eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/enhancing the physical layer... · 1656 ieee transactions on...

17
1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks Yuanwei Liu, Member, IEEE, Zhijin Qin, Member, IEEE, Maged Elkashlan, Member, IEEE, Yue Gao, Senior Member, IEEE , and Lajos Hanzo, Fellow, IEEE Abstract— This paper investigates the physical layer security of non-orthogonal multiple access (NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and multiple-antenna aided transmission scenarios are considered, where the base station (BS) communicates with randomly dis- tributed NOMA users. In the single-antenna scenario, we adopt a protected zone around the BS to establish an eavesdropper- exclusion area with the aid of careful channel ordering of the NOMA users. In the multiple-antenna scenario, artificial noise is generated at the BS for further improving the security of a beamforming-aided system. In order to characterize the secrecy performance, we derive new exact expressions of the security outage probability for both single-antenna and multiple-antenna aided scenarios. For the single-antenna scenario, we perform secrecy diversity order analysis of the selected user pair. The analytical results derived demonstrate that the secrecy diversity order is determined by the specific user having the worse channel condition among the selected user pair. For the multiple-antenna scenario, we derive the asymptotic secrecy outage probability, when the number of transmit antennas tends to infinity. Monte Carlo simulations are provided for verifying the analytical results derived and to show that: 1) the security performance of the NOMA networks can be improved by invoking the protected zone and by generating artificial noise at the BS and 2) the asymptotic secrecy outage probability is close to the exact secrecy outage probability. Index Terms— Artificial noise, physical layer security, non-orthogonal multiple access, stochastic geometry. I. I NTRODUCTION T HE unprecedented expansion of new Internet-enabled smart devices, applications and services is expediting the development of the fifth generation (5G) networks, which aim for substantially increasing the throughput of the fourth Manuscript received May 24, 2016; revised November 13, 2016 and January 3, 2017; accepted January 7, 2017. Date of publication January 10, 2017; date of current version March 8, 2017. This work was supported by the EPSRC project EP/N029666/1. The work of L. Hanzo was supported by the European Research Council BeamMeUp Advanced Fellow Grant. This paper was presented at the IEEE International Conference on Communications, Kuala Lumpur, Malaysia, May 2016 [1]. The associate editor coordinating the review of this paper and approving it for publication was C. Zhong. Y. Liu, Z. Qin, M. Elkashlan, and Y. Gao are with the Queen Mary Uni- versity of London, London E1 4NS, U.K. (e-mail: [email protected]; [email protected]; [email protected]; [email protected]). L. Hanzo is with the University of Southampton, Southampton SO17 1BJ, U.K. (e-mail: [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TWC.2017.2650987 generation (4G) networks. In addition to the key technologies such as large-scale multiple-input multiple-output (MIMO) solutions, heterogeneous networks and millimeter wave, as well as novel multiple access (MA) techniques should be invoked for improving the spectral efficiency. The existing MA techniques can be primarily classified into two main cate- gories, namely orthogonal multiple access and non-orthogonal multiple access (NOMA), by distinguishing whether a specific resource block can be occupied by more than one user [2]. More specifically, upon investigating the multiplexing gain gleaned from the different domains, the NOMA technique can be further classified as code-domain NOMA and power- domain NOMA [3]. Power-domain NOMA 1 , which has been recently proposed for the 3GPP Long Term Evolution (LTE) initiative [4], is deemed to have a superior spectral effi- ciency [5], [6]. It has also been pointed out that NOMA has the potential to be integrated with existing MA paradigms, since it exploits the new dimension of the power domain. The key idea of NOMA is to ensure that multiple users can be served within a given resource slot (e.g., time/frequency), by applying successive interference cancellation (SIC). The concept of SIC, which was first proposed by Cover in 1972 [7], constitutes a promising technique, since it imposes lower complexity than the joint decoding approach [8]. Hence NOMA techniques have received remarkable atten- tion both in the world of academia and industry [9]–[13]. Ding et al. [9] investigated the performance of the NOMA downlink for randomly roaming users. It was shown that NOMA is indeed capable of achieving a better performance than their traditional orthogonal multiple access (OMA) counter parts. By considering the user fairness of a NOMA system, a user-power allocation optimization problem was addressed by Timotheou and Krikidis [10]. A cooperative simultaneous wireless power transfer (SWIPT) aided NOMA protocol was proposed by Liu et al. [11], where a NOMA user benefitting from good channel conditions acts as an energy harvesting source in order to assist a NOMA user suffering from poor channel conditions. With the goal of maximizing the energy efficiency of transmission in multi-user downlink NOMA sce- narios, Zhang et al. [14] proposed an efficient power allocation technique capable of supporting the data rate required by each 1 Hence in this paper, we focus our attention on the family of power-domain NOMA schemes. We simply use “NOMA" to refer to “power-domain NOMA" in the following. 1536-1276 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: others

Post on 02-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017

Enhancing the Physical Layer Security ofNon-Orthogonal Multiple Access in

Large-Scale NetworksYuanwei Liu, Member, IEEE, Zhijin Qin, Member, IEEE, Maged Elkashlan, Member, IEEE,

Yue Gao, Senior Member, IEEE, and Lajos Hanzo, Fellow, IEEE

Abstract— This paper investigates the physical layer security ofnon-orthogonal multiple access (NOMA) in large-scale networkswith invoking stochastic geometry. Both single-antenna andmultiple-antenna aided transmission scenarios are considered,where the base station (BS) communicates with randomly dis-tributed NOMA users. In the single-antenna scenario, we adopta protected zone around the BS to establish an eavesdropper-exclusion area with the aid of careful channel ordering of theNOMA users. In the multiple-antenna scenario, artificial noiseis generated at the BS for further improving the security of abeamforming-aided system. In order to characterize the secrecyperformance, we derive new exact expressions of the securityoutage probability for both single-antenna and multiple-antennaaided scenarios. For the single-antenna scenario, we performsecrecy diversity order analysis of the selected user pair. Theanalytical results derived demonstrate that the secrecy diversityorder is determined by the specific user having the worse channelcondition among the selected user pair. For the multiple-antennascenario, we derive the asymptotic secrecy outage probability,when the number of transmit antennas tends to infinity. MonteCarlo simulations are provided for verifying the analytical resultsderived and to show that: 1) the security performance of theNOMA networks can be improved by invoking the protectedzone and by generating artificial noise at the BS and 2) theasymptotic secrecy outage probability is close to the exact secrecyoutage probability.

Index Terms— Artificial noise, physical layer security,non-orthogonal multiple access, stochastic geometry.

I. INTRODUCTION

THE unprecedented expansion of new Internet-enabledsmart devices, applications and services is expediting

the development of the fifth generation (5G) networks, whichaim for substantially increasing the throughput of the fourth

Manuscript received May 24, 2016; revised November 13, 2016 andJanuary 3, 2017; accepted January 7, 2017. Date of publicationJanuary 10, 2017; date of current version March 8, 2017. This work wassupported by the EPSRC project EP/N029666/1. The work of L. Hanzo wassupported by the European Research Council BeamMeUp Advanced FellowGrant. This paper was presented at the IEEE International Conference onCommunications, Kuala Lumpur, Malaysia, May 2016 [1]. The associateeditor coordinating the review of this paper and approving it for publicationwas C. Zhong.

Y. Liu, Z. Qin, M. Elkashlan, and Y. Gao are with the Queen Mary Uni-versity of London, London E1 4NS, U.K. (e-mail: [email protected];[email protected]; [email protected]; [email protected]).

L. Hanzo is with the University of Southampton, Southampton SO17 1BJ,U.K. (e-mail: [email protected]).

Color versions of one or more of the figures in this paper are availableonline at http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TWC.2017.2650987

generation (4G) networks. In addition to the key technologiessuch as large-scale multiple-input multiple-output (MIMO)solutions, heterogeneous networks and millimeter wave, aswell as novel multiple access (MA) techniques should beinvoked for improving the spectral efficiency. The existingMA techniques can be primarily classified into two main cate-gories, namely orthogonal multiple access and non-orthogonalmultiple access (NOMA), by distinguishing whether a specificresource block can be occupied by more than one user [2].More specifically, upon investigating the multiplexing gaingleaned from the different domains, the NOMA techniquecan be further classified as code-domain NOMA and power-domain NOMA [3]. Power-domain NOMA1, which has beenrecently proposed for the 3GPP Long Term Evolution (LTE)initiative [4], is deemed to have a superior spectral effi-ciency [5], [6]. It has also been pointed out that NOMA has thepotential to be integrated with existing MA paradigms, sinceit exploits the new dimension of the power domain. The keyidea of NOMA is to ensure that multiple users can be servedwithin a given resource slot (e.g., time/frequency), by applyingsuccessive interference cancellation (SIC). The concept of SIC,which was first proposed by Cover in 1972 [7], constitutes apromising technique, since it imposes lower complexity thanthe joint decoding approach [8].

Hence NOMA techniques have received remarkable atten-tion both in the world of academia and industry [9]–[13]. Dinget al. [9] investigated the performance of the NOMA downlinkfor randomly roaming users. It was shown that NOMA isindeed capable of achieving a better performance than theirtraditional orthogonal multiple access (OMA) counter parts.By considering the user fairness of a NOMA system, auser-power allocation optimization problem was addressedby Timotheou and Krikidis [10]. A cooperative simultaneouswireless power transfer (SWIPT) aided NOMA protocol wasproposed by Liu et al. [11], where a NOMA user benefittingfrom good channel conditions acts as an energy harvestingsource in order to assist a NOMA user suffering from poorchannel conditions. With the goal of maximizing the energyefficiency of transmission in multi-user downlink NOMA sce-narios, Zhang et al. [14] proposed an efficient power allocationtechnique capable of supporting the data rate required by each

1Hence in this paper, we focus our attention on the family of power-domainNOMA schemes. We simply use “NOMA" to refer to “power-domain NOMA"in the following.

1536-1276 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

LIU et al.: ENHANCING THE PLS OF NOMA IN LARGE-SCALE NETWORKS 1657

user. To further improve the performance of NOMA systems,multiple antennas were introduced in [12] and [13]. Moreparticularly, the application of multiple-input single-output(MISO) solution to NOMA was investigated by Choi [12],where a two-stage beamforming strategy was proposed. Poweroptimization was invoked by Sun et al. [13] for maximizing theergodic capacity of MIMO aided NOMA systems. As a furtheradvance, a massive multiple-input multiple-output (MIMO)aided hybrid heterogenous NOMA framework was proposedfor downlink transmission by Liu et al. [15]. The impact ofthe locations of users and interferers was investigated by usingstochastic geometry approaches.

Given the broadcast nature of wireless transmissions, theconcept of physical (PHY) layer security (PLS) was proposedby Wyner as early as 1975 from an information-theoreticalperspective [16]. This research topic has sparked of wide-spread recent interests. To elaborate, PLS has been consideredfrom a practical perspective in [17]–[21]. Specifically, robustbeamforming transmission was conceived in conjunction withapplying artificial noise (AN) for mitigating the impact ofimperfect channel state information (CSI) in MIMO wiretapchannels was proposed by Mukherjee and Swindlehurst [17].Ding et al. [18] invoked relay-aided cooperative diversity forincreasing the capacity of the desired link. More particularly,the impact of eavesdroppers on the diversity and multiplexinggains was investigated both in single-antenna and multiple-antenna scenarios. Additionally, the tradeoffs between secureperformance and reliability in the presence of eavesdroppingattacks was identified by Zou et al. [20]. Furthermore, thephysical layer security of D2D communication in large-scalecognitive radio networks was investigated by Liu et al. [21]with invoking a wireless power transfer model, wherethe positions of the power beacons, the legitimate andthe eavesdropping nodes were modeled using stochasticgeometry.

Recently, various PHY layer techniques, such as cooperativejamming [22] and AN [23] aided solutions were proposedfor improving the PLS, even if the eavesdroppers have betterchannel conditions than the legitimate receivers. A populartechnique is to generate AN at the transmitter for degradingthe eavesdroppers’ reception, which was proposed by Goel andNegi [23]. In contrast to the traditional view, which regardsnoise and interference as a detrimental effect, generatingAN at the transmitter is capable of improving the security,because it degrades the channel conditions of eavesdropperswithout affecting those of the legitimate receivers. An AN-based multi-antenna aided secure transmission scheme affectedby colluding eavesdroppers was considered by Zhou andMcKay [24] for the scenarios associated both with perfect andimperfect CSI at both the transmitter and receiver. As a furtherdevelopment, the secrecy enhancement achieved in wirelessAd Hoc networks was investigated by Zhang et al. [25],with the aid of both beamforming and sectoring techniques.By simultaneously considering matched filter precoding andAN generation techniques, the secure transmission strategiesfor a multi-user massive MIMO systems was investigated byWu et al. [26]. Very recently, the PLS of a single-input single-output (SISO) NOMA system was studied by Zhang et al. [27],

with the objective of maximizing the secrecy sum rate ofmultiple users.

A. Motivation and Contribution

As mentioned above, PLS has been studied in variousscenarios, but there is still a paucity of research contributionson investigating the security issues of NOMA, which motivatesthis contribution. Note that the employment of SIC in NOMAresults in a unique interference status at the receivers, whichmakes the analysis of the PLS of NOMA different from thatof OMA. In this paper, we specifically consider the scenarioof large-scale networks, where a base station (BS) supportsrandomly roaming NOMA users. In order to avoid sophisti-cated high-complexity message detection at the receivers, auser pairing technique is adopted for ensuring that only twousers share a specific orthogonal resource slot, which can bereadily separated by low-complexity SIC. A random numberof eavesdroppers are randomly positioned on an infinite two-dimensional plane according to a homogeneous Poisson pointprocess (PPP). An eavesdropper-exclusion zone is introducedaround the BS for improving the secrecy performance of thelarge-scale networks considered in which no eavesdroppers areallowed to roam. This ‘disc’ was referred to as a protected zonein [25], [28], and [29]. Specifically, we consider both a single-antenna scenario and a multiple-antenna scenario at the basestation (BS). 1) For the single-antenna scenario, M NOMAusers are randomly roaming in an finite disc (user zone) withthe quality-order of their channel conditions known at the BS.For example, the m-th NOMA user is channel-quality orderof m. In this case, the m-th user is paired with the n-thuser for transmission within the same resource slot; 2) Forthe multiple-antenna scenario, we invoke beamforming at theBS for generating AN. In order to reduce the complexity ofchannel ordering of MISO channels for NOMA, we partitionedthe circular cell of Fig. 1 into an internal disc and an externalring. We select one user from the internal disc and anotherfrom the external ring to be paired together for transmissionwithin the same resource slot using a NOMA protocol. Theprimary contributions of this paper are as follows:

• We investigate the secrecy performance of large-scaleNOMA networks both for a single-antenna aided and amultiple-antenna assisted scenario at the BS. A protectedzone synonymously referred to as the eavesdropper-exclusion area, is invoked in both scenarios for improvingthe PLS. Additionally, we propose to generate AN atthe BS in the multiple-antenna aided scenario for furtherenhancing the secrecy performance.

• For the single-antenna scenario, we derive the exactanalytical expressions of the secrecy outage probabil-ity (SOP) of the selected pair of NOMA users, whenrelying on channel ordering. We then further extend onthe secrecy diversity analysis and derive the expressionsof asymptotic SOP. The results derived confirm that:1) for the selected pair, the m-th user is capable ofattaining a secrecy diversity order of m; 2) the secrecydiversity order is determined by the one associated withthe worse channel condition between the paired users.

Page 3: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

1658 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017

Fig. 1. Network model for secure NOMA transmission in single-antennascenario, where rp , RD , and ∞ is the radius of the Eve-exclusion area,NOMA user zone, and an infinite two dimensional plane for Eves, respectively.

• For the multiple-antenna scenario, we derive the exactanalytical expressions of the SOP in conjunction with ANgenerated at the BS. To gain further insights, we assumehaving a large antenna array and derive the expressionsof SOP, when the number of antennas tends to infinity.The results derived confirm that increasing the numberof antennas has no effect on the received signal-to-interference-plus-noise ratio (SINR) at the eavesdroppers,when the BS is equipped with a large antenna array.

• It is shown that: 1) the SOP can be reduced both byextending the protected zone and by generating AN at theBS; 2) the asymptotic SOP results of our large antennaarray analysis is capable of closely approximating theexact secrecy outage probability; 3) there is an optimaldesired signal-power and AN power sharing ratio, whichminimizes the SOP in the multi-antenna scenario.

B. Organization

The rest of the paper is organized as follows. In Section II, asingle-antenna transmission scenario is investigated in randomwireless networks, where channel ordering of the NOMA usersis relied on. In Section III, a multiple-antenna transmissionscenario is investigated, which relies on generating AN at theBS. Our numerical results are presented in Section IV forverifying our analysis, which is followed by our conclusionsin Section V.

II. PHYSICAL LAYER SECURITY IN RANDOM WIRELESS

NETWORKS WITH CHANNEL ORDERING

As shown in Fig. 1, we focus our attention on a securedownlink communication scenario. In the scenario considered,a BS communicates with M legitimate users (LUs) in thepresence of eavesdroppers (Eves). We assume that the M usersare divided into M/2 orthogonal pairs. Each pair is randomlyallocated to a single resource block, such as a time slot oran orthogonal frequency band. For simplicity, we only focusour attention on investigating a typical pair of users in this

treatise. Random user-pairing is adopted in this work.2 Foreach pair, the NOMA transmission protocol is invoked. It isassumed that BS is located at the center of a disc, denotedby D, which has a coverage radius of RD (which is defined asthe user zone for NOMA [9]). The M randomly roaming LUsare uniformly distributed within the disc. A random number ofEves is distributed across an infinite two-dimensional plane,which are assumed to have powerful detection capabilities andcan overhear the messages of all orthogonal RBs, i.e. timeslots or frequency slots. The spatial distribution of all Eves ismodeled using a homogeneous PPP, which is denoted by �e

and it is associated with the density λe. It is assumed that theEves can be detected, provided that they are close enough toBS. Therefore, an Eve-exclusion area having a radius of rp isintroduced. Additionally, all channels are assumed to imposequasi-static Rayleigh fading, where the channel coefficients areconstant for each transmission block, but vary independentlybetween different blocks.

Without loss of generality, it is assumed that all the channelsbetween the BS and LUs obey |h1|2 ≤ · · ·|hm |2 ≤ · · ·|hn |2 ≤· · ·|hM |2. Both the the small-scale fading and the path loss areincorporated into the ordered channel gain. Again, we assumethat the m-th user and the n-th user (m < n) are pairedfor transmission in the same resource slot. Without loss ofgenerality, we focus our attention on a single selected pairof users in the rest of the paper. In the NOMA transmis-sion protocol, more power should be allocated to the usersuffering from worse channel condition [5], [6]. Therefore,the power allocation coefficients satisfy the conditions thatam > an and am + an = 1. By stipulating this assumption,SIC can be invoked by the n-th user for first detecting thespecific user having a higher transmit power (TX-power), whohence has a less interference-infested signal. Accordingly, them-th user’s signal is then remodulated and deducted fromthe original composite signal. This procedure then directlydelivers the decontaminated lower-TX-power signal of the n-thuser itself.3 We assume having fixed power allocation sharingbetween two users, but optimal power sharing strategies arecapable of further enhancing the performance of the networksconsidered, which is beyond the scope of this paper. Based onthe aforementioned assumptions, the instantaneous SINR ofthe m-th user and the signal-to-noise ratio (SNR) of the n-thuser can be written as:

γBm = am |hm |2an|hm |2 + 1

ρb

, (1)

γBn = ρban|hn |2, (2)

respectively. We introduce the convenient concept of transmitSNR ρb = PT

σ 2b

, where PT is the TX-power of composite signal

2We note that however sophisticated user pairing is capable of enhancingthe performance of the networks considered [11], which is set aside for ourfuture work.

3It is assumed that perfect SIC is achieved at the n-th user, althoughachieving perfect SIC may be a non-trivial task. As a consequence, ouranalytical results may over-estimate the attainable secrecy performance ofnetworks. Our future work will relax this idealized simplifying assumption,perhaps by analyzing both the connection outage probability and the secrecyoutage probability of the networks considered, with the aid the results derivedin this treatise.

Page 4: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

LIU et al.: ENHANCING THE PLS OF NOMA IN LARGE-SCALE NETWORKS 1659

at the BS and σ 2b is the variance of the additive white Gaussian

noise (AWGN) at the LUs, noting that this is not a physicallymeasurable quantity owing to their geographic separation.Perfectly flawless detection is assumed in this treatise, whichis realistic at today’s state-of-the-art with the aid of iterativeturbo-detection techniques [30], [31]. Additionally, a boundedpath loss model is used for guaranteeing that there is a practicalpath-loss, which is higher than one even for small distances.

We consider the worst-case scenario of large-scale networks,in which the Eves are assumed to have powerful detectioncapabilities [25], [32]. Specifically, by applying multiuserdetection techniques, the multiuser data stream received fromBS can be distinguished by the Eves, upon subtracting inter-ference generated by the superposed signals from each other.In fact, this assumption overestimates the Eves’ multi-userdecodability. In the scenario considered, all the CSIs of theLUs are assumed to be known at BS. However, the CSIsof Eves are assumed to be unknown at the BS. The mostdetrimental Eve is not necessarily the nearest one, but the onehaving the best channel to BS. Non-colluding eavesdroppersare considered in this work. Therefore, the instantaneous SNRof detecting the information of the m-th user and the n-th userat the most detrimental Eve can be expressed as follows:

γEκ = ρeaκ maxe∈�e,de≥rp

{|ge|2 L (de)

}. (3)

It is assumed that κ ∈ {m, n}, ρe = PTσ 2

eis the transmit SNR

with σ 2e being the variance of the AWGN at Eves. Additionally,

ge is defined as the small-scale fading coefficient associatedwith ge ∼ CN (0, 1), L (de) = 1

dαe

is the path loss, and de is thedistance from Eves to BS. Note that due to the existence ofthe Eve-exclusion area (we assume rp > 1), it is not requiredto bound the path loss for Eves since de will always be largerthan one.

A. New Channel Statistics

In this subsection, we derive several new channel statisticsfor LUs and Eves, which will be used for deriving the secrecyoutage probability in the next subsection.

Lemma 1: Assuming M randomly located NOMA users inthe disc of Fig. 1, the cumulative distribution function (CDF)FγBn

of the n-th LU is given by

FγBn(x) ≈ ϕn

M−n∑p=0

(M − n

p

)(−1)p

n + p

×∑

S̃ pn

(n + p

q0 + · · · + qK

)( K∏K=0

bqkk

)e−

K∑k=0

qkckx

ρban,

(4)

where K is a complexity-vs-accuracy tradeoff parameter,

bk = −ωK

√1 − φ2

k (φk + 1), b0 = −K∑

k=1bk , ck = 1 +

[RD2 (φk + 1)

]α, ωK = π

K , φk = cos( 2k−1

2K π), S̃ p

n ={(q0, q1, · · · , qK )|

K∑i=0

qi = n + p

},( n+p

q0+···+qK

) = (n+p)!q0!···qK !

and ϕn = M !(M−n)!(n−1)! .

Proof: See Appendix A.Lemma 2: Assuming M randomly positioned NOMA users

in the disc of Fig. 1, the CDF FγBmof the m-th LU

is given in (5) shown at the bottom of this page, where

U (x) ={

1, x > 00, x ≤ 0

is the unit step function , and S̃ pm =

{(q0, q1, · · · , qK )|

K∑i=0

qi = m + p

}.

Proof: Based on (1), the CDF of FγBm(x) can be

expressed as

FγBm(x) =

⎧⎪⎪⎪⎪⎨⎪⎪⎪⎪⎩

Pr

{|hm |2 <

x

(am − anx) ρb

}

︸ ︷︷ ︸�m

, x <am

an

1, x ≥ am

an.

(6)

To derive the CDF of FγBm(x), �m can be expressed as

�m = F|hm |2(

x(am−an x)ρb

). Based on (A.5), interchanging the

parameters m → n and applying y = x(am−an x)ρb

, we obtain

�m = ϕm

M−m∑p=0

(M − m

p

)(−1)p

m + p

×∑

S̃ pm

(m + p

q0 + · · · + qK

)(K∏

k=0

bqkk

)e−

K∑k=0

qkckx

(am−an x)ρb.

(7)

By substituting (7) into (6), with the aid of the unit stepfunction, the CDF of FγBm

(x) can be obtained. The proofis completed.

Lemma 3: Assuming that the eavesdroppers obey the PPPdistribution and the Eve-exclusion zone has a radius of rp ,the probability density function (PDF) fγEκ

of the mostdetrimental Eve (where κ ∈ {m, n} ) is given by

fγEκ(x) = μκ1e

− μκ1 (δ,μκ2x)xδ

(μδ

κ2e−μκ2x

x+ δ (δ, μκ2x)

xδ+1

),

(8)

where μκ1 = δπλe(ρeaκ)δ, μκ2 = rαp

ρeaκ, δ = 2

α and (·, ·) isthe upper incomplete Gamma function.

FγBm(x) ≈ U

(x − am

an

)+ U

(am

an− x

)ϕm

M−m∑p=0

(M − m

p

)(−1)p

m + p

S̃ pm

(m + p

q0 + · · · + qK

)(K∏

k=0

bqkk

)e−

K∑k=0

qkckx

(am−an x)ρb. (5)

Page 5: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

1660 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017

Proof: To derive the PDF of fγEκ(x), we have to compute

the CDF of FγEκfirstly as

FγEκ(x) = E�e

⎧⎨⎩

∏e∈�e,de≥rp

F|ge|2(

xdαe

ρeaκ

)⎫⎬⎭ . (9)

Following the similar approach as [33], by applying thegenerating function [34, eq. (9)] can be rewritten as

FγEκ(x) = exp

[−λe

∫R2

(1 − F|ge|2

(xdα

e

ρeaκ

))rdr

]

= exp

[−2πλe

∫ ∞

rp

re− xρeaκ

dr

]. (10)

By applying [35, eq. (3.381.9)], we arrive at:

FγEκ(x) = e

−δπλe (ρeaκ )δ

(δ,

xrαpρeaκ

)

xδ . (11)

By taking the derivative of the CDF FγEκ(x) in (11), we

obtain the PDF γEκ in (8). The proof is completed.

B. Secrecy Outage Probability

In the networks considered, the capacity of the LU’s channelfor the κ-h user (κ ∈ {m, n} ) is given by CBκ = log2(1 +γBκ ), while the capacity of the Eve’s channel for the κ-thuser is quantified by CEκ = log2(1 + γEκ ). It is assumed thatthe length of the block is sufficiently high for facilitating theemployment of capacity-achieving codes within each block.Additionally, the fading block length of the main channel andof the eavesdropper’s channel are assumed to be the same. Assuch, according to [36], the secrecy rate of the n-th and of them-th user can be expressed as

Cn = [CBn − CEn

]+, (12)

Cm = [CBm − CEm

]+, (13)

where we have [x]+ = max{x, 0}. Here, the secrecy rates ofLUs are strictly positive [37]. Recall that the Eves’ CSIs areunknown at the BS, hence the BS can only send informationto the LUs at a constant rate, but perfect secrecy is not alwaysguaranteed [38]. Considering the κ-th user as an example, ifRκ < Cκ , the information with a rate of Rκ (κ ∈ {m, n}

is conveyed in perfect secrecy. By contrast, for the case ofRκ > Cκ the information-theoretic security is compromised.Motivated by this, secrecy outage probability is used as oursecrecy performance metric in this paper. Given the expectedsecrecy rate Rκ of the κ-th user, a secrecy outage event isdeclared, when the secrecy rate Cκ drops below Rκ , whichis defined as the SOP for the κ-th user. Recall that we haveallocated M users to M/2 orthogonal RBs, each pair of usersare independent from all other pairs of users. We focus ourattention on the SOP of a typical pair of users. We then derivethe SOP of the κ-th user in the following two Theorems.We consider the SOP under the condition that the connectionbetween BS and LUs can be established.

Theorem 1: Assuming that the LUs position obeys the PPPfor the ordered channels of the LUs, the SOP of the n-th useris given by (14), shown at the bottom of this page.

Proof: In this treatise, we consider the SOP under thecondition that the connection between the BS and LUs canbe established. As such, the SIC has been assumed to besuccessfully performed at the n-th user. Based on (12), theSOP is given by

Pn (Rn) =∫ ∞

0fγEn

(x) FγBn

(2Rn (1 + x) − 1

)dx . (15)

Upon using the results of Lemma 1 and Lemma 3, substi-tuting (4) and (8) into (15), after some further mathematicalmanipulations, we can express the SOP of the n-th user. Theproof is completed.

Theorem 2: Assuming that the LUs position obeys the PPPfor the ordered channels of the LUs, the SOP of the m-th useris given by (16), shown at the bottom of this page, where wehave τm = 1

2Rm (1−am)− 1.

Proof: Based on (13) and according to [37], the SOP forthe m-th user is given by

Pm (Rm) = ∫∞0 fγEm

(x) FγBm

(2Rm (1 + x) − 1

)dx . (17)

Upon using the results of Lemma 2 and Lemma 3, as wellas substituting (5) and (8) into (17), after some furthermathematical manipulations, we can express the SOP of them-th user. The proof is completed.

In this paper, based on the assumptions of perfect SIC ofLUs and strong detection capabilities of Eves aforementioned,the secrecy outage occurs in the m-th user and the n-th user are

Pn (Rn) = ϕn

M−n∑p=0

(M − n

p

)(−1)p

n + p

S̃ pn

(n + p

q0 + · · · + qK

)(K∏

K=0

bqkk

)

×∫ ∞

0μn1

(μδ

n2e−μn2 x

x+ δ (δ, μn2x)

xδ+1

)e− μn1 (δ,μn2 x)

xδ −K∑

k=0qkck

2Rn (1+x)−1ρban

dx . (14)

Pm (Rm) = 1 − e− μm1 (δ,τmμm2)

τm δ + ϕm

M−m∑p=0

(M − m

p

)(−1)p

m + p

S̃ pm

(m + p

q0 + · · · + qK

)(K∏

k=0

bqkk

)

×∫ τm

0μm1

(μδ

m2e−μm2x

x+ δ (δ, μm2x)

xδ+1

)e− μm1 (δ,μm2 x)

xδ −K∑

k=0qkck

2Rm (1+x)−1

(am−an(2Rm (1+x)−1))ρb dx . (16)

Page 6: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

LIU et al.: ENHANCING THE PLS OF NOMA IN LARGE-SCALE NETWORKS 1661

independent. Note that relaxing these two assumptions requiresto consider dependence between two users by discussing moresophisticated connect/secrecy outage events, which should beincluded in our future work with the aid of the results derivedin this paper. In other words, the SOP of the m-th user hasno effect on the SOP of the n-th user and vice versa. As aconsequence, we define the SOP for the selected user pair asthat of either the m-th user or the n-th user outage.

Proposition 1: The SOP of the selected user pair is givenby

Pmn = 1 − (1 − Pm) (1 − Pn), (18)

where Pn and Pm are given by (14) and (16), respectively.

C. Secrecy Diversity Order Analysis

In order to derive the secrecy diversity order to gainfurther insights into the system’s operation in the high-SNRregime, the following new analytical framework is introduced.Again, as the worst-case scenario, we assume that Eves havea powerful detection capability. The asymptotic behavior isanalyzed, usually when the SNR of the channels between theBS and LUs is sufficiently high, i.e., when the BS’s transmitSNR obeys ρb → ∞, while and the SNR of the channelsbetween BS and Eves is set to arbitrary values. It is notedthat for the Eve’s transmit SNR of ρe → ∞, the probabilityof successful eavesdropping will tend to unity. The secrecydiversity order can be defined as follows:

ds = − limρb→∞

log P∞

log ρb, (19)

where P∞ is the asymptotic SOP.Corollary 1: Assuming that the LUs position obeys the PPP

for the ordered channels of the LUs, the asymptotic SOP ofthe n-th user is given by

P∞n (Rn) = Gn(ρb)

−Dn + o(ρ

−Dnb

), (20)

where we have Q1 = ∫∞0 μn1e

− μn1 (δ,μn2x)xδ ×(

μδn2e−μn2x

x + δ (δ,μn2 x)xδ+1

)((2Rn (1+x)−1

)�

an

)n

dx , Gn = ϕn Q1n ,

and Dn = n.Proof: We commence our diversity order analysis by

characterizing the CDF of the LUs F∞γBm

and F∞γBn

in thehigh-SNR regime. When y → 0, based on (A.3) and theapproximation of 1 − e−y ≈ y, we obtain the asymptotic

unordered CDF of∣∣∣h̃n

∣∣∣2

as follows:

F∞∣∣∣h̃n

∣∣∣2 (y) ≈ 2y

R2D

∫ RD0 (1 + rα) rdr = y�, (21)

where � = 1+ 2RαD

α+2 . Substituting (21) into (A.2), the asymptotic

unordered CDF of∣∣∣h̃n

∣∣∣2

is given by

F∞|hn |2 (y) = ϕn

M−n∑p=0

(M − n

p

)(−1)p

n + p(y�)n+p ≈ ϕn

n(y�)n.

(22)

Then based on (A.1), we can obtain F∞γBn

(x) ≈ ϕnn

(x�

ρban

)n.

Based on (15), we can replace the CDF of FγBnby the

asymptotic F∞γBn

. After some manipulations, we arrive at theasymptotic SOP of the n-th user. The proof is completed.

Remark 1: Upon substituting (20) into (19), we obtain thesecrecy diversity order of the n-th user is n.

Corollary 2: Assuming that the LUs position obeys the PPPfor the ordered channels of the LUs, the asymptotic SOP forthe m-th user is given by

P∞m (Rn) = Gm(ρb)

−Dm + o(ρ

−Dmb

), (23)

where we have Q2 = ∫ τm0 μm1e

− μm1 (δ,μm2 x)xδ ×(

μδm2e−μm2x

x + δ (δ,μm2x)xδ+1

)( (2Rm (1+x)−1

)�

(am−an(2Rm (1+x)−1))

)m

dx ,

Gm = ϕm Q2m and Dm = m.

Proof: Based on �m and (22), we can arrive at:

�∞m ≈ ϕm

m

(x�

(am−an x)ρb

)m. (24)

Substituting (24) into (6), the asymptotic CDF of γBm can beexpressed as

F∞γBm

(x) = U

(x − am

an

)+ U

(am

an− x

)�∞

m , (25)

where �∞m is given in (24). Then, based on (17), we can

replace the CDF of FγBmby the asymptotic F∞

γBmof (25).

Additionally, we can formulate the asymptotic SOP of the m-th user. The proof is completed.

Remark 2: Upon substituting (23) into (19), we obtain thesecrecy diversity order of the m-th user is m.

Proposition 2: For m < n, the secrecy diversity order canbe expressed as

ds = − limρb→∞

log(P∞

m + P∞n − P∞

m P∞n

)

log ρb= m. (26)

Proof: Based on Corollary 2 and Corollary 1, and uponsubstituting (20) and (23) into (18), the asymptotic SOP forthe user pair can be expressed as

P∞mn = P∞

m + P∞n − P∞

m P∞n ≈ P∞

m Gm(ρb)−Dm . (27)

Upon substituting (27) into (19), we arrive at (26). The proofis completed.

Remark 3: The results of (26) indicate that the secrecydiversity order and the asymptotic SOP for the user pairconsidered are determined by the m-th user.

Remark 3 provides insightful guidelines for improving theSOP of the networks considered by invoking user pairingamong of the M users. Since the SOP of a user pair isdetermined by that of the one having a poor channel, it isefficient to pair the user having the best channel and the secondbest channel for the sake of achieving an increased secrecydiversity order.

III. ENHANCING SECURITY WITH THE AID

OF ARTIFICIAL NOISE

In addition to single antenna scenario [1], for furtherimproving the secrecy performance, let us now consider theemployment of multiple antennas at BS for generating AN

Page 7: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

1662 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017

Fig. 2. Network model for secure NOMA transmission using AN in multiple-antenna scenario, where rp , RD1 , RD2 , and ∞ is the radius of the Eve-exclusion zone, NOMA user zone for user n, NOMA user zone for user m,and an infinite two dimensional plane for eavesdroppers, respectively.

in order to degrade the Eves’ SNR. More particularly, theBS is equipped with NA antennas, while all LUs and Evesare equipped with a single antenna each. Here, NA > 2 isassumed for ensuring the existence of a null-space for twoNOMA users. We mask the superposed information of NOMAby superimposing AN on Eves with the aid of the BS. It isassumed that the perfect CSI of LUs are known at BS.4 Sincethe AN is in the null space of the intended LU’s channel, it willnot impose any effects on LUs. However, it can significantlydegrade the channel and hence the capacity of Eves. Moreprecisely, the key idea of using AN as proposed in [23] can bedescribed as follows: an orthogonal basis of C NA is generatedat BS for user κ , (where κ ∈ {m, n}) as a (NA × NA)–element

precoding matrix Uκ = [uκ , Vκ ], where we have uκ = h†κ‖hκ‖ ,

and Vκ is of size NA × (NA − 1). Here, hκ is denoted asthe intended channel between the BS and user κ . It is notedthat each column of Vκ is orthogonal to uκ . Beamforming isapplied at the BS for generating AN. As such, the transmittedsuperposed information, which is masked by AN at the BS isgiven by

∑κ∈{m,n}

√aκxκ =

∑κ∈{m,n}

√aκ (sκuκ + tκVκ) , (28)

where sκ is the information-bearing signal with a variance ofσ 2

s , and tκ is the AN. Here the (NA − 1) elements of tκ areindependent identically distributed (i.i.d.) complex Gaussianrandom variables with a variance of σ 2

a . As such, the overallpower per transmission is PT = PS + PA, where PS = θ PT =σ 2

s is the transmission power of the desired information-bearing signal, while PA = (1 − θ) PT = (NA − 1) σ 2

a is thetransmission power of the AN. Here θ represents the powersharing coefficients between the information-bearing signaland AN.

As shown in Fig. 2, we divide the disc D into two regions,namely, D1 and D2, respectively. The motivation of usingthis topology hinges on two aspects. The first one is to

4In practical scenarios, estimating the CSI may be a non-trivial task,therefore, our work actually provides an upper bound in terms of the attainablesecrecy performance.

create more distinct channel quality differences between thepaired users, since existing NOMA studies have demonstratedthat it is beneficial to pair two users having rather differentchannel conditions [5], [11], [39]. The second one is that ofreducing the complexity of channel ordering in this MISONOMA system, which provides a compelling flexibility. Bydoing so, the path loss is the dominant channel impairmentin this scenario, because compared to the instantaneous small-scale fading effects, the path loss is more stable and moredominant. A quantitative example of comparing the small-scale fading and path loss was provided in [41, Ch. 2].Note that the proposed design cannot guarantee the optimalordering for MISO NOMA channels. More sophisticated pre-coding/detection design strategies (e.g., cluster based design,signal alignment and etc.) can be developed for further enhanc-ing the attainable performance of the networks considered[41], [42], but this is beyond the scope of this treatise. Here,D1 is an internal disc with radius RD1 , and the group of usern is located in this region. D2 is an external ring spanning theradius distance from RD1 to RD2 , and the group of user m islocated in this region. For simplicity, we assume that user nand user m are the selected user from each group in the rest ofthis paper. The cell-center user n is assumed to be capable ofcancelling the interference of the cell-edge user m using SICtechniques.5 User n and user m are randomly selected in eachregion for pairing them for NOMA. The combined signal atuser m is given by

ym = hmum√

amsm√1 + dα

m︸ ︷︷ ︸Signal part

+ hmun√

ansn√1 + dα

m

+ hmVn√

antn√1 + dα

m

+ nm

︸ ︷︷ ︸Interference and noise part

,

(29)

where nm is a Gaussian noise vector at user m, while dm isthe distance between the BS and user m. Substituting (28)into (29), the received SINR at user m is given by

γ ANBm

= amσ 2s ‖hm‖2

anσ 2s

∣∣∣hmh†

n‖hn‖∣∣∣2+ anσ 2

a ‖hmVn‖2 + 1 + dαm

, (30)

where the variance of nm is normalized to unity. As such, wecan express the transmit SNR at BS as ρt = PT .

Since SIC is applied at user n, the interference arriving fromuser m can be detected and subtracted firstly. The aggregatesignal at user n is given by

yn = hnun√

ansn√1 + dα

n︸ ︷︷ ︸Signal part

+ hnVm√

amtm√1 + dα

n

+ nn

︸ ︷︷ ︸Interference and noise part

, (31)

where nn is the Gaussian noise at user n, while dn is thedistance between the BS and user n. The received SINR atuser n is given by

γ ANBn

= anσ2s ‖hn‖2

amσ 2a ‖hnVm‖2 + 1 + dα

n

, (32)

5Note that upon invoking the signal alignment technique [42], the BS iscapable of simultaneously supporting multiple pairs of NOMA users, bydesigning more sophisticated precoding/detection strategies for interferencecancelation. However, these considerations are beyond the scope of this paper.

Page 8: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

LIU et al.: ENHANCING THE PLS OF NOMA IN LARGE-SCALE NETWORKS 1663

where the variance of nn is normalized to unity. The signalobserved by Eves is given by

ye =∑

κ∈{m,n}

he√

aκxκ√dα

e

+ ne, (33)

where ne is the Gaussian noises at Eves, while he ∈ C1×NA

is the channel vector between the BS and Eves. Similar to thesingle-antenna scenario, again, we assume that the Eves havea strong detection capability and hence they unambiguouslydistinguish the messages of user m and user n. The receivedSINR of the most detrimental Eve associated with detectinguser κ is given by

γ ANEκ

= aκσ 2s max

e∈�e,de≥rp

{Xe,κ

I ANe + dα

e

}, (34)

where the variance of ne is normalized to unity, and we

have Xe,κ =∣∣∣he

h†κ‖hκ‖∣∣∣2

as well as I ANe = amσ 2

a ‖heVm‖2 +anσ

2a ‖heVn‖2.

A. New Channel Statistics

In this subsection, we derive several new channel statisticsfor LUs and Eves in the presence of AN, which will be usedfor deriving the SOP in the next subsection.

Lemma 4: Assuming that user n is randomly positioned inthe disc D1 of Fig. 2, the CDF of F AN

Bnis given by

F ANBn

(x) = 1 − b2e− ϑxam

NA−1∑p=0

ϑ p x p

p!p∑

q=0

(p

q

)

× (NA − 1 + q) aq−pm(

ϑx + NA−1PA

)NA−1+q

p−q∑u=0

(p − q

u

)

×au+δ

m γ(

u + δ, ϑxam

RαD1

)

(ϑx)u+δ, (35)

where we have b2 = δ

R2D1

(NA−1)(

PANA−1

)NA−1 and ϑ = aman PS

.

Proof: See Appendix B.Lemma 5: Assuming that user m is randomly positioned in

the ring D2 of Fig. 2, for the case of θ �= 1NA

, the CDF ofF AN

Bmis given by

F ANBm

(x)

= 1 − e− νxan

NA−1∑p=0

(νx)p

p!p∑

q=0

(p

q

)aq−p

n

× a1

⎛⎜⎜⎝

(q + 1)(νx + 1

PS

)q+1 −NA−2∑l=0

(NA−1

PA− 1

PS

)l

l!(νx+ NA−1

PA

)q+l+1

(q+l+1)

⎞⎟⎟⎠

︸ ︷︷ ︸I(θ)

×p−q∑u=0

(p − q

u

)γ(

u + δ, νxan

RαD2

)− γ

(u + δ, νx

anRα

D1

)

(νxan

)u+δ,

(36)

where γ (·, ·) is the lower incomplete Gammafunction, (·) is the Gamma function, a1 =δ(

1 − PA(NA−1)PS

)1−NA/((

R2D2

− R2D1

)PS

), and ν = an

am PS.

For the case of θ = 1NA

, the CDF of F ANBm

is given by (36)upon substituting I (θ) by I∗ (θ), where we have I∗ (θ) =

a2 (q+NA)(νx+ 1

PS

)q+NA

p−q∑u=0

(p−qu

)and a2 = δ(

R2D2

−R2D1

)PS

NA (NA−1)! .

Proof: See Appendix C.Lemma 6: Assuming that the distribution of Eves obeys a

PPP and that the Eve-exclusion zone has a radius of rp , thePDF of fγ AN

Eκ(where κ ∈ {m, n}) is given by

fγ ANEκ

(x) = −e�κ�κ1

×((

μANκ2

)δe−xμAN

κ2

x�κ1 + δ�κ�κ1

x+ �κ�κ2

),

(37)

where �κ = (δ,xμAN

κ2

)xδ , (·, ·) is the upper incom-

plete Gamma function, �κ1 = � 1(x

aκ PS+τi

) j ,�κ2 =

� 1(x

aκ PS+τi

) j

(j(

xaκ PS

+τi

) 1aκ PS

), � = (−1)NA μAN

κ1 ×2∏

i=1τ NA−1

i

2∑i=1

NA−1∑j=1

aNA− j,NA−1(2τi − L) j−(2NA−2) , L = τ1+τ2, τ1 = NA−1

am PA, τ2 = NA−1

an PA, aNA− j,NA−1 = (2NA− j−3

NA− j−1

), μAN

κ1 =πλeδ(aκ PS)δ, and μAN

κ2 = rαp

aκ PS.

Proof: See Appendix D.

B. Secrecy Outage Probability

In this subsection, we investigate the SOP of a multiple-antenna aided scenario relying on AN.

Theorem 3: Assuming that the LUs and Eves distributionobey PPPs and that AN is generated at the BS, the SOP ofuser n is given by (38), shown at the top of next page, where

ιn∗ = ϑ(2Rn (1+x)−1

)am

.Proof: Using the results of Lemma 4 and Lemma 6, upon

substituting (35) and (37) into (15), we can obtain the SOPof user n. The proof is completed.

Theorem 4: Assuming that the LUs and Eves distributionobey PPPs and that AN is generated at the BS, for the caseθ �= 1

NA, the SOP of user m is given by (39), shown at the top

of next page, where we have a∗1 = δe−ιm∗

(1− PA

(NA−1)PS

)1−NA

(R2

D2−R2

D1

)PS

,

T∗1 =

p−q∑u=0

(p−qu

) γ(

u+δ,ιm∗ RαD2

)−γ

(u+δ,ιm∗ Rα

D1

)

ιu+δm∗

, and ιm∗ =ν(2Rm (1+x)−1

)an

.For the case of θ = 1

NA, the SOP for user m is given by

(39) upon substituting K (θ) with K∗ (θ), where K∗ (θ) =1 − a∗

2

NA−1∑p=0

ιpm∗p!

p∑q=0

(pq

) (q+NA)aqn(

an ιm∗+ 1PS

)q+NA

p−q∑u=0

(p−qu

)T∗

1, and a∗2 =

δe−ιm∗(R2

D2−R2

D1

)PS

NA (NA−1)! .

Page 9: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

1664 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017

P ANn (Rn) =

∫ ∞

0−e�n�n1

((μAN

n2

)δe−xμAN

n2

x�n1 + δ�n�n1

x+ �n�n2

)

×⎛⎜⎝1 − b2e−ιn

NA−1∑p=0

ιn∗p!

p∑q=0

(p

q

) (NA − 1 + q) aq

m(amιn∗ + NA−1

PA

)NA−1+q

p−q∑u=0

(p − q

u

)γ(

u + δ, ιn∗ RαD1

)

ιu+δn∗

⎞⎟⎠ dx, (38)

P ANm (Rm) =

∫ ∞

0−e�m�m1

((μAN

m2

)δe−xμAN

m2

x�m1 + δ�m�m1

x+ �m�m2

)

×⎛⎜⎝1 − a∗

1

NA−1∑p=0

ιpm

p!p∑

q=0

(p

q

)aq

n

⎛⎜⎝ (q + 1)(

anιm∗ + 1PS

)q+1 −NA−2∑l=0

1l!(

NA−1PA

− 1PS

)l (q + l + 1)

(anιm∗ + NA−1

PA

)q+l+1

⎞⎟⎠T∗

1

⎞⎟⎠

︸ ︷︷ ︸K(θ)

dx, (39)

Proof: Using the results of Lemma 5 and Lemma 6,upon substituting (36) and (37) into (17), we obtain the SOPof user m. The proof is completed.

Proposition 3: The SOP of multiple-antenna aided scenariorelaying on AN for the selected user pair can be expressed as

P ANmn = 1 −

(1 − P AN

m

) (1 − P AN

n

). (40)

where Pn and Pm are given by (38) and (39), respectively.

C. Large Antenna Array Analysis

In this subsection, we investigate the system’s asymptoticbehavior when the BS is equipped with large antenna arrays.Large antenna arrays using narrow beamforming are poten-tially capable of distinguishing multiple users in the angulardomain [43], [44]. Nonetheless, the users covered by thesame narrow beam in dense deployments still remain non-orthogonal [45]. It is noted that for the exact SOP derived in(39) and (38), as NA increases, the number of summationsin the equations will increase exponentially, which imposesan excessive complexity. Motivated by this, we seek goodapproximations for the SOP associated with a large NA . Withthe aid of the theorem of large values, we have the followingapproximations [24]. lim

NA→∞ ‖hn‖2 → NA , limNA→∞ ‖hm‖2 →

NA , limNA→∞ ‖hnVm‖2 → NA − 1, and lim

NA→∞ ‖hmVn‖2 →NA − 1. We first derive the asymptotic CDF of user n forNA → ∞.

Lemma 7: Assuming that user n is randomly located in thedisc D1 of Fig. 2 and NA → ∞, the CDF of F AN

Bn,∞ is givenby

F ANBn,∞ (x) =

⎧⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎩

0, x < ζn

1 −(

an PS NAx − am PA − 1

R2D1

, ζn ≤ x ≤ ξn

1, x ≥ ξn,

(41)

where we have ζn = an PS NARα

D1+am PA+1 and ξn = an PS NA

am PA+1 .

Proof: Based on (32), we can express the asymptotic CDFof F AN

Bn,∞ as F ANBn,∞ (x) = Pr

{an PS NA

am PA+1+dαn

≤ x}

. After somefurther mathematical manipulations, we can obtain the CDFof F AN

Bn,∞ for large antenna arrays. The proof is completed.We then derive the asymptotic CDF of user m for NA → ∞.Lemma 8: Assuming that user m is randomly located in the

ring D2 of Fig. 2 and NA → ∞, the CDF of F ANBm,∞ is given

by

F ANBm,∞ (x) =

⎧⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩

1, x ≥ ζm1

R2D2

− t2m + b1e

− am PS NAxan PS

R2D2

− R2D1

× ∫ tmRD1

rerα

an PS dr, ζm2 < x ≤ ζm1

b1e− am PS NA

xan PS

R2D2

− R2D1

∫ RD2RD1

rerα

an PS dr, x < ζm2,

(42)

where we have b1 = 2ean PA+1

an PS , tm = α

√am PS NA

x − an PA − 1,

ζm1 = am PS NARα

D1+an PA+1 , ζm2 = am PS NA

RαD2

+an PA+1 , and ξm = am PS NAan PA+1 .

Proof: Similarly, based on (30),the CDF of the asymptoticF AN

Bm,∞ is given by

F ANBm,∞ (x) = Pr

⎧⎪⎨⎪⎩

am PS NA

an PS

∣∣∣hmh†

n‖hn‖∣∣∣2+ an PA + 1 + dα

m

≤ x

⎫⎪⎬⎪⎭

.

(43)

After some further mathematical manipulations, we obtainthe CDF of F AN

Bm ,∞ for large antenna arrays. The proof iscompleted.

Let us now turn our attention to the derivation of the Eves’PDF in a large-scale antenna scenario.

Lemma 9: Assuming that the Eves distribution obeys aPPP and that AN is generated at the BS, the Eve-exclusionzone has a radius of rp , and NA → ∞, the PDF of fγ AN

Eκ ,∞

Page 10: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

LIU et al.: ENHANCING THE PLS OF NOMA IN LARGE-SCALE NETWORKS 1665

(where κ ∈ {m, n}) is given by

fγ ANEκ ,∞

(x)

= e− μAN

κ1 (δ,μAN

κ2 x)

e− PA x

aκ PS

xδ − PAxaκ PS μAN

κ1 x−δ

×((

μANκ2

)δxδ−1e−μAN

κ2 x + (δ, μAN

κ2 x)( PA

aκ PS+ δ

x

)).

(44)

Proof: Using the theorem of large values, we havelim

NA→∞ I ANe,∞ = amσ 2

a ‖heVm‖2 + anσ2a ‖heVn‖2 → PA. The

asymptotic CDF of Fγ ANEκ ,∞

associated with NA → ∞ is givenby

Fγ ANEκ ,∞

(x) = Pr

{max

e∈�e,de≥rp

{aκ PS Xe,κ

I ANe,∞ + dα

e

}≤ x

}

= E�e

⎧⎨⎩

∏e∈�e,de≥rp

FXe,κ

((PA + dα

e

)x

aκ PS

)⎫⎬⎭.

(45)

Following the procedure used for deriving (10), we apply thegenerating function and switch to polar coordinates. Then withthe help of [35, eq. (3.381.9)], (45) can be expressed as

Fγ ANEκ ,∞

(x) = exp

[−μAN

κ1 (δ, μAN

κ2 x)

xδe− PAx

aκ PS

]. (46)

Taking derivative of (46), we obtain the PDF of fγ ANEκ ,∞

. Theproof is completed.

Remark 4: The results derived in (44) show that the PDFof fγ AN

Eκ ,∞is independent of the number of antennas NA in our

large antenna array analysis.Let us now derive the SOP for our large antenna array

scenario in the following two Theorems.Corollary 3: Assuming that the LUs and Eves distribution

obey PPPs, AN is generated at the BS and NA → ∞, the SOPfor user n is given by

P ANn,∞ (Rn)

= 1 − e− μAN

n1 (δ,μAN

n2 χn2

)

(χn2)δe− PAχn2

an PS

+ μANn1

∫ χn2

χn1

e− μAN

n1 (δ,μAN

n2 x)

e− PA x

an PS

xδ − PA xan PS �2

×(

1 − 1

R2D1

(an PS NA

2Rn (1 + x) − 1− am PA − 1

)δ)

dx,

(47)

TABLE I

TABLE OF PARAMETERS

where χn1 = ζn+12Rn − 1, χn2 = ξn+1

2Rn − 1, and �2 =x−δ

((μAN

n2

)δxδ−1e−μAN

n2 x + (δ, μAN

n2 x) ( PA

an PS+ δ

x

)).

Proof: Using the results of Lemma 7 and Lemma 9, uponsubstituting (41) and (44) into (15), we can express the SOPfor user n.

Corollary 4: Assuming that the LUs and Evesdistribution obey PPPs, AN is generated at the BS,and NA → ∞, the SOP for user m is given by(48) at the bottom of this page, where we have �1 =x−δ

(μAN

m2

(μAN

m2 x)δ−1

e−μANm2 x +

(δ, μAN

m2 x) ( PA

am PS+ δ

x

)),

�1 = ∫ RD2RD1

rerα

an PS dr ,�2 = ∫ tm∗RD1

rerα

an PS dr , tm∗ =α

√am PS NA

2Rm (1+x)−1− an PA − 1, and χm2 = ζm2+1

2Rm − 1.Proof: Using the results of Lemma 8 and Lemma 9, upon

substituting (42) and (44) into (17), we can express the SOPfor user m. The proof is completed.

Proposition 4: Under the assumption of NA → ∞, the SOPof multiple-antenna aided scenario relaying on AN for theselected user pair can be expressed as

P ANmn,∞ = 1 −

(1 − P AN

m,∞) (

1 − P ANn,∞

). (49)

where P ANn,∞ and P AN

m,∞ are given by (47) and (48), respectively.

IV. NUMERICAL RESULTS

In this section, our numerical results are presented forcharacterizing the performance of large-scale networks. Thecomplexity-vs-accuracy tradeoff parameter is K = 20.Table I summarizes the the Monte Carlo simulation parametersused in this section. BPCU is short for bit per channeluse.

A. Secrecy Outage Probability With Channel Ordering

From Fig. 3 to Fig. 5, we investigate the secrecy perfor-mance in conjunction with channel ordering, which correspondto the scenario considered in Section II.

P ANm,∞ (Rm) = 1 − e

− μANκ1

(δ,μAN

κ2 χm1

)

(χm1)δe− PAχm1

aκ PS + μANm1 b1�1

R2D2

− R2D1

∫ χm2

0e− μAN

m1 (δ,μAN

m2 x)

e− PA x

am PS

xδ − am PS NA(2Rm (1+x)−1)an PS

− PA xam PS �1dx

+ μANm1

R2D2

− R2D1

∫ χm1

χm2

e− μAN

m1 (δ,μAN

m2 x)

e− PA x

am PS

xδ − PA xam PS

(R2

D2− t2

m∗ + b1e− am PS NA

(2Rm (1+x)−1)an PS

)�1�2dx, (48)

Page 11: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

1666 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017

Fig. 3. The SOP versus ρb , with ρe = 10 dB, α = 4, λe = 10−3, M = 2,m = 1, n = 2, and rp = 10 m. The exact analytical results are calculatedfrom (16) and (14). The asymptotic analytical results are calculated from(20) and (23).

Fig. 4. The SOP of user pair versus ρb , with ρe = 10 dB, λe = 10−3, RD =10 m, M = 3, and rp = 10 m. The exact analytical results are calculatedfrom (18). The asymptotic analytical results are calculated from (27).

Fig. 3 plots the SOP of a single user (m-th and n-th) versusρb for different user zone radii. The curves represent the exactanalytical SOP of both the m-th user and of n-th user derivedin (16) and (14), respectively. The asymptotic analytical SOPof both the m-th and n-th users, are derived in (23) and (20),respectively. Fig. 3 confirms the close agreement between thesimulation and analytical results. A specific observation is thatthe reduced SOP can be achieved by reducing the radius ofthe user zone, since a smaller user zone leads to a lower path-loss. Another observation is that the n-th user has a moresteep slope than the m-th user. This is due to the fact that wehave m < n and the m-th user as well as n-th user achievea secrecy diversity order of m and n respectively, as inferredfrom (23) and (20).

Fig. 4 plots the SOP of the selected user pair versus thetransmit SNR ρb for different path-loss factors. The exactanalytical SOP curves are plotted from (18). The asymptotic

Fig. 5. The SOP of user pair versus rp , with ρb = 50 dB, ρe = 40 dB,M = 2, m = 1, n = 2, and α = 4. The exact analytical results are calculatedfrom (18).

analytical SOP curves are plotted from (27). It can be observedthat the two kinds of dashed curves have the same slopes.By contrast, the solid curves indicate a higher secrecy outageslope, which is due to the fact that the secrecy diversity orderof the user pair is determined by that of the poor one. Thisphenomenon is also confirmed by the insights in Remark 1.

Fig. 5 plots the SOP of the selected user pair versusrp for different densities of the Eves. We can observe thatas expected, the SOP decreases, as the radius of the Eve-exclusion zone increases. Another option for enhancing thePLS is to reduce the radius of the user zone, since it reducesthe total path loss. It is also worth noting that having a lowerE density λe results in an improved PLS, i.e. reduced SOP.This behavior is due to the plausible fact that a lower λe

results in having less Eves, which degrades the multiuserdiversity gain, when the most detrimental E is selected. Asa result, the destructive capability of the most detrimentalE is reduced and hence the SOP is improved. It is worthpointing out that dynamic power sharing between two users iscapable of improving the secrecy performance of the scenariosconsidered, but this is beyond the scope of this paper.

B. Secrecy Outage Probability With Artificial Noise

From Fig. 6 to Fig. 10, we investigate the secrecy perfor-mance in the presence of AN, which correspond to the scenarioconsidered in Section III.

Fig. 6 plots the SOP of user m and user n versus θ fordifferent Eve-exclusion zones. The solid and dashed curvesrepresent the analytical performance of user m and user n,corresponding to the results derived in (39) and (38). MonteCarlo simulations are used for verifying our derivations.Fig. 6 confirms a close agreement between the simulation andanalytical results. Again, a reduced SOP can be achieved byincreasing the Eve-exclusion zone, which degrades the channelconditions of the Eves. Another observation is that user nachieves a lower SOP than user m, which is explained asfollows: 1) user n has better channel conditions than user m,

Page 12: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

LIU et al.: ENHANCING THE PLS OF NOMA IN LARGE-SCALE NETWORKS 1667

Fig. 6. The SOP versus θ , with α = 4, RD1 = 5 m, RD2 = 10 m,λe = 10−4, NA = 4, ρt = 30 dB. The exact analytical results are calculatedfrom (39) and (38).

Fig. 7. The SOP versus λe , with θ = 0.8, α = 4, RD1 = 5 m, RD2 = 10 m,ρt = 30 dB, rp = 4 m. The exact analytical results are calculated from (39)and (38).

owing to its lower path loss; and 2) user n is capable ofcancelling the interference imposed by user m using SICtechniques, while user m suffers from the interference inflictedby user n. It is also worth noting that the SOP is not amonotonic function of θ . This phenomenon indicates that thereexists an optimal value for power allocation, which dependson the system parameters.

Fig. 7 plots the SOP of user m and user n versus λe

for different number of antennas. We can observe that theSOP decreases, as the E density is reduced. This behavioris caused by the fact that a lower λe leads to having lessEves, which reduces the multiuser diversity gain, when themost detrimental E is considered. As a result, the distinctivecapability of the most detrimental E is reduced and hence thesecrecy performance is improved. It is also worth noting thatincreasing the number of antennas is capable of increasing thesecrecy performance. This is due to the fact that ‖hm‖2 in (30)and ‖hn‖2 in (32) both follow Gamma (NA, 1) distributions,

Fig. 8. The SOP of the user pair versus NA , with RD1 = 5 m, RD2 = 10 m,α = 3, λe = 10−3, ρt = 30 dB.

Fig. 9. SOP of the user pair versus ρt and θ , with NA = 4, α = 4,RD1 = 5 m, RD2 = 10 m, λe = 10−4, rp = 10 m. The exact analyticalresults are calculated from (40).

which is the benefit of the improved multi-antenna diversitygain.

Fig. 8 plots the SOP of the selected user pair versus NA

for different path loss exponents. In this figure, the curvesrepresenting the case without AN are generated by settingθ = 1, which means that all the power is allocated to thedesired signal. In this case, the BS only uses beamformingfor transmitting the desired signals and no AN is generated.The curves in the presence of AN are generated by settingθ = 0.9. We show that the PLS can be enhanced by usingAN. This behavior is caused by the fact that at the receiverside, user m and user n are only affected by the AN generatedby each other; By contrast, the Eves are affected by the ANof both user m and user n. We can observe that the SOP ofthe selected user pair decreases, as the Eve-exclusion radiusincreases.

Fig. 9 plots the SOP of the selected user pair versusρt and θ . It is observed that the SOP first decreases thenincreases as ρt increases, which is in contrast to the traditional

Page 13: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

1668 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017

Fig. 10. Large analysis for the SOP of user pair versus NA , with θ = 0.8,RD1 = 5 m, RD2 = 10 m, λe = 10−4, rp = 5 m. The asymptotic analyticalresults are calculated from (49).

trend, where the SOP always decreases as the transmit SNRincreases. This behavior can be explained as follows. TheSOP of the selected user pair is determined by user m. Asρt increases, on the one hand, the signal power of user m isincreased, which improves the secrecy performance; On theother hand, user m also suffers from the interference imposedby user n (including both the signal and AN), because when ρt

increases, the signal power of user n is also increased, whichin turn degrades the secrecy performance. As a consequence,there is a tradeoff between ρt and the SOP. It is also notedthat the power sharing factor θ also affect the optimal SOPassociated with different values of ρt . This phenomenonindicates that it is of salient significance to select beneficialsystem parameters. Furthermore, optimizing the parameters ρt

and θ is capable of further improving the SOP.Fig. 10 plots the SOP of large antenna arrays of the selected

user pair versus NA parameterized by different transmit SNRs.The dashed curves represent the analytical SOP of the selecteduser pair, corresponding to the results derived in (49). Weobserve a close agreement between the theoretical analysisand the Monte Carlo simulations, which verifies the accuracyof our derivations. We observe that as NA increases, theapproximation used in our analysis approaches the exact SOP.This phenomenon indicates that the asymptotic SOP derivedconverges to the exact values, when NA is a sufficiently largenumber.

V. CONCLUSIONS

In this paper, the secrecy performance of applying theNOMA protocol in large-scale networks was examined.Specifically, stochastic geometry based techniques were usedfor modeling both the locations of NOMA users and of theEves in the networks considered. Additionally, new analyticalSOP expressions were derived for characterizing the system’ssecrecy performance in both single-antenna and multiple-antenna scenarios. For the single-antenna scenario, the secrecydiversity order of the user pair was also characterized. It was

analytically demonstrated that the secrecy diversity order wasdetermined by that one of the user pair who had a poorerchannel. For the multiple-antenna scenario, it was shown thatthe Eves’ channel quality is independent of the number ofantennas at the BS for large antenna array scenarios. Numer-ical results were also presented for validating the analysis. Itwas concluded that the secrecy performance can be improvedboth by extending the Eve-exclusion zone and by generatingAN at the BS. Assuming perfect SIC operations may lead tooverestimating the performance of the networks considered,hence our future research may consider investigating imperfectSIC. Optimizing the power sharing between two NOMA usersis capable of further improving the secrecy performance ofthe networks considered, which is another promising futureresearch direction.

APPENDIX APROOF OF LEMMA 1

To derive the CDF of FγB , based on (2), we can formulate

FγB (x) = Pr{ρban|hn |2 ≤ x

}= F|hn |2

(x

ρban

), (A.1)

where F|hn |2 is the CDF of the ordered channel gain for then-th user. Assuming y = x

ρban, and using order statistics [46]

as well as applying binary series expansion, the CDF ofthe ordered channels has a relationship with the unorderedchannels captured as follows:

F|hn |2 (y) = ϕn

M−n∑p=0

(M − n

p

)(−1)p

n + p

(F∣∣∣h̃n

∣∣∣2 (y)

)n+p

,

(A.2)

where F∣∣∣h̃n

∣∣∣2is the CDF of unordered channel gain for the

n-th user.Based on the assumption of homogeneous PPP, and by

relying on polar coordinates, F∣∣∣h̃n

∣∣∣2is expressed as

F∣∣∣h̃n

∣∣∣2 (y) = 2

R2D

∫ RD

0

(1 − e−(1+rα)y

)rdr . (A.3)

However, it is challenging to arrive at an easily implementedinsightful expression for F∣∣∣h̃n

∣∣∣2 (y). Therefore, the Gaussian-

Chebyshev quadrature relationship [47] is invoked for findingan approximation of (A.3) in the following form:

F∣∣∣h̃n

∣∣∣2 (y) ≈

K∑k=0

bke−ck y . (A.4)

Substituting (A.4) into (A.2) and applying the multinomialtheorem, the CDF F|hn |2 of ordered channel gain is given by

F|hn |2 (y) ≈ ϕn

M−n∑p=0

(M − n

p

)(−1)p

n + p

×∑

S̃ pn

(n + p

q0 + · · · + qK

)(K∏

k=0

bqkk

)e−

K∑k=0

qkck y.

(A.5)

Page 14: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

LIU et al.: ENHANCING THE PLS OF NOMA IN LARGE-SCALE NETWORKS 1669

Substituting y = xρban

into (A.5), we can obtain (4). Theproof is completed.

APPENDIX BPROOF OF LEMMA 4

Based on (32), we express the CDF of F ANBn

as follows:

F ANBn

(x) = Pr

{‖hn‖2 ≤ xϑ

(PA

NA − 1Yn + 1 + dα

n

am

)}

= 1 −NA−1∑p=0

ϑ p x p

p!p∑

q=0

(p

q

)Q3

×∫

D1

e− ϑxam (1+dα

n )(

1

am

(1 + dα

n

))p−q

fD1(ωn) dωn,

(B.1)

where ϑ = aman PS

, Q3 = ∫∞0 e−ϑxzn zq

n fI ANn

(zn) dzn , f I ANn

and fD1 (ωn) are the PDF of I ANn and D1. Here I AN

n =PA

NA−1 Yn, Yn = ‖hnVm‖2, and fD1 (ωn) = 1π R2

D1

. Upon

changing to polar coordinates and applying [35, eq. (3.381.8)],we arrive at

F ANBn

(x) = 1 − δe− ϑxam

R2D1

NA−1∑p=0

ϑ px p

p!p∑

q=0

(p

q

)Q3aq−p

m

×p−q∑u=0

(p − q

u

)γ(

u + δ, ϑxam

RαD1

)

(ϑxam

)u+δ. (B.2)

Finally we turn our attention on Q3. It is readilyseen that I AN

n obeys the Gamma distribution in conjunc-

tion with the parameter(

NA − 1, PANA−1

). Then we can

obtain the PDF of fI ANn

(zn) = zNA−2n e

− zn (NA−1)PA(

PANA−1

)NA−1 (NA−1)

. Apply-

ing [35, eq. (3.326.2)], we can express Q3 as Q3 = (NA−1+q)

(NA−1)(

PANA−1

)NA−1(ϑx+ NA−1

PA

)NA−1+q . Upon substituting Q3

into (B.2), we obtain the CDF of F ANBn

(x) as (35).

APPENDIX CPROOF OF LEMMA 5

Based on (30), we express the CDF of F ANBm

as

F ANBm

(x)

= Pr{γ AN

Bm≤ x

}

= Pr

⎧⎪⎨⎪⎩

amσ 2s ‖hm‖2

anσ 2s

∣∣∣hmh†

n‖hn‖∣∣∣2+ anσ 2

a ‖hmVn‖2 + 1 + dαm

≤ x

⎫⎪⎬⎪⎭

.

(C.1)

It may be readily seen that ‖hm‖2 obeys a Gamma distributionhaving the parameters of (NA, 1). Hence the CDF of ‖hm‖2

is given by

F ANBm

(x) = 1 − e−xNA−1∑p=0

x p

p! . (C.2)

Denoting Xm =∣∣∣hm

h†n‖hn‖∣∣∣2, Ym = ‖hmVn‖2, based on (C.2),

we can re-write (C.1) as

F ANBm

(x) = Pr

{‖hm‖2 ≤ xν

(I ANm + 1 + dα

m

an

)}

= 1 −∫

D2

∫ ∞

0

NA−1∑p=0

(νx

(zm + 1+dα

man

))p

p!

×(

e−νxzm−νx 1+dαm

an

)f I AN

m(zm) fD2(ωm) dzmdωm,

(C.3)

where ν = anam PS

, f I ANm

and fD2 are the PDF of I ANm and

D2, respectively. Here we have I ANm = σ 2

s Xm + σ 2a Ym and

fD2 (ωm) = 1

π(

R2D2

−R2D1

) . Applying a binary series expansion

to (C.3), we arrive at:

F ANBm

(x) = 1 −NA−1∑p=0

ν p x p

p!p∑

q=0

(p

q

)Q1

×∫

D2

e−νx 1+dαm

an

(1 + dα

m

an

)p−q

fD2 (ωm) dωm,

(C.4)

where Q1 = ∫∞0 e−νxzm zq

m fI ANm

(zm) dzm . Note that the dis-tance dm is determined by the location of ωm . Then we changeto polar coordinates and applying a binary series expansionagain, we obtain

F ANBm

(x) = 1 − 2e− νxan

R2D2

− R2D1

NA−1∑p=0

ν px p

p!p∑

q=0

(p

q

)

× Q11

a p−qn

p−q∑u=0

(p − q

u

)∫ RD2

RD1

ruα+1e−νx PSrαdr.

(C.5)

By invoking [35, eq. (3.381.8)], we obtain

F ANBm

(x)

= 1 − 2e− νxan

R2D2

− R2D1

NA−1∑p=0

ν px p

p!p∑

q=0

(p

q

)Q1

1

a p−qn

×p−q∑u=0

(p − q

u

)γ(

u + δ, νxan

RαD2

)− γ

(u + δ, νx

anRα

D1

)

α(

νxan

)u+δ.

(C.6)

Let us now turn our attention to the derivation of the integralQ1 in (C.4) – (C.6). Note that Xm follows the exponentialdistribution with unit mean, while Ym follows the distributionYm ∼ Gamma (NA − 1, 1). As such, the PDF of f I AN

mis given

by [25]

fI ANm

(zm) =

⎧⎪⎪⎪⎨⎪⎪⎪⎩

t1

ezmPS

(1 −

NA−2∑l=0

(NA−1

PA− 1

PS

)lzl

m

l!e(

NA−1PA

− 1PS

)zm

), θ �= 1

NA

zNA−1m e

− zmPS

PSNA (NA−1)! , θ = 1

NA,

(C.7)

Page 15: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

1670 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017

where we have t1 =(

1− PA(NA−1)PS

)1−NA

PS. Based on (C.7), and

applying [35, eq. (3.326.2)], we can express Q1 as follows:

Q1

=

⎧⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩

t1 (q + 1)(xν + 1

PS

)q+1 −NA−2∑l=0

t1l!(

NA−1PA

− 1PS

)l (q + l + 1)

(νx + NA−1

PA

)q+l+1 ,

θ �= 1

NA (q+NA)

PSNA (NA−1)!

(νx+ 1

PS

)q+NA,

θ = 1NA

.

(C.8)

Upon substituting (C.8) into (C.6), the CDF of F ANBm

is givenby (36).

APPENDIX DPROOF OF LEMMA 6

Based on (34), the CDF of Fγ ANEκ

can be expressed as

Fγ ANEκ

(x)

= Pr

{max

e∈�e,de≥rp

{aκ PS Xe,κ

I ANe + dα

e

}≤ x

}

= E�e

⎧⎨⎩

∏e∈�e,de≥rp

∫ ∞

0FXe,κ

((z + dα

e

)x

aκ PS

)f I AN

e(z) dz

⎫⎬⎭.

(D.1)

Following a procedure similar to that used for obtaining(10), we apply the generating function and switch to polarcoordinates. Then (D.1) can be expressed as

Fγ ANEκ

(x) = exp

[−2πλe

∫ ∞

rp

re− x

aκ PSrα

dr Q2

], (D.2)

where Q2 = ∫∞0 e

−z xaκ PS fI AN

e(z) dz. Applying

[35, eq. (3.381.9)], we arrive at

Fγ ANEκ

(x) = exp

[−μAN

κ1 (δ, μAN

κ2 x)

xδQ2

]. (D.3)

Let us now turn our attention to solving the integralQ2. Note that all the elements of heVm and heVn areindependent complex Gaussian distributed with a zero meanand unit variance. We introduce the notation Ye,m =‖heVm‖2 and Ye,n = ‖heVn‖2. As a consequence, bothYe,m and Ye,n obey the Gamma (NA − 1, 1) distribution.Based on the properties of the Gamma distribution, wehave amσ 2

a Ye,m ∼ Gamma(NA − 1, amσ 2

a

), anσ

2a Ye,n ∼

Gamma(NA − 1, anσ

2a

). Then the sum of these two items

I ANe obeys the generalized integer Gamma (GIG) distribution.

According to [48], the PDF of I ANe is given by

f I ANe

(z) = (−1)NA−12∏

i=1

τNA−1i

2∑i=1

NA−1∑j=1

× aNA− j,NA−1

( j − 1)! (2τi − L) j−(2NA−2)z j−1e−τi z.

(D.4)

Upon substituting (D.4) into (D.3), as well as applying[35, eq. (3.381.4)], after some further manipulations, weobtain the CDF of Fγ AN

Eκas

Fγ ANEκ

(x) = exp

⎡⎢⎢⎢⎢⎣

� (δ, xμAN

κ2

)j∑

p=0

( jp

)(x)p+δ(aκ PS)−pτ

j−pi

⎤⎥⎥⎥⎥⎦

.

(D.5)

Upon setting the derivative of the CDF in (D.5), we canobtain (37).

REFERENCES

[1] Z. Qin, Y. Liu, Z. Ding, Y. Gao, and M. Elkashlan, “Physical layersecurity for 5G non-orthogonal multiple access in large-scale networks,”in Proc. Int. Commun. Conf. (ICC), May 2016, pp. 1–6.

[2] P. Wang, J. Xiao, and L. Ping, “Comparison of orthogonal and non-orthogonal approaches to future wireless cellular systems,” IEEE Veh.Technol. Mag., vol. 1, no. 3, pp. 4–11, Sep. 2006.

[3] L. Dai, B. Wang, Y. Yuan, S. Han, C. L. I, and Z. Wang, “Non-orthogonal multiple access for 5G: solutions, challenges, opportunities,and future research trends,” IEEE Commun. Mag., vol. 53, no. 9,pp. 74–81, Sep. 2015.

[4] Study on Downlink Multiuser Superposition Transmission for LTE,3rd Generat. Partnership Project (3GPP), Mar. 2015.

[5] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, andK. Higuchi, “Non-orthogonal multiple access (NOMA) for cellularfuture radio access,” in Proc. Veh. Technol. Conf. (VTC Spring), Dresden,Germany, Jun. 2013, pp. 1–5.

[6] Z. Ding et al., “Application of non-orthogonal multiple access in LTEand 5G networks,” IEEE Commun. Mag., Feb. 2017.

[7] T. Cover, “Broadcast channels,” IEEE Trans. Inf. Theory, vol. IT-18,no. 1, pp. 2–14, Jan. 1972.

[8] J. G. Andrews, “Interference cancellation for cellular systems: A con-temporary overview,” IEEE Wireless Commun, vol. 12, no. 2, pp. 19–29,Apr. 2005.

[9] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance ofnon-orthogonal multiple access in 5G systems with randomly deployedusers,” IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505,Dec. 2014.

[10] S. Timotheou and I. Krikidis, “Fairness for non-orthogonal multipleaccess in 5G systems,” IEEE Signal Process. Lett., vol. 22, no. 10,pp. 1647–1651, Oct. 2015.

[11] Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, “Cooperative non-orthogonal multiple access with simultaneous wireless informationand power transfer,” IEEE J. Sel. Areas Commun., vol. 34, no. 4,pp. 938–953, Apr. 2016.

[12] J. Choi, “Minimum power multicast beamforming with superpositioncoding for multiresolution broadcast and application to NOMA systems,”IEEE Trans. Commun., vol. 63, no. 3, pp. 791–800, Mar. 2015.

[13] Q. Sun, S. Han, C.-L. I, and Z. Pan, “On the ergodic capacity ofMIMO NOMA systems,” IEEE Wireless Commun. Lett., vol. 4, no. 4,pp. 405–408, Aug. 2015.

[14] Y. Zhang, H.-M. Wang, T.-X. Zheng, and Q. Yang, “Energy-efficienttransmission design in non-orthogonal multiple access,” IEEE Trans.Veh. Technol., to be published.

[15] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and N. Arumugam, “Non-orthogonal multiple access in massive MIMO aided heterogeneousnetworks,” in Proc. Global Commun. Conf. (GLOBECOM), Washington,DC, USA, Jun. 2016.

[16] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8,pp. 1355–1387, 1975.

[17] A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for securityin MIMO wiretap channels with imperfect CSI,” IEEE Trans. SignalProcess., vol. 59, no. 1, pp. 351–361, Jan. 2011.

[18] Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, “On theapplication of cooperative transmission to secrecy communications,”IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359–368, Feb. 2012.

[19] Y. Liu, L. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, “Relayselection for security enhancement in cognitive relay networks,” IEEEWireless Commun. Lett., vol. 4, no. 1, pp. 46–49, Feb. 2015.

Page 16: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

LIU et al.: ENHANCING THE PLS OF NOMA IN LARGE-SCALE NETWORKS 1671

[20] Y. Zou, X. Wang, W. Shen, and L. Hanzo, “Security versus reliabilityanalysis of opportunistic relaying,” IEEE Trans. Veh. Technol., vol. 63,no. 6, pp. 2653–2661, Jul. 2014.

[21] Y. Liu, L. Wang, S. A. R. Zaidi, M. Elkashlan, and T. Q. Duong,“Secure D2D communication in large-scale cognitive cellular networks:A wireless power transfer model,” IEEE Trans. Commun., vol. 64, no. 1,pp. 329–342, Jan. 2016.

[22] E. Tekin and A. Yener, “The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming,” IEEETrans. Inf. Theory, vol. 54, no. 6, pp. 2735–2751, Jun. 2008.

[23] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEETrans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.

[24] X. Zhou and M. R. McKay, “Secure transmission with artificial noiseover fading channels: Achievable rate and optimal power allocation,”IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831–3842, Oct. 2010.

[25] X. Zhang, X. Zhou, and M. R. McKay, “Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks,” IEEE Trans. Inf.Forensics Security, vol. 8, no. 11, pp. 1802–1814, Nov. 2013.

[26] Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, “Securemassive MIMO transmission with an active eavesdropper,” IEEE Trans.Inf. Theory, vol. 62, no. 7, pp. 3880–3900, Jul. 2016.

[27] Y. Zhang, H.-M. Wang, Q. Yang, and Z. Ding, “Secrecy sum ratemaximization in non-orthogonal multiple access,” IEEE Commun. Lett.,vol. 20, no. 5, pp. 930–933, May 2016.

[28] P. C. Pinto, J. Barros, and M. Z. Win, “Secure communication instochastic wireless networks—Part I: Connectivity,” IEEE Trans. Inf.Forensics Security, vol. 7, no. 1, pp. 125–138, Feb. 2012.

[29] N. Romero-Zurita, D. McLernon, M. Ghogho, and A. Swami, “PHYlayer security based on protected zone and artificial noise,” IEEE SignalProcess. Lett., vol. 20, no. 5, pp. 487–490, May 2013.

[30] L. L. Hanzo, Y. Akhtman, L. Wang, and M. Jiang, MIMO-OFDM forLTE, WiFi and WiMAX: Coherent Versus Non-Coherent and CooperativeTurbo Transceivers, vol. 9. Hoboken, NJ, USA: Wiley, 2010.

[31] L. L. Hanzo, T. H. Liew, B. L. Yeap, R. Y. S. Tee, and S. X. Ng, TurboCoding, Turbo Equalisation and Space-Time Coding: EXIT-Chart-AidedNear-Capacity Designs for Wireless Channels. Hoboken, NJ, USA:Wiley, 2011.

[32] O. O. Koyluoglu, C. E. Koksal, and H. El Gamal, “On secrecy capacityscaling in wireless networks,” IEEE Trans. Inf. Theory, vol. 58, no. 5,pp. 3000–3015, May 2012.

[33] Z. Qin, Y. Liu, Y. Gao, M. Elkashlan, and A. Nallanathan, “Wirelesspowered cognitive radio networks with compressive sensing and matrixcompletion,” IEEE Trans. Commun., to be published.

[34] W. K. D. Stoyan and J. Mecke, Stochastic Geometry and Its Applica-tions, 2nd ed. Hoboken, NJ, USA: Wiley, 1996.

[35] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, andProducts, 6th ed. New York, NY, USA: Academic, 2000.

[36] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wire-less information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54,no. 6, pp. 2515–2534, Jun. 2008.

[37] N. Yang, H. A. Suraweera, I. B. Collings, and C. Yuen, “Physicallayer security of TAS/MRC with antenna correlation,” IEEE Trans. Inf.Forensics Security, vol. 8, no. 1, pp. 254–259, Jan. 2013.

[38] L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, “Physicallayer security of maximal ratio combining in two-wave with diffusepower fading channels,” IEEE Trans. Inf. Forensics Security, vol. 9,no. 2, pp. 247–258, Feb. 2014.

[39] Z. Ding, P. Fan, and H. V. Poor, “Impact of user pairing on 5Gnonorthogonal multiple-access downlink transmissions,” IEEE Trans.Veh. Technol., vol. 65, no. 8, pp. 6010–6023, Aug. 2016.

[40] R. Steele and L. Hanzo, Mobile Radio Communications: Second andThird Generation Cellular and WATM Systems, 2nd ed. Hoboken, NJ,USA: Wiley 1999.

[41] Y. Liu, M. Elkashlan, Z. Ding, and G. K. Karagiannidis, “Fairness ofuser clustering in MIMO non-orthogonal multiple access systems,” IEEECommun. Lett., vol. 20, no. 7, pp. 1465–1468, Jul. 2016.

[42] Z. Ding, R. Schober, and H. V. Poor, “A general MIMO frameworkfor NOMA downlink and uplink transmission based on signal align-ment,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4438–4454,Jun. 2016.

[43] H. Xie, B. Wang, F. Gao, and S. Jin, “A full-space spectrum-sharingstrategy for massive MIMO cognitive radio systems,” IEEE J. Sel. AreasCommun., vol. 34, no. 10, pp. 2537–2549, Oct. 2016.

[44] H. Xie, F. Gao, and S. Jin, “An overview of low-rank channel estimationfor massive MIMO systems,” IEEE Access, vol. 4, pp. 7313–7321, 2016.

[45] Z. Ding and H. V. Poor, “Design of massive-MIMO-NOMA with limitedfeedback,” IEEE Signal Process. Lett., vol. 23, no. 5, pp. 629–633,May 2016.

[46] H. A. David and N. Nagaraja, Order Statistics, 3rd ed. Hoboken, NJ,USA: Wiley, 2003.

[47] Y. Liu, Z. Ding, M. Elkashlan, and J. Yuan, “Nonorthogonal multipleaccess in large-scale underlay cognitive radio networks,” IEEE Trans.Veh. Technol., vol. 65, no. 12, pp. 10152–10157, Dec. 2016.

[48] C. A. Coelho, “The generalized integer gamma distribution—A basisfor distributions in multivariate statistics,” J. Multivariate Anal., vol. 64,no. 1, pp. 86–102, 1998.

Yuanwei Liu (S’13–M’16) received the B.S. andM.S. degrees from the Beijing University of Postsand Telecommunications, in 2014 and 2011, respec-tively, and the Ph.D. degree in electrical engineeringfrom the Queen Mary University of London, U.K.,in 2016. He is currently the Post-Doctoral ResearchFellow with the Department of Informatics, King’sCollege London, U.K.

His research interests include non-orthogonal mul-tiple access, millimeter wave, massive MIMO, het-nets, d2d communication, cognitive radio, and phys-

ical layer security. He currently serves as an Editor of IEEE COMMU-NICATIONS LETTERS. He has served as a TPC member for many IEEEconferences, such as GLOBECOM and VTC. He received the ExemplaryReviewer Certificate of the IEEE WIRELESS COMMUNICATION LETTERSin 2015.

Zhijin Qin (S’13–M’16) received the B.Sc. degreefrom the Beijing University of Posts and Telecom-munications, Beijing, China, and the B.Sc. degreeand the Ph.D. degree in electronic engineering fromthe Queen Mary University of London, London,U.K., in 2012 and 2016, respectively. She is cur-rently the Research Associate with the Departmentof Computing, Imperial College London, London.She was awarded the Best Paper Award at theWireless Technology Symposium, held in London,U.K. in 2012.

Her research interests include low power wide area network in IoT, fognetworking, compressive spectrum sensing in cognitive radio, and non-orthogonal multiple access in 5G network. She has served as a TPC memberfor many IEEE conferences, such as ICC’16, VTC’15, and VTC’14.

Maged Elkashlan (M’06) received the Ph.D. degreein electrical engineering from The University ofBritish Columbia, Canada, in 2006. From 2006 to2007, he was with the Laboratory for AdvancedNetworking, The University of British Columbia.From 2007 to 2011, he was with the Wirelessand Networking Technologies Laboratory, Common-wealth Scientific and Industrial Research Organiza-tion, Australia. He held an adjunct appointment withthe University of Technology Sydney, Australia. In2011, he joined the School of Electronic Engineering

and Computer Science, Queen Mary University of London, U.K., as anAssistant Professor. He also holds visiting faculty appointments with theUniversity of New South Wales, Australia, and the Beijing University ofPosts and Telecommunications, China. His research interests include the broadareas of communication theory, wireless communications, and statistical signalprocessing for distributed data processing and heterogeneous networks.

Dr. Elkashlan currently serves as an Editor of the IEEE TRANSACTIONS ONWIRELESS COMMUNICATIONS, the IEEE TRANSACTIONS ON VEHICULAR

TECHNOLOGY, and the IEEE COMMUNICATIONS LETTERS. He also servesas Lead Guest Editor for the Special Issue on Green Media: The Futureof Wireless Multimedia Networks of the IEEE Wireless CommunicationsMagazine, the Lead Guest Editor for the Special Issue on Millimeter WaveCommunications for 5G of the IEEE Communications Magazine, the GuestEditor for the Special Issue on Energy Harvesting Communications of theIEEE Communications Magazine, and the Guest Editor for the Special Issueon Location Awareness for Radios and Networks of the IEEE JOURNAL

ON SELECTED AREAS IN COMMUNICATIONS. He received the Best PaperAward at the IEEE International Conference on Communications in 2014,the International Conference on Communications and Networking in China(CHINACOM) in 2014, and the IEEE Vehicular Technology Conference(VTC-Spring) in 2013. He received the Exemplary Reviewer Certificate ofthe IEEE COMMUNICATIONS LETTERS in 2012.

Page 17: eecs.qmul.ac.ukeecs.qmul.ac.uk/~maged/Enhancing the physical layer... · 1656 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017 Enhancing the Physical Layer

1672 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 3, MARCH 2017

Yue Gao (S’03–M’07–SM’13) received the bach-elor’s degree from the Beijing University of Postsand Telecommunications, China, in 2002, and theM.Sc. and Ph.D. degrees in telecommunications andmicrowave antennas from the Queen Mary Univer-sity of London (QMUL), U.K., in 2003 and 2007,respectively. Prior to his current role as a SeniorLecturer (Associate Professor), he was a ResearchAssistant and Lecturer (Assistant Professor) withthe School of Electronic Engineering and ComputerScience, QMUL.

He is currently leading the Whitespace Machine Communication Laboratory,where he is involved in theoretical research into practice in the interdiscipli-nary area among antennas, signal processing, and spectrum sharing for cyber-physical system, machine-to-machine communications, and Internet of Thingsapplications. He has authored and co-authored over 100 peer-reviewed journaland conference papers, two best paper awards, two patents, and two licensedworks to companies, and one book chapter. He is the Principal Investigatorfor TV White Space Testbed Project funded by the Engineering and PhysicalSciences Research Council, and a number of projects funded by companies.He has served as the Signal Processing for Communications SymposiumCo-Chair at the IEEE ICCC 2016, and served/is serving as Publicity Co-Chair at the GLOBECOM 2016, the Cognitive Radio and Networks SymposiaCo-Chair at the IEEE GLOBECOM 2017, and the General Co-Chair at theIEEE WoWMoM 2017.

Lajos Hanzo (M’91–SM’92–F’04) received theD.Sc. degree in electronics in 1976 and the Ph.D.degree in 1983. During his 40-year career intelecommunications he has held various researchand academic posts in Hungary, Germany, andU.K. Since 1986, he has been with the School ofElectronics and Computer Science, University ofSouthampton, U.K. He has successfully supervised111 Ph.D. students. In 2016, he was admitted tothe Hungarian Academy of Science. He is currentlydirecting a 60-strong academic research team, where

he is involved in a range of research projects in the field of wireless multimediacommunications sponsored by industry, the Engineering and Physical SciencesResearch Council, U.K., the European Research Council’s Advanced FellowGrant, and the Royal Society’s Wolfson Research Merit Award. He is anenthusiastic supporter of industrial and academic liaison and he offers a rangeof industrial courses. He has co-authored 18 John Wiley/IEEE Press books onmobile radio communications totaling in excess of 10 000 pages, publishedover 1600 research contributions on IEEE Xplore. He was FREng, FIET,and a fellow of the EURASIP. In 2009, he received the honorary doctoratefrom the Technical University of Budapest and in 2015 from the Universityof Edinburgh. He served as the TPC chair and the general chair of IEEEconferences, presented keynote lectures and has been received a number ofdistinctions. He is also a Governor of the IEEE VTS. From 2008 to 2012,he was an Editor-in-Chief of the IEEE Press and a Chaired Professor withTsinghua University, Beijing. He is the Chair in telecommunications with theUniversity of Southampton. He has 27 000+ citations and an h-index of 63.