DF relay protocol, the relay decodes the received signal, which contains Gaussian noise. It then encodes the decoded signal and forwards it to the receiver. While decoding noisy signals increases computational complexity, DF relaying mitigates noise accumulation, thus achieving higher reliability.
R decodes the received signal by utilizing SIC. In particular, R first decodes x 1 , which is transmitted at a higher power, while treating x 2 as noise. Next, the end-to-end SINR for R to decode x 1 is
γ R , x 1 = γ S R a 1 2 γ S R a 2 2 + 1
Following this, R removes x 1 from the received signal and then decodes x 2 with the SINR illustrated as
γ R , x 2 = γ S R a 2 2
Therefore, the decoded signals are electrically converted by relay node R, re-encoded, and transmitted to U1 and U2 via radio frequency (RF) links. Moreover, the signal received at Z can be deduced as
y Z = P R I R Z x s + n Z
Next, SIC is utilized to decode the received signals, and the end-to-end SINR at U1 and U2 for detecting their independent signals are respectively
γ U 1 , x 1 = γ R U 1 a 1 2 a 2 2 γ R U 1 + 1
and
γ U 2 , x 2 = γ R U 2 a 2 2
Following the approach in reference [33], we consider the worst-case scenario where E can completely eliminate the interference between the signals, thus decoding both x 1 and x 2 . However, in practical scenarios, this case overestimates the eavesdropper’s capabilities. Consequently, it can also be regarded as the lower bound of the system’s PLS performance. And the SINR for E to decode x k can be written as
γ E , x k = γ R E a k 2

3. Security Performance Analysis

To conduct an in-depth analysis of the system, we have to investigate the secrecy performance, which includes the instantaneous channel capacity. Subsequently, we present new analytical expressions for PLS performance metrics, which include the secrecy capacity (SC) and secrecy outage probability (SOP).

3.1. Secrecy Capacity

The secrecy capacity (SC) is the difference between the main channel capacity and the wiretap channel capacity. The secrecy capacity CS represents the maximum secure communication rate that the transmission channel can achieve, and is formally defined as
C S = C D C E + = 1 2 log 2 1 + γ D 1 2 log 2 1 + γ E +
where C D and C E are the instantaneous capacities of the legitimate link and the eavesdropping link, respectively, and x + m a x x , 0 , the system secrecy capacity CS is non–negative.
3.
AF Relaying
The instantaneous secrecy capacity of the ground user Uk can be expressed as
C U k A F = 1 2 log 2 1 + γ U k 1 + γ E , x k
4.
DF Relaying
For DF relaying systems, the end-to-end capacity of Uk is determined as the minimum of the S-R link and the R-U link capacities, represented by
C U k = m i n C R , x k   ,   C U k , x k = m i n 1 2 log 2 1 + γ R , x k ,   1 2 log 2 1 + γ U k , x k
And the channel capacity for E to detect x k is C E , x k = 1 2 l o g 2 1 + γ E , x k . Therefore, the instantaneous SC of each other can be written as
C U k D F = C U k C E , x k + = m i n 1 2 log 2 1 + γ R , x k , 1 2 log 2 1 + γ U k , x k 1 + γ E , x k +

3.2. Security Outage Probability

The SOP is a key metric for evaluating the security performance of communication systems and is widely used in the field of wireless communications. The security outage occurs when the system’s secrecy capacity drops below a predefined target secrecy rate Rs.
5.
AF Relaying
In NOMA networks, Secrecy outage occurs once the secrecy capacity of either C U 1 or C U 2 is under its target threshold C t h . Therefore, the SOP of the system is
P S O P A F = P r C U 1 A F < C t h 1 + P r C U 2 A F < C t h 2 = 1 P r 1 + γ U 1 , x 1 1 + γ E , x 1 ψ 1 P r 1 + γ U 2 , x 2 1 + γ E , x 2 ψ 2
where ψ 1 = 2 2 C t h 1 and ψ 2 = 2 2 C t h 2 . Owing to the correlation among γ U 1 , x 1 , γ E , x 1 , γ U 2 , x 2 and γ E , x 2 , an exact closed-form solution for Equation (22) remains analytically intractable. Therefore, in the high-SNR regimes, using the tight approximation 1 + x 1 + y x y (Ref. [33], 37 (12)), Equation (22) can be further approximated as
P S O P A F     1 P r γ S R γ R U 2 γ S R + γ R U 2 > ψ 2 γ S R γ R E γ S R + γ R E P 1 P r γ S R γ R U 2 γ S R + γ R U 2 > ψ 2 γ S R γ R E γ S R + γ R E , γ S R γ R E γ S R + γ R E > η 1 P 2
where η 1 = 1 / a 2 2 ψ 1 . Making use of the inequality x y x + y m i n x , y , which is adopted in many papers, e.g., (Ref. [34], Equation (15)), (Ref. [35], Equation (6)), P 1 and P 2 can be further approximated as
P 1 = P r m i n γ S R , γ R U 2 > ψ 2 m i n γ S R , γ R E
and
P 2 = P r m i n γ S R , γ R U 2 > ψ 2 m i n γ S R , γ R E , m i n γ S R , γ R E > η 1
Note that γ S R < ψ 2 γ S R always holds as ψ 2 > 1 , γ S R > 0 . Hence, we can rewrite m i n γ S R , γ R U 2 > ψ 2 m i n γ S R , γ R E as m i n γ S R , γ R U 2 > ψ 2 γ R E . Thus, we have
P 1 P r m i n γ S R , γ R U 2 > ψ 2 γ R E = 0 1 F γ S R ψ 2 x 1 F γ R U 2 ψ 2 x f γ R E x d x
and
P 2 P r m i n γ S R , γ R U 2 > ψ 2 γ R E + η 2 , γ S R > η 1 , γ R E > η 1 = η 1 1 F γ S R ψ 2 x 1 F γ R U 2 ψ 2 x f γ R E x d x
Furthermore, substituting (26) and (27) into (23), the SOP for the proposed system under AF relaying is mathematically deduced as
P S O P A F = 1 0 η 1   1 F γ S R ψ 2 x 1 F γ R U 2 ψ 2 x f γ R E x d x = 1 Ω R E m R E e Ω R U 2 Γ m R E l = 0 m R U 2 1   Ω R U 2 l l ! 0 η 1   ψ 2 x l x m R E 1 e Ω R E + ψ 2 Ω R U 2 x         × 1 ξ 2 r α + β 2 2 π r 1 Γ α Γ β G r + 1,3 r + 1 3 r , 1 h α β r μ r r 2 r ψ 2 x 1 , E 1 E 2 , 0 d x
The Gauss-Chebyshev quadrature provides an efficient numerical integration method for functions with singularities at the interval endpoints (Ref. [34], Equation (34)). Then, (28) can be approximated as
  P S O P A F = 1 η 1 π e Ω R U 2 2 N Γ m R E Ω R E m R E l = 0 m R U 2 1   k = 1 N Ω R U 2 l l ! 1 ϕ n 2 ω n m R E 1 e Ω R E + ψ 2 Ω R U 2 ω n                             × ψ 2 ω n l 1 ξ 2 r α + β 2 2 π r 1 Γ α Γ β G r + 1,3 r + 1 3 r , 1 h α β r μ r r 2 r ψ 2 ω n 1 , E 1 E 2 , 0
where ϕ n = cos 2 N 1 / 2 N , ω n = η 1 ϕ n + 1 / 2 .
6.
DF Relaying
The SOP for the DF protocol is given as
P S O P D F = P r C U 1 D F C t h 1   C U 2 D F C t h 2 = 1 P r C U 1 D F > C t h 1 P r   C U 2 D F > C t h 2
Substituting (21) into (30), it has
P S O P D F = 1 P r m i n 1 + γ R , x 1 , 1 + γ U 1 , x 1 1 + γ E , x 1 > ψ 1 , m i n 1 + γ R , x 2 , 1 + γ U 2 , x 2 1 + γ E , x 2 > ψ 2 = 1 P r γ R , x 1 > ψ 1 1 , γ R , x 2 > ψ 2 1 P 3 P r 1 + γ U 1 , x 1 1 + γ E , x 1 > ψ 1 , 1 + γ U 2 , x 2 1 + γ E , x 2 > ψ 2 P 4
Owing to the complexity of statistical analysis, deriving an exact closed-form expression for the aforementioned SOP proves challenging. Thus, in high-SNR regimes, an approximate method should be adopted, namely
P 3 P r γ S R > m a x η 2 , η 3 = 1 ξ 2 r α + β 2 2 π r 1 Γ α Γ β G r + 1,3 r + 1 3 r , 1 h α β r r 2 r μ r m a x η 2 , η 3 1 E 1 E 2 0
where we have used x y x + y m i n x , y   (Ref. [34], Equation (15)), (Ref. [35], Equation (6)), η 2 = ψ 1 1 / 1 a 2 2 ψ 1 , η 3 = ψ 2 1 / a 2 2 . And P 3 in (31) can be approximated as
P 4 P r γ U 1 , x 1 γ E , x 1 > ψ 1 ,   γ U 2 , x 2 γ E , x 2 > ψ 2 = Ω R E m R E γ m R E 1 Γ m R E l = 0 m R U 2 1   Ω R U 2 l l ! 0 η 1   ψ 2 x l   e Ω R E + ψ 2 Ω R U 2 x d x
Thus, the integral can be solved using Gaussian-Chebyshev quadrature formula (Ref. [29], Equation (3.351.18)), as follows
  P 4 = Ω R E m R E γ m R E 1 Γ m R E l = 0 m R U 2 1   v = 0 l l v Ω R U 2 l l ! ψ 2 Ω R E + ψ 2 Ω R U 2 v v 1 !         × 1 e η 1 Ω R E + ψ 2 Ω R U 2 p = 0 v 1 η 1 l p ! Ω R E + ψ 2 Ω R U 2 p
Finally, Substituting (32) and (34) into Equation (31) as
P S O P D F = 1 Ω R E m R E γ m R E 1 Γ m R E l = 0 m R U 2 1   v = 0 l l v Ω R U 2 l l ! ψ 2 Ω R E + ψ 2 Ω R U 2 v v 1 !         × 1 ξ 2 r α + β 2 2 π r 1 Γ α Γ β G r + 1,3 r + 1 3 r , 1 h α β r μ r r 2 r m a x η 2 , η 3 1 , E 1 E 2 , 0         × 1 e η 1 Ω R E + ψ 2 Ω R U 2 p = 0 v 1 η 1 l p ! Ω R E + ψ 2 Ω R U 2 p

4. Numerical Results and Discussion

This section presents numerical results to validate the impact of key system parameters on the PLS performance of the proposed system. Specifically, the relevant theoretical analysis is validated through Monte Carlo simulations. The relevant system parameters are listed in Table 2. The FSO link model corresponding to weak, moderate, and strong turbulence parameters [36,37,38] in Table 3. All results are derived through 1 × 106 Monte Carlo simulations. Despite approximations necessitated by mathematical complexity during analytical derivation, the strong agreement between simulation and theoretical results verifies that the introduced errors are negligible. Furthermore, path loss, atmospheric turbulence, and pointing errors are accounted for in the analysis. Besides, the parameters for R-U RF link are considered as m 1 = 5 , b 1 = 0.251 , Ω 1 = 0.279 under moderate shadowing scenarios [39].
This study is based on the assumption of quasi-static channels, where turbulence correlation remains stable over the symbol duration. While time-varying turbulence effects are of practical significance, their analytical incorporation remains a research challenge that necessitates fundamental advancements in channel modeling.
Figure 2 plots the system SOP curves for the two relaying protocols versus different values of γ ¯ S R , under three turbulence conditions. The simulation parameters are set as follows: ξ = 6.7 , γ ¯ R U 1 = 15   d B , γ ¯ R U 2 = 20   d B , γ ¯ R E = 5   d B , C t h 1 = 0.1   b i t / s / H z , and C t h 2 = 0.4   b i t / s / H z . We can clearly observe that secrecy performance decreases as γ ¯ S R increases, and the mixed system employing the DF relay protocol generally demonstrates superior secrecy performance compared to that using the AF one. However, the trends of performance degradation slow down at higher values of γ ¯ S R . Additionally, the system SOP is almost the same for two relaying protocols, because the impact of noise on SOP at high SNR can be ignored. And the SOP values exhibit a decreasing trend with increasing α , β values, which is attributed to the improved secrecy performance under weaker turbulence conditions.
Figure 3 illustrates the SOP for AF and DF relaying versus γ ¯ S R under different pointing error values Herein, the system is assumed to adopt HD technology (r = 1). The parameters are set as (α, β) = (2.296, 1.822), ξ = 6.7, r = 2, C t h 1 = 0.1   b i t / s / H z , and C t h 2 = 0.4   b i t / s / H z . It can be observed that, as the average SNR γ ¯ S R increases, the system SOP decreases. The analysis further demonstrates that system SOP with HD technique is superior to that the IM/DD one. Under the condition of unchanged parameters, the secrecy performance improves significantly when the pointing error parameter decreases from ξ = 1.1 (strong pointing error) to ξ = 6.7 (weak pointing error).
Figure 4 plots the SOP versus γ ¯ S R with the different values of γ ¯ R E , with parameters set as α ,   β = ( 2.296 , 1.822 ) , ξ = 6.7 , r = 2 , C t h 1 = 0.1   b i t / s / H z , and C t h 1 = 0.4   b i t / s / H z . It can be clearly observed that high values of γ ¯ R E significantly degrade the system secrecy performance. This phenomenon stems from the inherent channel quality advantages of the legitimate links compared to the eavesdropping links. Moreover, in the high-SNR regime, the system SOP remains nearly constant as γ ¯ S R increasing, and has little impact on the system’s security performance. This is mainly because the SOP is predominantly determined by the S-R FSO link.
Figure 5 depicts the system SOP versus a 1 for both AF and DF relaying techniques, with parameters set as α ,   β = ( 2.296 , 1.822 ) , ξ = 6.7 , r = 2 , C t h 1 = 0.2   b i t / s / H z , and C t h 1 = 0.4   b i t / s / H z . It can be clearly seen that system SOP first decreases and then increases as a function of increasing a 1 values. Since an optimal power allocation coefficient exists in NOMA networks, the system can reach the best PLS performance. Furthermore, we can also find that the system employing HD ( r = 1 ) technique can achieve better security performance compared with the IM/DD ( r = 2 ) one.
As can be observed from the figures, the analytical results exhibit a strong consistency with the corresponding simulation outcomes, thereby validating the accuracy of the proposed analytical expressions.

5. Conclusions

In this article, we propose a novel secure transmission scheme for the SAGIN downlinks. Additionally, a comprehensive analysis is conducted on the security performance of the proposed NOMA-based mixed FSO-RF communication system. Assuming an eavesdropper attacks the RF link, we have derived the closed-form expression for the SOP. Furthermore, considering the effects of atmospheric turbulence and pointing errors, extensive experiments were conducted to validate the advantages of the proposed system and the accuracy of the derived SOP analytical expression. We also compare the influence of two different relaying schemes on the secure transmission performance within SAGIN. The results demonstrate that the DF relaying exhibits superior SOP performance compared to the AF relaying, while also achieving enhanced security performance through the improvement of legitimate link channel conditions. To further enhance the security and capacity of the mixed SAGIN, future research will extend to multi-antenna and massive connectivity scenarios and incorporate MIMO techniques.

Author Contributions

Formal analysis, S.Z.; data curation, Y.L. (Yongjun Li) and X.L.; writing—original draft preparation, Y.L. (Yu Li); writing—review and editing, Y.L. (Yu Li) and K.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data are contained within this article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Cheng, N.; He, J.C.; Yin, Z.S.; Zhou, C.H.; Wu, H.Q.; Lyu, F.; Zhou, H.B.; Shen, X.M. 6G service-oriented space-air-ground integrated network: A survey. Chin. J. Aeronaut. 2022, 35, 1–18. [Google Scholar] [CrossRef]
  2. Liu, J.; Shi, Y.; Fadlullah, Z.M.; Kato, N. Space-air-ground integrated network: A survey. IEEE Commun. Surv. Tutor. 2018, 20, 2714–2741. [Google Scholar] [CrossRef]
  3. Jia, Z.Y.; Sheng, M.; Li, J.D.; Zhou, D.; Han, Z. VNF-Based Service Provision in Software Defined LEO Satellite Networks. IEEE Trans. Wirel. Commun. 2021, 20, 6139–6153. [Google Scholar] [CrossRef]
  4. Hamza, A.S.; Deogun, J.S.; Alexander, D.R. Classification Framework for Free Space Optical Communication Links and Systems. IEEE Commun. Surv. Tutor. 2019, 21, 1346–1382. [Google Scholar] [CrossRef]
  5. Khalighi, M.A.; Uysal, M. Survey on Free Space Optical Communication: A Communication Theory Perspective. IEEE Commun. Surv. Tutor. 2014, 16, 2231–2258. [Google Scholar] [CrossRef]
  6. Zachár, G.; Vakulya, G.; Simon, G. Design of a VLC-based beaconing infrastructure for indoor localization applications. In Proceedings of the 2017 IEEE International Instrumentation and Measurement Technology Conference (I2MTC 2017), Turin, Italy, 22–25 May 2017. [Google Scholar]
  7. Hayal, M.R.; Elsayed, E.E.; Kakati, D.; Singh, M.; Elfikky, A.; Boghdady, A.I.; Grover, A.; Mehta, S.; Mohsan, S.A.H.; Nurhidayat, I. Modeling and Investigation on the Performance Enhancement of Hovering UAV-Based FSO Relay Optical Wireless Communication Systems under Pointing Errors and Atmospheric Turbulence Effects. Opt. Quantum Electron. 2023, 55, 1–23. [Google Scholar] [CrossRef]
  8. Yahia, O.B.; Erdogan, E.; Kurt, G.K.; Altunbas, I.; Yanikomeroglu, H. HAPS Selection for Hybrid RF/FSO Satellite Networks. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 2855–2867. [Google Scholar] [CrossRef]
  9. Zhang, Y.L.; Gao, X.Z.; Yuan, H.; Yang, K.; Kang, J.W.; Wang, P. Joint UAV trajectory and power allocation with hybrid FSO/RF for secure space–air–ground communications. IEEE Internet Things J. 2024, 11, 31407–31421. [Google Scholar] [CrossRef]
  10. Jamali, M.V.; Mahdavifar, H. Uplink Non-Orthogonal Multiple Access Over Mixed RF-FSO Systems. IEEE Trans. Wirel. Commun. 2020, 19, 3558–3574. [Google Scholar] [CrossRef]
  11. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K.-S. Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges. IEEE Commun. Surv. Tutor. 2017, 19, 721–742. [Google Scholar] [CrossRef]
  12. Bing, L.; Gu, Y.; Hu, L.; Aulin, T.; Yin, Y.; Wang, J. QoS Provision for Industrial IoT Networking: Multiantenna NOMA Based on Partial CSIT. IEEE Trans. Ind. Informatics. 2024, 20, 8239–8250. [Google Scholar] [CrossRef]
  13. Bankey, V.; Upadhyay, P.K. Physical Layer Security of Multiuser Multirelay Hybrid Satellite-Terrestrial Relay Networks. IEEE Trans. Veh. Technol. 2019, 68, 2488–2501. [Google Scholar] [CrossRef]
  14. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  15. Halima, N.B.; Boujemaa, H. Optimal Power Allocation and Harvesting Duration for Mixed RF/FSO Using Non-Orthogonal Multiple Access. Opt. Quantum Electron. 2020, 52, 442. [Google Scholar] [CrossRef]
  16. Li, R.; Chen, T.; Dang, A. Performance Analysis of a Multiuser Dual-Hop Amplify-and-Forward Relay System with FSO/RF Links. J. Opt. Commun. Netw. 2019, 11, 362–370. [Google Scholar] [CrossRef]
  17. Zhang, J.L.; Pan, X.J.; Pan, G.F.; Xie, Y.Y. Secrecy Analysis for Multi-Relaying RF-FSO Systems with A Multi-Aperture Destination. IEEE Photonics J. 2020, 12, 1–11. [Google Scholar] [CrossRef]
  18. Pattanayak, D.R.; Dwivedi, V.K.; Karwal, V.; Ansari, I.S.; Lei, H.; Alouini, M.-S. On the Physical Layer Security of a Decode and Forward Based Mixed FSO/RF Co-Operative System. IEEE Wirel. Commun. Lett. 2020, 9, 1031–1035. [Google Scholar] [CrossRef]
  19. Lei, H.J.; Luo, H.L.; Park, K.-H.; Ansari, I.S.; Lei, W.J.; Pan, G.F.; Alouini, M.-S. On Secure Mixed RF-FSO Systems with TAS and Imperfect CSI. IEEE Trans. Commun. 2020, 68, 4461–4475. [Google Scholar] [CrossRef]
  20. Liu, X.; Zhang, J.L.; Luo, W.W.; Song, J.Z.; Xie, Y.Y.; Pan, G.F. Secrecy Outage Analysis for RIS-Assisted Hybrid FSO-RF Systems with NOMA. Digit. Signal Process. 2024, 151, 104561. [Google Scholar] [CrossRef]
  21. Saber, M.J.; Mazloum, J.; Sazdar, A.M.; Keshavarz, A.; Piran, M.J. On Secure Mixed RF-FSO Decode-and-Forward Relaying Systems with Energy Harvesting. IEEE Syst. J. 2020, 14, 4402–4405. [Google Scholar] [CrossRef]
  22. Wang, X.H.; He, J.Y.; Xu, G.J.; Chen, J.J.; Gao, Y.H. Secrecy Performance of a Non-Orthogonal Multiple Access-Based Space-Air-Ground Integrated Network System with Stochastic Geometry Distribution of Terrestrial Terminals and Fog Absorption in Optical Link. Aerospace 2024, 11, 306. [Google Scholar] [CrossRef]
  23. Han, L.Q.; Wang, Y.W. Secrecy outage probability performance of mixed FSO-RF systems with nonzero-boresight pointing errors under three eavesdropping scenarios. Opt. Quantum Electron. 2025, 57, 375. [Google Scholar] [CrossRef]
  24. Singh, R.; Rawat, M.; Jaiswal, A. On the Physical Layer Security of Mixed FSO-RF SWIPT System with Non-Ideal Power Amplifier. IEEE Photonics J. 2021, 13, 1–17. [Google Scholar] [CrossRef]
  25. Odeyemi, K.O.; Owolawi, P.A. A Mixed FSO/RF Integrated Satellite-High Altitude Platform Relaying Networks for Multiple Terrestrial Users with Presence of Eavesdropper: A Secrecy Performance. Photonics 2022, 9, 32. [Google Scholar] [CrossRef]
  26. Osman, A.A.F.; Moualeu, J.M.; Takawira, F.; Yadav, K.; Upadhyay, P.K. On Secure Hybrid RF-FSO MIMO-NOMA Systems with Colluding and Non-Colluding Eavesdroppers. IEEE Wirel. Commun. Lett. 2024, 13, 2472–2476. [Google Scholar] [CrossRef]
  27. Pattanayak, D.R.; Dwivedi, V.K.; Karwal, V. On the Physical Layer Security of Hybrid RF-FSO System in Presence of Multiple Eavesdroppers and Receiver Diversity. Opt. Commun. 2020, 477, 126334. [Google Scholar] [CrossRef]
  28. Jurado-Navas, A.; Garrido-Balsells, J.M.; Paris, J.F.; Castillo-Vázquez, M.; Puerta-Notario, A. Impact of Pointing Errors on the Performance of Generalized Atmospheric Optical Channels. Opt. Express 2012, 20, 12550–12562. [Google Scholar] [CrossRef] [PubMed]
  29. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 7th ed.; Academic: San Diego, CA, USA, 2007. [Google Scholar]
  30. Wolfram, I. Mathematica Edition, Version 8.0; Wolfram Res. Inc.: Champaign, IL, USA, 2010.
  31. Ansari, I.S.; Yilmaz, F.; Alouini, M.-S. Performance Analysis of FSO Links Over Unified Gamma-Gamma-Turbulence Channels. In Proceedings of the IEEE Vehicular Technology Conference, Glasgow, UK, 11–14 May 2015; pp. 1–5. [Google Scholar]
  32. Anees, S.; Bhatnagar, M. Performance of an Amplify-and-Forward Dual-Hop Asymmetric RF–FSO Communication System. J. Opt. Commun. Networking 2015, 7, 124–135. [Google Scholar] [CrossRef]
  33. Liu, Y.W.; Qin, Z.J.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the Physical Layer Security of Non-orthogonal Multiple Access in Large-Scale Networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
  34. Davis, P.J.; Rabinowitz, P. Methods of Numerical Integration; Academic Press: New York, NY, USA, 1984. [Google Scholar]
  35. Fan, L.S.; Lei, X.F.; Yang, N.; Duong, T.Q.; Karagiannidis, G.K. Secure Multiple Amplify-and-Forward Relaying with Cochannel Interference. IEEE Internet Things J. 2016, 3, 704–714. [Google Scholar] [CrossRef]
  36. Nguyen, B.V.; Kim, K. Secrecy Outage Probability of Optimal Relay Selection for Secure AnF Cooperative Networks. IEEE Commun. Lett. 2015, 19, 2001–2004. [Google Scholar] [CrossRef]
  37. Mohammad, T.; Nasim, M.; Chahé, N. Performance Analysis of an Asymmetric Two-Hop Amplify-and-Forward Relaying RF–FSO System in a Cognitive Radio with Partial Relay Selection. Opt. Commun. 2022, 505, 127478. [Google Scholar]
  38. Zedini, E.; Kammoun, A.; Alouini, M.-S. Performance of Multibeam Very High Throughput Satellite Systems Based on FSO Feeder Links with HPA Nonlinearity. IEEE Trans. Wirel. Commun. 2020, 19, 5908–5923. [Google Scholar] [CrossRef]
  39. Swaminathan, R.; Sharma, S.; Vishwakarma, N.; Madhukumar, A.S. HAPS-Based Relaying for Integrated Space-Air-Ground Networks with Hybrid FSO/RF Communication: A Performance Analysis. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 1581–1599. [Google Scholar]
Figure 1. System model of NOMA-based space–air–ground integrated networks with mixed FSO-RF communication.
Figure 1. System model of NOMA-based space–air–ground integrated networks with mixed FSO-RF communication.
Photonics 12 01012 g001
Figure 2. SOP versus different turbulence conditions and detection techniques.
Figure 2. SOP versus different turbulence conditions and detection techniques.
Photonics 12 01012 g002
Figure 3. SOP versus different pointing errors and detection techniques.
Figure 3. SOP versus different pointing errors and detection techniques.
Photonics 12 01012 g003
Figure 4. SOP under different eavesdropping SNR values.
Figure 4. SOP under different eavesdropping SNR values.
Photonics 12 01012 g004
Figure 5. SOP versus various values of a 1 under different detection techniques.
Figure 5. SOP versus various values of a 1 under different detection techniques.
Photonics 12 01012 g005
Table 1. Literature review on some related FSO-RF systems.
Table 1. Literature review on some related FSO-RF systems.
Ref.FSORFNOMARelayMetrics
[17]Gamma-GammaNakagami-mDFSOP, SPSC
[18] Málaga   ( M )Nakagami-mDFSOP, EST
[19] Málaga   ( M )Nakagami-mDFSOP, EST
[20]Gamma-GammaNakagami-mDFSOP
[21] Málaga   ( M )Nakagami-mDFSOP, ASC
[22] Málaga   ( M )Shadowed-RicianDFSOP
[23]Fisher-SnedecorNakagami-mDFSOP
[24] Málaga   ( M )Shadowed-RicianAFSOP, EST, SPSC
[25]Gamma-GammaShadowed-RicianAFSOP, COP
[26]Gamma-GammaNakagami-mAFSOP, ASC
[27] Málaga   ( M )RayleighDFASC, SOP, EST
Table 2. List of system parameters.
Table 2. List of system parameters.
ParameterSymbolValue
Altitude of satellite H S 600 km
Altitude of UAV H R 20 km
Altitude of ground user H U 5 m
Wavelength λ 1550 nm
Conversion coefficients η S ,   η R 0.85
Pointing error coefficient ξ 1 ,   ξ 2 1.1, 6.7
Diameter of aperture at receiver D 1 m
Table 3. Atmospheric turbulence conditions.
Table 3. Atmospheric turbulence conditions.
Atmospheric TurbulenceParameter Values
Weak turbulence α = 2.902 , β = 2.510
Moderate turbulence α = 2.296 , β = 1.822
Strong turbulence α = 2.064 , β = 1.342
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, Y.; Li, Y.; Li, X.; Zhang, K.; Zhao, S. Secure Downlink Transmission with NOMA-Based Mixed FSO/RF Communications in Space–Air–Ground Integrated Networks. Photonics 2025, 12, 1012. https://doi.org/10.3390/photonics12101012

AMA Style

Li Y, Li Y, Li X, Zhang K, Zhao S. Secure Downlink Transmission with NOMA-Based Mixed FSO/RF Communications in Space–Air–Ground Integrated Networks. Photonics. 2025; 12(10):1012. https://doi.org/10.3390/photonics12101012

Chicago/Turabian Style

Li, Yu, Yongjun Li, Xin Li, Kai Zhang, and Shanghong Zhao. 2025. "Secure Downlink Transmission with NOMA-Based Mixed FSO/RF Communications in Space–Air–Ground Integrated Networks" Photonics 12, no. 10: 1012. https://doi.org/10.3390/photonics12101012

APA Style

Li, Y., Li, Y., Li, X., Zhang, K., & Zhao, S. (2025). Secure Downlink Transmission with NOMA-Based Mixed FSO/RF Communications in Space–Air–Ground Integrated Networks. Photonics, 12(10), 1012. https://doi.org/10.3390/photonics12101012

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop