Secure Advanced NOMA

TUBITAK FUNDED RESEARCH PROJECT – # 119E392

Novel Advanced Non-Orthogonal Multiple Access Schemes for Enhancing Communication Security and Reliability of Future Low-complexity, Massive Machine-Type Communications

Project Summary: Non-orthogonal multiple access (NOMA) has received significant attention for 5G and beyond wireless communication systems due to its unique properties and favorable features such as high spectral efficiency, low latency, improved coverage, massive connectivity, fairness, and so on. These multiple obtained advantages provided by NOMA make it a suitable candidate scheme for future massive machine type communication (m-MTC) to be served and provided by 5G and beyond networks. (Challenges) However, the conventional NOMA scheme in its current form, which has already been adopted under the name MUST (multi-user superposition transmission) in the 3GPP standard release 13 [LTE Advanced Pro.] and is being improved in terms of receiver design so that it can be included in 3GPP-release 16 [5G], suffers from the following security risks and drawbacks: How are these challenges addressed in the literature? (Originality) The conventional solutions adopted by the industry to provide secure communication in NOMA and other wireless technologies are based on cryptography. However, these solutions are deemed not suitable for NOMA communication due to many reasons related to the extreme difficulties that would be encountered in key sharing, management, and maintenance processes for a massive number of low-complexity devices (e.g., IoT). This would result in creating signaling overhead, delay, and complexity, which are conflicting with the IoT requirements represented by simplicity, low complexity, and high-power efficiency. To address this challenge, researchers have recently proposed the use of physical layer security schemes due to their features that can fit the NOMA-mMTC requirements. However, the existing physical layer security schemes for NOMA in the literature are either limited to the case of external eavesdropping and not capable of providing perfect secrecy or based on cryptography-based approaches that require key sharing and high processing and computing capabilities. (Novel problem statement - research question) To the best of our knowledge, there are no available physical layer security schemes for NOMA in the literature that can provide perfect secrecy at the physical layer against both external and internal eavesdroppers simultaneously without using key sharing and encryption.  What are we proposing? In this project proposal, we propose novel advanced NOMA (A-NOMA) schemes and designs that can simultaneously address the previously mentioned security problems associated with conventional NOMA. How do the proposed methods work in the considered system model? Particularly, we propose two main approaches: 1- advanced NOMA with special signal precoding, 2) advanced NOMA with auxiliary signal superposition, where each approach is intended to be designed for the scenarios of SISO (with time diversity enabled by ARQ) and MISO (with spatial diversity, enabled by transmitting the same composite signal from different antennas). This will result in generating four novel designs, that will be implemented by means of simulations, and then deeply investigated and analyzed. What are the other advantages and trade-offs of the proposed methods? Besides the capability of the proposed schemes in providing robust, perfect physical layer security against both external and internal eavesdroppers simultaneously without using key sharing or encryption, it is expected that these schemes can provide additional desirable advantages with respect to conventional NOMA. Particularly, the proposed designs can solve the following main drawbacks related to conventional NOMA: The reliability performance (measured by bit error rate) of receiver users in conventional NOMA scheme is lower than that of orthogonal multiple access (OMA). The proposed designs will make sure that the reliability of NOMA is the same as that of OMA. Conventional NOMA can work only for the cases when there is a significant path-loss channel difference between paired (or super-imposed) users. This necessitates having a user near the base station (i.e., strong channel) and another user far from the base station (i.e., weak channel). Consequently, this limits the applicability of NOMA in general scenarios, where two users may have the same pathloss due to being located at a similar distance from the base station (BS). The proposed designs will make sure that NOMA can work for any two users, regardless of their distances from BS. Near users in conventional NOMA must use successive interference cancelation (SIC) to cancel the inter-user interference caused by the NOMA structure. This results in complicating the receiver structure and making it not very attractive for low-complexity IoT devices that have minimal processing and power resources. The proposed designs will not need SIC at the receivers due to the ability of the new schemes to cancel the interference by means of signal precoding and signal superposition.

Keywords: Wireless Security, Physical Layer Security, Wireless Communication Networks, 5G, m-MTC, IoT, Non-Orthogonal Multiple-Access (NOMA), Automatic-Repeat-Request (ARQ), SISO, MISO.

Project Outputs and Contributions

Journal Publications:

Article PDF: https://doi.org/10.46470/03d8ffbd.86b0d106

Implementation codes (MATLAB SIMULATION FILES): https://researcherstore.com/product/novel-small-scale-noma-communication-technique-using-auxiliary-signal-superposition-simulation-codes/

Related thesis defense presentation video: https://www.youtube.com/watch?v=Jhi4JntqnF4 



Article PDF: https://doi.org/10.46470/03d8ffbd.19888ce7

Implementation codes (MATLAB SIMULATION FILES): https://researcherstore.com/product/simulation-codes-of-an-advanced-noma-security-design-with-signal-pre-coding-and-simultaneous-transmission-using-antenna-diversity/ 

Related thesis defense presentation video: https://www.youtube.com/watch?v=iHRECm6qio0 



Article PDF: https://doi.org/10.46470/03d8ffbd.92a40b85

Implementation codes (MATLAB SIMULATION FILES): https://researcherstore.com/product/multi-user-auxiliary-signal-superposition-transmission-mu-as-st/ 

Related thesis defense presentation video: https://www.youtube.com/watch?v=MnhDqVZ1kU0 



Article PDF: https://doi.org/10.46470/03d8ffbd.08b7bd1d

Implementation codes (MATLAB SIMULATION FILES): https://researcherstore.com/product/simulation-codes-of-multi-cell-secure-communication-using-non-orthogonal-signals-superposition-with-dual-transmission-for-iot-in-6g-and-beyond/ 

Related thesis defense presentation video: https://www.youtube.com/watch?v=iHRECm6qio0  



Article PDF: https://doi.org/10.46470/03d8ffbd.324cc0fb



Conference Publications:




Master Theses:




Other Related Theses:





Training Courses and Tutorials: