Volume 15, Issue 2 (3-2023)                   itrc 2023, 15(2): 1-11 | Back to browse issues page


XML Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Falsafi S, Khodadadi H. Transmitted Data Security in Non-Orthogonal Multiple Access Networks with Directional Modulation Based on User Location. itrc 2023; 15 (2) : 1
URL: http://journal.itrc.ac.ir/article-1-542-en.html
1- Faculty of Electrical and Computer Engineering Imam Hossain Comprehensive University Tehran, Iran
2- Faculty of Electrical and Computer Engineering Imam Hossain Comprehensive University Tehran, Iran , fajr@ihu.ac.ir
Abstract:   (1707 Views)
In Non-orthogonal multiple access, a user with a weaker channel gain is assigned more power than a user with a stronger channel. This type of power allocation allows the strong user (SU) to apply the successive interference cancellation (SIC) method that first detects the symbols of the weak user (WU) before detecting its data. The SIC method makes the WU data vulnerable to eavesdropping at the SU and so increases the detection complexity. This paper studies the physical layer security of the data against eavesdropping. The proposed scheme uses directional modulation that distorts the symbols transmitted in an undesired direction therefore the external eavesdroppers receive different symbols. It becomes complicated for an external eavesdropper to track and detect the signal of legitimate users. This scheme eliminates the WU data on the location of the SU so the strong user does not need the SIC. We analyze the impacts of various factors on security, such as the number of antennas and the secrecy rate.
Article number: 1
Full-Text [PDF 1512 kb]   (593 Downloads)    
Type of Study: Research | Subject: Communication Technology

References
1. [1] R. M. Christopher and D. K. Borah, "Physical Layer Security for Weak User in MISO NOMA Using Directional Modulation (NOMAD)," IEEE Commun. Lett., vol. 24, no. 5, pp. 956-960,2020 . [DOI:10.1109/LCOMM.2020.2975193]
2. [2] M. A. Ahmed, A. Baz, and C. C. Tsimenidis, "Performance analysis of NOMA systems over Rayleigh fading channels with successive interference cancellation," IET Commun., vol. 14, no. 6, pp. 1065-1072, 2020 . [DOI:10.1049/iet-com.2019.0504]
3. [3] W. U., Khan, Z., Yu, S., Yu, G. A. S., Sidhu, & J., Liu, "Efficient power allocation in downlink multi-cell multi-user NOMA networks," IET Communications, vol.13, no. 4,pp.396-402, 2019. [DOI:10.1049/iet-com.2018.5251]
4. [4] Y. Ding and V. Fusco, "A review of directional modulation technology," Int. J. Microw. Wirel. Technol., vol. 8, no. 7, pp. 981-993, 2016 . [DOI:10.1017/S1759078715001099]
5. [5] A. H. Chang, A. Babakhani, and A. Hajimiri, "Near-field direct antenna modulation (NFDAM) transmitter at 2.4GHz," IEEE Antennas Propag. Soc. AP-S Int. Symp., pp. 2-5, 2009. [DOI:10.1109/APS.2009.5171550]
6. [6] M. P. Daly and J. T. Bernhard, "Directional modulation technique for phased arrays," IEEE Trans. Antennas Propag., vol. 57, no. 9, pp. 2633-2640, 2009. [DOI:10.1109/TAP.2009.2027047]
7. [7] J. Hu, F. Shu, and J. Li, "Robust Synthesis Method for Secure Directional Modulation with Imperfect Direction Angle," IEEE Commun. Lett., vol. 20, no. 6, pp. 1084-1087, 2016. [DOI:10.1109/LCOMM.2016.2550022]
8. [8] F. Shu, X. Wu, J. Li, R. Chen, and B. Vucetic, "Robust synthesis scheme for secure multi-beam directional modulation in broadcasting systems," IEEE Access, vol. 4, pp. 6614-6623,2016. [DOI:10.1109/ACCESS.2016.2614825]
9. [9] J. Xiong, S. Y. Nusenu, and W. Q. Wang, "Directional Modulation Using Frequency Diverse Array For Secure Communications," Wirel. Pers. Commun., vol. 95, no. 3, pp. 2679-2689, 2017. [DOI:10.1007/s11277-017-3949-1]
10. [10] P. F. Sammartino, C. J. Baker, and H. D. Griffiths, "Frequency diverse MIMO techniques for radar," IEEE Trans. Aerosp. Electron. Syst., vol. 49, no. 1, pp. 201-222, 2013. [DOI:10.1109/TAES.2013.6404099]
11. [11] J. Hu, S. Yan, F. Shu, J. Wang, J. Li, and Y. Zhang, "Artificial-Noise-Aided Secure Transmission with Directional Modulation Based on Random Frequency Diverse Arrays, "IEEE Access, vol. 5, pp. 1658-1667, 2017 . [DOI:10.1109/ACCESS.2017.2653182]
12. [12] Y. Liu, H. Ruan, L. Wang, and A. Nehorai, "The Random Frequency Diverse Array: A New Antenna Structure for Uncoupled Direction-Range Indication in Active Sensing," IEEE J. Sel. Top. Signal Process., vol. 11, no. 2, pp. 295-308, [DOI:10.1109/JSTSP.2016.2627183]
13. 2017 .
14. [13] J. Gao, Z. Yuan, B. Qiu, and J. Zhou, "Secure Multi users Directional Modulation Scheme Based on Random Frequency Diverse Arrays in Broadcasting Systems," Secure. Commun. Networks, vol. 2020, 2020 . [DOI:10.1155/2020/4198595]
15. [14] S. Wang, S. Yan, J. Zhang, N. Yang, R. Chen, and F. Shu, "Secrecy Zone Achieved by Directional Modulation with Random Frequency Diverse Array," IEEE Trans. Veh.Technol., vol. 70, no. 2, pp. 2001-2006, 2021 . [DOI:10.1109/TVT.2021.3054803]
16. [15] J. Xie, B. Qiu, Q. Wang, and J. Qu, "Broadcasting directional modulation based on random frequency diverse array," Wirel.Commun. Mob. Comput., vol. 2019, 2019 . [DOI:10.1155/2019/5051490]
17. [16] Y. Ding and V. Fusco, "Orthogonal vector approach for the synthesis of multi-beam directional modulation transmitters," IEEE Antennas Wirel. Propag. Lett., vol. 14, no. March, pp.1330-1333, 2015. [DOI:10.1109/LAWP.2015.2404818]
18. [17] Y. Ding and V. F. Fusco, "Directional modulation far-field pattern separation synthesis approach," IET Microwaves,Antennas Propag., vol. 9, no. 1, pp. 41-48, 2015 . [DOI:10.1049/iet-map.2014.0331]
19. [18] M. Hafez, M. Yusuf, T. Khattab, T. Elfouly, and H. Arslan, "Secure Spatial Multiple Access Using Directional Modulation," IEEE Trans. Wirel. Commun., vol. 17, no. 1, pp.563-573, 2018 . [DOI:10.1109/TWC.2017.2768419]
20. [19] Cejudo, E. C., Zhu, H., & Alluhaibi, "On the power allocation and constellation selection in downlink NOMA. IEEE 86th Vehicular Technology Conference (VTC-Fall) (pp. 1-5).IEEE, 2017. [DOI:10.1109/VTCFall.2017.8288077]

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.