{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T02:28:54Z","timestamp":1705890534133},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,6,12]],"date-time":"2021-06-12T00:00:00Z","timestamp":1623456000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,6,12]],"date-time":"2021-06-12T00:00:00Z","timestamp":1623456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"Abstract<\/jats:title>This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a trusted decode-and-forward (DF) HD relay is used in this system to improve the spectral efficiency. In order to prevent the untrusted relay from eavesdropping, a simple and practical cooperative jamming scheme is designed to confuse the untrusted relay. The exact expressions of effective secrecy throughput (EST) for NOMA users and approximate expression of EST for non-NOMA user are derived. All theoretical results are validated by numerical simulations which demonstrate that the proposed VFD-NOMA scheme is superior to existing HD-NOMA scheme in cooperative system and jamming plays an important role for obtaining acceptable EST. In addition, simulation results shows that the best secrecy performance highly depends on the system parameters such as transmit powers and jamming signal power.<\/jats:p>","DOI":"10.1186\/s13638-021-02009-y","type":"journal-article","created":{"date-parts":[[2021,6,12]],"date-time":"2021-06-12T13:02:53Z","timestamp":1623502973000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the performance of physical layer security in virtual full-duplex non-orthogonal multiple access system"],"prefix":"10.1186","volume":"2021","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4149-6391","authenticated-orcid":false,"given":"Weidong","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yuxi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,12]]},"reference":[{"key":"2009_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MCOM.001.1900713","volume":"58","author":"B Selim","year":"2020","unstructured":"B. Selim, M.S. Alam, J.V.C. Evangelista, G. Kaddoum, B.L. Agba, NOMA-based IoT networks: impulsive noise effects and mitigation. IEEE Commun. Mag. 58, 69\u201375 (2020)","journal-title":"IEEE Commun. Mag."},{"key":"2009_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.2018.1700094","volume":"25","author":"MS Ali","year":"2018","unstructured":"M.S. Ali, E. Hossain, D.I. Kim, Coordinated multipoint transmission in downlink multi-cell NOMA systems: models and spectral efficiency performance. IEEE Wirel. Commun. 25, 24\u201331 (2018)","journal-title":"IEEE Wirel. Commun."},{"key":"2009_CR3","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/LWC.2016.2574709","volume":"5","author":"Z Ding","year":"2016","unstructured":"Z. Ding, H. Dai, H.V. Poor, Relay selection for cooperative NOMA. IEEE Wirel. Commun. Lett. 5, 416\u2013419 (2016)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"2009_CR4","doi-asserted-by":"publisher","first-page":"6750","DOI":"10.1109\/TCOMM.2020.3017002","volume":"68","author":"X Pei","year":"2020","unstructured":"X. Pei, H. Yu, M. Wen, S. Mumtaz, S.A. Otaibi, M. Guizani, NOMA-based coordinated direct and relay transmission with a half-duplex\/full-duplex relay. IEEE Trans. Commun. 68, 6750\u20136760 (2020)","journal-title":"IEEE Trans. Commun."},{"key":"2009_CR5","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/LCOMM.2015.2411596","volume":"19","author":"Q Wang","year":"2015","unstructured":"Q. Wang, Y. Dong, X. Xu, X. Tao, Outage probability of full-duplex AF relaying with processing delay and residual self-interference. IEEE Commun. Lett. 19, 783\u2013786 (2015)","journal-title":"IEEE Commun. Lett."},{"key":"2009_CR6","doi-asserted-by":"publisher","first-page":"3628","DOI":"10.1109\/TVT.2010.2050503","volume":"59","author":"T Kwon","year":"2010","unstructured":"T. Kwon, S. Lim, S. Choi, D. Hong, Optimal duplex mode for DF relay in terms of the outage probability. IEEE Trans. Veh. Technol. 59, 3628\u20133634 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2009_CR7","doi-asserted-by":"publisher","first-page":"10123","DOI":"10.1109\/TVT.2018.2864545","volume":"67","author":"Z Wei","year":"2018","unstructured":"Z. Wei, X. Zhu, S. Sun, J. Wang, L. Hanzo, Energy-efficient full-duplex cooperative nonorthogonal multiple access. IEEE Trans. Veh. Technol. 67, 10123\u201310128 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2009_CR8","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/LCOMM.2020.3030210","volume":"25","author":"J Jose","year":"2021","unstructured":"J. Jose, P. Shaik, V. Bhatia, VFD-NOMA under imperfect SIC and residual inter-Relay interference over generalized nakagami-m fading channels. IEEE Commun. Lett. 25, 646\u2013650 (2021)","journal-title":"IEEE Commun. Lett."},{"key":"2009_CR9","doi-asserted-by":"publisher","first-page":"4296","DOI":"10.1109\/TWC.2012.102612.111278","volume":"11","author":"M Duarte","year":"2012","unstructured":"M. Duarte, C. Dick, A. Sabharwal, Experiment-driven characterization of full-duplex wireless systems. IEEE Trans. Wirel. Commun. 11, 4296\u20134307 (2012)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"2009_CR10","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TCOMM.2017.2749400","volume":"66","author":"X Yue","year":"2017","unstructured":"X. Yue, Y. Liu, S. Kang, A. Nallanathan, Z. Ding, Exploiting full\/half duplex user relaying in NOMA systems. IEEE Trans. Commun. 66, 560\u2013575 (2017)","journal-title":"IEEE Trans. Commun."},{"key":"2009_CR11","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/LWC.2017.2785303","volume":"7","author":"Q Liau","year":"2018","unstructured":"Q. Liau, C. Leow, Z. Ding, Amplify-and-forward virtual full-duplex relaying-based cooperative NOMA. IEEE Wirel. Commun. Lett. 7, 464\u2013467 (2018)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"2009_CR12","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Y. Zou, J. Zhu, X. Wang, L. Hanzo, A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104, 1727\u20131765 (2016)","journal-title":"Proc. IEEE"},{"key":"2009_CR13","doi-asserted-by":"publisher","first-page":"11323","DOI":"10.1109\/TVT.2020.3010008","volume":"69","author":"JT Lim","year":"2020","unstructured":"J.T. Lim, K. Lee, Y. Han, Secure communication with outdated channel state information via untrusted relay capable of energy harvesting. IEEE Trans. Veh. Technol. 69, 11323\u201311337 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2009_CR14","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/TCOMM.2018.2802951","volume":"66","author":"A Kuhestani","year":"2018","unstructured":"A. Kuhestani, A. Mohammadi, P.L. Yeoh, Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer. IEEE Trans. Commun. 66, 2671\u20132684 (2018)","journal-title":"IEEE Trans. Commun."},{"key":"2009_CR15","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"M Mukherjee","year":"2018","unstructured":"M. Mukherjee, S.A.A. Fakoorian, J. Huang, A.L. Swindlehurst, Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16, 1550\u20131573 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"2009_CR16","doi-asserted-by":"publisher","first-page":"12447","DOI":"10.1109\/TVT.2018.2878236","volume":"67","author":"Y Choi","year":"2018","unstructured":"Y. Choi, J.H. Lee, A new cooperative jamming technique for a two-hop amplify-and-forward relay network with an eavesdropper. IEEE Trans. Veh. Technol. 67, 12447\u201312451 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2009_CR17","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/LWC.2017.2756885","volume":"7","author":"F Ding","year":"2018","unstructured":"F. Ding, H. Wang, Y. Zhou, C. Zheng, Impact of relay\u2019s eavesdropping on untrusted amplify-and-forward networks over Nakagami-m fading. IEEE Wirel. Commun. Lett. 7, 102\u2013105 (2018)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"2009_CR18","doi-asserted-by":"publisher","first-page":"2682","DOI":"10.1109\/TVT.2019.2895911","volume":"68","author":"C Yuan","year":"2019","unstructured":"C. Yuan, X. Tao, N. Li, W. Ni, R. Liu, P. Zhang, Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming. IEEE Trans. Veh. Technol. 68, 2682\u20132696 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2009_CR19","doi-asserted-by":"publisher","first-page":"5574","DOI":"10.1109\/TCOMM.2019.2914210","volume":"67","author":"Y Cao","year":"2019","unstructured":"Y. Cao, N. Zhao, G. Pan, Y. Chen, L. Fan, M. Jin, M. Alouini, Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay. IEEE Trans. Commun. 67, 5574\u20135587 (2019)","journal-title":"IEEE Trans. Commun."},{"key":"2009_CR20","first-page":"1","volume":"15","author":"A Arafa","year":"2018","unstructured":"A. Arafa, W. Shin, M. Vaezi, H.V. Poor, Secure relaying in non-orthogonal multiple access: trusted and untrusted scenarios. IEEE Trans. Inf. Forensics Secur. 15, 1\u201329 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2009_CR21","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"A.D. Wyner, The wire-tap channel. Bell Syst. Tech. J. 54, 1355\u20131387 (1975)","journal-title":"Bell Syst. Tech. J."},{"key":"2009_CR22","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/LWC.2019.2899309","volume":"8","author":"Z Xiang","year":"2019","unstructured":"Z. Xiang, W. Yang, G. Pan, Y. Cai, X. Sun, Secure transmission in non-orthogonal multiple access networks with an untrusted relay. IEEE Wirel. Commun. Lett. 8, 905\u2013908 (2019)","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"2009_CR23","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TWC.2017.2650987","volume":"16","author":"Y Liu","year":"2017","unstructured":"Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, L. Hanzo, Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 16, 1656\u20131672 (2017)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"2009_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/740912","volume":"2009","author":"Z Han","year":"2009","unstructured":"Z. Han, N. Marina, M. Debbah, A. Hjrungnes, Physical layer security game: interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wirel. Commun. Netw. 2009, 1\u201310 (2009)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"#cr-split#-2009_CR25.1","doi-asserted-by":"crossref","unstructured":"D. Fang, N. Yang, M. Elkashlan, P.L. Yeoh, J. Yuan, Cooperative jamming protocols in two hop amplify-and-forward wiretap channels, in Proceedings of IEEE International Conference on Communications (ICC), June 9-13 2013","DOI":"10.1109\/ICC.2013.6654852"},{"key":"#cr-split#-2009_CR25.2","unstructured":"Budapest, Hungary, pp. 2188-2192 (2013)"},{"key":"2009_CR26","doi-asserted-by":"publisher","first-page":"1714","DOI":"10.1109\/TII.2015.2489610","volume":"12","author":"H Zhang","year":"2016","unstructured":"H. Zhang, H. Xing, J. Cheng, A. Nallanathan, V.C.M. Leung, Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Ind. Informat. 12, 1714\u20131725 (2016)","journal-title":"IEEE Trans. Ind. Informat."},{"key":"2009_CR27","doi-asserted-by":"publisher","first-page":"3693","DOI":"10.1109\/TVT.2012.2209692","volume":"61","author":"R Zhang","year":"2012","unstructured":"R. Zhang, L. Song, Z. Han, B. Jiao, Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Trans. Veh. Technol. 61, 3693\u20133704 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2009_CR28","doi-asserted-by":"publisher","first-page":"5937","DOI":"10.1109\/TSP.2008.2005084","volume":"56","author":"F Gao","year":"2008","unstructured":"F. Gao, T. Cui, A. Nallanathan, Optimal training design for channel estimation in decode-and-forward relay networks with individual and total power constraints. IEEE Trans. Signal Process. 56, 5937\u20135949 (2008)","journal-title":"IEEE Trans. Signal Process."},{"key":"2009_CR29","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1109\/TWC.2013.013013.120768","volume":"12","author":"S Zhang","year":"2013","unstructured":"S. Zhang, F. Gao, C. Pei, X. He, Segment training based individual channel estimation in one-way relay network with power allocation. IEEE Trans. Wirel. Commun. 12, 1300\u20131309 (2013)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"2009_CR30","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/LCOMM.2016.2601320","volume":"20","author":"G Dou","year":"2016","unstructured":"G. Dou, X. He, R. Deng, J. Gao, Z. Cui, Individual channel estimation for AF-based relaying systems using in-band pilots. IEEE Commun. Lett. 20, 2201\u20132204 (2016)","journal-title":"IEEE Commun. Lett."},{"key":"2009_CR31","volume-title":"Table of Integrals, Series and Products","author":"I Gradshteyn","year":"1994","unstructured":"I. Gradshteyn, I. Ryzhik, Table of Integrals, Series and Products (Academic Press, San Diego, 1994)"},{"key":"2009_CR32","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/LCOMM.2015.2474856","volume":"19","author":"JB Kim","year":"2015","unstructured":"J.B. Kim, I.H. Lee, Non-orthogonal multiple access in coordinated direct and relay transmission. IEEE Commun. Lett. 19, 2037\u20132040 (2015)","journal-title":"IEEE Commun. Lett."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-02009-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-021-02009-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-02009-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,12]],"date-time":"2021-06-12T13:08:23Z","timestamp":1623503303000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-021-02009-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,12]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["2009"],"URL":"https:\/\/doi.org\/10.1186\/s13638-021-02009-y","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,12]]},"assertion":[{"value":"21 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"137"}}