Abstract
The volume of confidential information transmitted over 5G networks has increased rapidly due to the widespread adoption of large machine-type communication and Internet of Things (IoT) devices. Secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC) parameters are crucial parameters used in evaluating the security of wireless systems, particularly in situations where maintaining secrecy is essential. Also, Non-orthogonal multiple access (NOMA) has the potential to improve the performance of wireless communication systems due to its higher spectral efficiency, improved fairness in resource allocation, and enhanced coverage and connectivity. In this paper, we investigate the secrecy performance of unmanned aerial vehicles (UAV) assisted cooperative NOMA system with a half duplex protocol based amplify and forward relay over the Rayleigh fading channel in presence of two eavesdroppers for downlink communication. We derive SOP and SPSC of the proposed system model and analyze its performance in terms of the illegal SNR of eavesdroppers, power allocation coefficient, information rates and Rayleigh channel parameters. Simulation results demonstrate that SOP decreases with a higher value of power allocation coefficient and lower values of the illegal SNR of eavesdropper and lower information rates. SPSC increases with high values of power allocation coefficient of far destination and decreases with lower values of illegal SNR of eavesdroppers and Rayleigh channel parameters. Analytical simulations are verified using Monte Carlo simulations.
Similar content being viewed by others
Introduction
The aims of sixth generation (6G) network is to provide the ultra-high spectral efficiency, massive device connectivity ultra-reliable low-latency communications (URLLC) and superior energy efficiency1 . It is expected to support emerging technologies like the Internet of Things (IoT) and applications like augmented reality (AR) and virtual reality (VR)2. Although the number of cutting-edge IoT devices has increased and network performance has improved, personal IoT devices have also brought up critical privacy and security issues3,4. In actuality, there is a significant chance of eavesdropping during content transfer in wireless networks because of the broadcast feature of wireless signals. To solve these problems, reliable physical layer security methods are needed that protect from both internal and external attacks and maintain data confidentiality and integrity in real-time situations. These issue of security can be solved using physical layer security5.
Non- Orthogonal Multiple Access (NOMA) has gained substantial attention in recent times as it allows multiple users to share the same time and frequency resources, increasing spectral efficiency and user capacity. On the other hand, Orthogonal Multiple Access (OMA) allocates separate resources to each user, limiting the number of simultaneous connections. NOMA offers several advantages over OMA that make it an appealing choice for wireless communication systems. Firstly, NOMA significantly enhances spectral efficiency by allowing multiple users to share the same resources simultaneously. This is achieved through power domain multiplexing, where users with better channel conditions are allocated more power than those with weaker channels. As a result, NOMA can support a larger number of users within the same bandwidth compared to OMA, making it an efficient solution for overcrowded networks. The NOMA approach has the potential to be integrated with current multiple access paradigms since it takes advantage of the new aspect of the power domain6. In Ref.7, power domain NOMA was discussed in detail and also compared with code domain NOMA. Furthermore, a comparative analysis of the various NOMA techniques’ methodologies concerning the receiver’s complexity as a result of successive interference cancellation (SIC) was also covered. Cooperative NOMA was used in Ref.8 to enhance the performance of far-user with poor channel condition. Cooperative transmission can construct a virtual multiple-input multiple-output (MIMO) system to process data collaboratively, which can improve communication dependability for users under weak channel circumstances.
Unmanned aerial vehicles (UAVs) that can be utilized for a variety of purposes such as military, surveillance tasks, farming and agricultural systems delivery of goods and healthcare services, aerial photography, and surveying are also made feasible by 6G9,10. 6G is a technology suitable for civilian as well as military UAV networks. It can serve as an essential technology in communication networks11,12,13,14. Recently, several works have been done to improve the performance of UAVs. In Ref.15, a task scheduling algorithm was proposed for Space-Air-Ground integrated networks to ensure fairness in resource allocation. In Ref.16, a path loss and shadowing model was developed for UAV-ground communication, considering urban infrastructure impact. Deep reinforcement learning (DRL) and Boids based model were analyzed for UAV pursuit-evasion methods in Ref.17. A causal intervention approach for target-driven navigation was analyzed in Ref.18. Wavelet decomposition was used in Ref.19 to present a deep learning-based anomaly detection technique for UAV networks. A CSMA/CA-based optimization methodology was presented in Ref.20 to strike a compromise between efficiency and fairness in UAV-MIMO networks. Age of information limitations in ultra-reliable low-latency communications (URLLC) UAV networks were examined in Ref.21. In Ref.22, an energy consumption model was analyzed for UAV assisted communications. In Ref.23,an adaptive control system for UAV navigation using DRL was analyzed. In Ref.24,25, different parameters of UAV systems were analyzed for enhancing accuracy. In Ref.26, a switching control strategy for multiple UAVs was developed for omni-directional intelligent navigator.
Additionally, UAVs can increase coverage area and assist small base stations in offloading traffic27. Therefore, it is important to provide the security on the physical layer of UAV networks28. With NOMA, UAVs can transmit and receive data simultaneously29, utilizing the power domain for user separation. This allows for a higher number of UAVs to operate in the same area without causing interference or congestion. Additionally, NOMA’s low-latency capabilities make it suitable for real-time applications, such as UAV control and video streaming. Unfavorable weather, such as rain, snow, or strong winds, might interfere with all UAV-assisted communication. Signal quality for UAV-assisted communication might fluctuate suddenly due to fading, interference, and other issues. Since all users in wireless networks receive messages over an open channel, users must protect their message confidentiality from both external and internal eavesdroppers. One interesting approach to improving the secrecy performance of system is to take advantage of physical layer capabilities of wireless networks.
Cooperative transmission applied to NOMA has recently been taken into consideration in Ref.8,30,31. In Ref.30, a cooperative NOMA system with several relays was examined. A hybrid decode-and-forward (DF) and amplify-and-forward (AF) relaying method were used in Ref.30. The AF relay first amplifies the received signal before forwarding it to the destination, while the DF relay first decodes the received signal and then forwards it to the destination after re-encoding. The performance of a NOMA-based system using DF relaying of a two-stage relay selection (TSRS) approach during outages was examined in Ref.32. According to the results in Ref.32, the suggested TSRS performs better than the typical max–min relay selection method33. More recently, the authors in Ref.34 investigated a NOMA based cooperative system using an AF relay and came up with a reasonable approximation for the outage probability. Wyner was the first to put up the idea of physical layer security due to the wireless communication broadcast nature35.
Physical layer security has lately attracted a lot of interest as an interesting way to create secure communication. A lot of research has been done on secrecy performance analysis for many systems up to this point, including MIMO (transmit antenna selection and cooperative diversity36, maximum ratio combining)37, cognitive radio38 and energy harvesting39. These works, however, have no relation to the cooperative NOMA system. The physical layer security for 5G NOMA has recently been taken into consideration in40,41 using stochastic geometry. Later, a continuation of40 was made and reported in42, where two new structures were suggested to enhance the secrecy performance for single and multiple antenna probability based stochastic geometrical systems, respectively. The best designs of power, transmission rates, and decoding order given to each user were explored in43,44,45, along with a novel NOMA design under secrecy concerns. NOMA has been seen as a potentially useful approach for downlink communication because of its enhanced spectral efficiency and its capacity to provide large-scale connectivity46,47,48,49. The study conducted in50 examines the secrecy outage probability (SOP) of a NOMA system that has external eavesdroppers. The study in Ref.51 used maximum ratio transmission (MRT) and maximum ratio combination (MRC) techniques to investigate the SOP of MIMO-NOMA relay systems. In the same way, the effect of imperfect channel state information (CSI) on SOP for cooperative cognitive NOMA networks is investigated in Ref.52. The secrecy performance of downlink overlay CR-NOMA systems with imperfect SIC was examined in53. The SOP of the other NOMA systems that are susceptible to external eavesdropping have been examined in a variety of contexts, including secure cooperative NOMA systems and relay-assisted NOMA networks54. The study in Ref.55 used long short-term memory-based channel estimation to improve security and performance while examining energy efficiency maximization in device-to-device-based cognitive radio networks using NOMA while taking eavesdropping concerns into account. Likewise,56 examined an end-to-end cooperative NOMA-based Internet of Things system with wireless energy harvesting, assessing the likelihood of a secrecy outage and determining the best power distribution to enhance secrecy. UAV assisted cooperative NOMA systems were studied recently to analyze the systems performance57,58,59. The study conducted in Ref.50 examines the secrecy outage probability (SOP) of a NOMA system that has external eavesdroppers. The SOP of the other NOMA systems that are susceptible to external eavesdropping have been examined in a variety of contexts, including secure cooperative NOMA systems and relay-assisted NOMA networks54. UAV assisted cooperative NOMA systems were studied recently to analyze the systems performance57,58,59
Motivation and contribution
With the evaluation of 6G networks, the demand for high spectral efficiency and massive connectivity is increasing rapidly. In this context, UAV is a promising technique to enhance the network performance. UAVs are also useful in distant and disaster-affected areas because they provide adaptable and increased coverage. Simultaneously, NOMA has also gained attention due to its higher spectral efficiency and huge connectivity in comparison with the orthogonal multiple access technique. Recent research also shows that UAVs can maximize user access and network throughput when used with NOMA. However, UAV-assisted communications are susceptible to eavesdropping and security threats due to the coexistence of trusted and untrusted users in the open nature of wireless communication. Physical layer security (PLS) is a key technique to enhance the secrecy performance of wireless networks without depending on conventional cryptographic techniques. Although the PLS of NOMA systems has been investigated thoroughly, a secrecy performance of UAV-assisted cooperative NOMA systems in the presence of untrusted destinations have not yet been analyzed. The impact of power allocation coefficient, illegal SNR of eavesdroppers, and Rayleigh fading parameters on secrecy metrics such as SOP and Strictly Positive Secrecy Capacity (SPSC) has not been investigated thoroughly yet.
The major contributions and novelty of this work are as follows:
-
We propose a UAV assisted cooperative NOMA system with two untrusted destinations which uses a half-duplex (HD) AF relay over Rayleigh fading channel for downlink communication.
-
We derive the analytical expressions of SOP, SPSC, and asymptotic SOP and analyze the secrecy performance in terms of average values of illegal SNR, target rate, power allocation coefficient, and Rayleigh channel parameters.
-
We use Monte Carlo simulations to validate the analytical results.
Organization of the paper
The remaining content of this paper is written as follows: In the second section, we propose and describe the UAV assisted cooperative NOMA system with two untrusted destinations which uses AF relay. In the third section, we derive the SOP and SPSC of proposed system with HD AF relay. In the fourth section, we show the outcomes of the simulation results and in the fifth section, we conclude the paper.
System model
We consider a UAV-assisted cooperative Non-Orthogonal Multiple Access (NOMA) system consisting of a base station as the source (X), a half-duplex amplify-and-forward (HD-AF) relay (R) operating in half-duplex mode, two destinations (\(D_1\), far destination, and \(D_2\), near destination), and two untrusted destinations (\(U_1\) and \(U_2\)). Figure 1 shows the UAV assisted cooperative NOMA system with two untrusted destinations.
The links between X to R, R to \(D_1\), and R to \(D_2\) are considered as legal links, while the links from the relay to \(U_1\) and \(U_2\) are considered as illegal links. All channels are assumed to suffer from independent Rayleigh fading, with the following channel gains and corresponding Rayleigh parameters: \(h_X^R, \; h_R^{D_1}, \; h_R^{D_2}, \; h_R^{U_1}, \; \text {and} \; h_R^{U_2}\) with channel parameters \(\lambda _X^R, \; \lambda _{R}^{D_1}, \; \lambda _{R}^{D_2}, \; \lambda _{R}^{U_1}, \; \text {and} \; \lambda _{R}^{U_2},\) respectively60.
Specifically, in the first time slot (FTSL), the source transmits a superposition of two different message signals, \(x_{1}\) and \(x_{2}\), to the relay R as follows35:
where \(x_i\) denotes the i-th data symbol for the i-th destination with normalized power \(E[|x_i|^2] = 1\), \(W_{X}\) is the total power transmitted from X, and \(\alpha _i\) is the power allocation coefficient for the \(i^{th}\) destination.
To fulfill the quality-of-service requirement of the first destination, we consider \(\alpha _{1}\) to be greater than \(\alpha _{2}\), and they satisfy the following expression: \(\alpha _{1}^2 + \alpha _{2}^2 = 1.\) Then, the received signal \(y_X^R\) at R in the FTSL can be expressed as:
where \(n_X^R\) represents the additive white Gaussian noise (AWGN) with zero mean and variance \(N_D\).
In the second time slot (STSL), the AF relay amplifies the signal and forwards it to the destinations. The received signal at the i-th trusted destination can be expressed as:
where \(h_R^{D_i}\) is the channel gain between R and the i-th destination, \(n_{D_i}^R\) denotes the additive Gaussian noise at the i-th destination with zero mean and variance \(N_D\), and \(\beta\) represents the amplification factor, which can be defined as:
where, \(W_{r}\) is the relay transmitted power. Furthermore, after considering \(W_{r}= W_{X}\), Eq. (4) can be simplified to:
where, \(\rho _1 = \frac{W_{X}}{N_D}\) is the average signal-to-noise ratio (SNR) of the legal link. Similarly, the signal received by the i-th untrusted destination can be expressed as:
where \(h_{R}^{U_i}\) is the channel gain between R and the i-th untrusted destination, and \(n_{U_i}^R\) denotes the additive Gaussian noise with zero mean and variance \(N_{U}\).
Substituting \(y_X^R\) from Eq. (2) into Eq. (3), the received signal at the i-th trusted destination \(y_{D_i}^R\) can be modified as:
The received signals at the trusted and untrusted destinations, \(y_{D_1}^R\), \(y_{D_2}^R\), \(y_{U_1}^R\), and \(y_{U_2}^R\), can be defined as:
The Signal-to-Interference-plus-Noise Ratio (SINR) at the far destination \(D_1\), \(\gamma _{D_1}\), can be defined using Eq. (8) as:
After substituting \(\beta\) from Eq. (5) into Eq. (12) and considering \(\rho _1 = \frac{W_{X}}{N_D}\), Eq. (12) can be modified as:
The Signal-to-Interference-plus-Noise Ratio (SINR) at the far destination \(D_1\) can be defined as:
For the near destination \(D_2\), which first decodes the message of \(D_1\) and then performs perfect successive interference cancellation (SIC), the SNR can be defined as:
For the eavesdropper at \(U_1\), the SINR can be defined as:
where \(\rho _2 = \frac{W_{X}}{N_{U}}\) denotes the average SNR of the illegal link.
Similarly, the SNR at \(U_2\) can be defined as:
Considering the case of high SINR, the previous equations can be simplified as:
The average rate from the relay to trusted destinations \(C_{R}^{D_i}\) and untrusted destinations \(C_{R}^{U_i}\) can be expressed as:
In the proposed system model, \(U_1\) decodes the message of \(D_1\) and \(U_2\) decodes the message of \(D_2\). Thus, the secrecy rates for \(D_1\) and \(D_2\) can be defined as:
Secrecy performance analysis
In this section, we first derive the analytical expressions for the SOP and SPSC for the proposed cooperative UAV-assisted cooperative NOMA system with two untrusted destinations over Rayleigh fading.
Secrecy outage probability
The Secrecy Outage Probability (SOP) is defined as the probability that the instantaneous Signal-to-Noise Ratio (SNR) is lower than a specified threshold61,62,63. In the proposed system model, two message signals are sent from the source (X) to the far destination \((D_1)\) and the near destination \((D_2)\) respectively, through a relay. An outage occurs either when \(\gamma _{D_1}\) or \(\gamma _{D_2}\) starts to fall below their respective target rates (\(R_1\) or \(R_2\)). The SOP can be represented using this definition as:
where \(P[\cdot ]\) measures the probability. Equation (25) can be modified using Eqs. (23) and (24) as:
Equation (26) can be further modified using Eqs. (21) and (22) as:
We can express the SOP as:
where \(C_{th}^{'} = 2^{2R_1}\) and \(C_{th}^{''} = 2^{2R_2}\). Eq. (28) can be modified using Eqs. (17) and (19) as64:
Equation (29) can be modified using Eqs. (18) and (20) as:
where \(L_1 = \frac{1 - \alpha _{2}^2 C_{th}^{'}}{\alpha _{1}^2 \alpha _{2}^2 C_{th}^{'}}\). Here \(L_1\) should be greater than zero; otherwise, the SOP will be one.
Now, after applying the broad equality65, i.e., \(\frac{ab}{a+b} \le \min \{a,b\}\) in Eq. (30), we can modify Eq. (30) as:
where \(A^{'} = \frac{\rho _2}{\rho _1} C_{th}^{''}\) and \(B^{'} = \frac{C_{th}^{''}-1}{\rho _1 \alpha _{2}^2}\). As \(P(l_1, l_2) = P(l_1) - P\left( l_1, \overline{l_2}\right)\)65, now considering:
in Eq. (31), it can be modified as:
Let \(x^{'} = |h_R^{U_2}|^2\) and \(|h_X^R|^2\) be smaller than \(C_{th}^{''} |h_X^R|^2 + B^{'}\). So, Eq. (32) can be modified as:
The SOP for the proposed system can be calculated from the above expression as follows:
where, \(P'=P\Big ( |h_X^R|^2> A'x' + B', |h_{R}^{D_2}|^2 > A'x' + B' \Big )\) and \(P''=P\Big \{|h_X^R|^2> (A'x' + B'), |h_{R}^{D_2}|^2> (A'x' + B') \Big \} P\Big (\rho _1 |h_X^R|^2, \rho _2 |h_{R}^{D_1}|^2 > L_1\Big )\). Now considering \(P'\):
As \(P\left( |h_X^R|^2 > A'x' + B' \right) = 1 - \int _0^{A'x' + B'} \lambda _X^R e^{-\lambda _X^R y} \, dy = e^{-\lambda _X^R(A'x' + B')}\) and \(P\left( |h_{R}^{D_2}|^2 > A'x' + B' \right) = e^{-\lambda _{R}^{D_2}(A'x' + B')}.\)
So Eq. (34) can be modified as:
Now considering \(P''\):
Similar to Eqs. (34), (38)) can be modified as:
Now, substituting the values of \(P'\) and \(P''\) into Eq. (33):
The final expression of SOP contains exponential terms, which indicates that it depends upon channel coefficient gains, power allocation coefficient, and target rates. These parameters need to be optimized for optimizing wireless systems under security constraints.
Strictly positive secrecy capacity
The Secrecy Positive Secrecy Capacity (SPSC) is a fundamental benchmark in secure communications. SPSC measures the maximum achievable secrecy rate for reliable communication and ensures that eavesdroppers cannot decode the messages. With this description, the SPSC may be defined as65:
Using Eqs. (21) to (24), Eq. (43) can be modified as:
Using Eqs. (17) to (20), Eq. (44) can be further modified as:
Now, after applying the broad equality65 in Eq. (45), it can be modified as:
Equation (46) can then be expressed as:
Further simplification gives:
Letting \(x' = |h_R^{U_2}|^2\), Eq. (49) becomes:
After further simplification, we obtain:
which can be written as:
The final expression of SPSC depends upon channel coefficient gains and ratio of SNRs of illegal and legal links.
Asymptotic SOP analysis
From Eq. (28), we have:
Therefore, the SOP performance of the proposed AF-based NOMA systems can be asymptotically expressed as:
Since \(\alpha _{1}^2 + \alpha _{2}^2 = 1\), Eq. (54) can be modified as:
Letting \(L_1 = \frac{1 - \alpha _{2}^2 C_{th}'}{\alpha _{1}^2 \alpha _{2}^2 C_{th}'}\), Eq. (56) can be modified as:
Thus, the final expression for SOP is:
Equation (58) represents the asymptotic expression of the SOP for the proposed UAV-assisted cooperative NOMA system in presence of eavesdroppers. This equation shows that SOP depends on the Rayleigh fading channel parameter of the illegal link between R to \(U_1\), ratio of the legal to illegal SNR \((\rho _2)\) and \(L_1\) which further depends upon power allocation coefficients \((\alpha _{1}, \alpha _{2})\) and target secrecy rate (R1).
Therefore, the final expressions of SOP and SPSC contain exponential terms and depend on channel coefficient gains, power allocation coefficients, and target rates.
Numerical results
In this section, we provide the simulation results to show the secrecy performance of the proposed UAV-assisted NOMA-based cooperative system with two untrusted destinations. We use Monte Carlo simulations to validate the analytical results.
Figure 2 illustrates the plots of SOP versus SNR at different values of average illegal SNR (\(\rho _2\)), specifically at 1 dB, 2 dB, and 4 dB. Here, we take \(\lambda _{R}^{U_2} = 1\), \(\lambda _{R}^{U_1} = 1\), \(\lambda _X^R = 1\), \(\lambda _R^{D_2} = 1\), the power of the first allocation factor = 0.87, and \(R_1 = 0.51\) bits per channel use (BPCU), \(R_2 = 2.1\) BPCU. At 30 dB SNR, the SOP values are 0.44, 0.51, and 0.65 at \(\rho _2 = 1\) dB, 2 dB, and 4 dB, respectively. This indicates that SOP is 16% more at \(\rho _2 = 2\) dB and 48% more at \(\rho _2 = 4\) dB compared to SOP at \(\rho _2 = 1\) dB. Therefore, it is observed that SOP increases as the value of \(\rho _2\) increases and decreases as \(\rho _1\) increases up to 45 dB, becoming constant at larger values of \(\rho _1\) (asymptotic SOP). Thus, SOP depends only on \(\rho _2\) at large values of \(\rho _1\), and small values of \(\rho _2\) are required for reliable communication.
Figure 3 shows the plots of SOP versus average illegal SNR (\(\rho _2\)) at different values of legal SNR (\(\rho _1\)), specifically at 20 dB, 25 dB, 30 dB, and 35 dB. The parameters used are \(\lambda _{R}^{U_2} = 1\), \(\lambda _{R}^{U_1} = 1\), \(\lambda _X^R = 1\), \(\lambda _R^{D_2} = 1\), power of the first allocation factor = 0.87, and \(R_1 = 0.51\) BPCU, \(R_2 = 2.1\) BPCU. At 4 dB average illegal SNR, the SOP values are 0.943, 0.779, 0.648, and 0.591 at legal SNRs of 20 dB, 25 dB, 30 dB, and 35 dB, respectively. Thus, SOP is 17% less at 25 dB, 31% less at 30 dB, and 37% less at 35 dB compared to SOP at 20 dB. It is observed that SOP increases as \(\rho _2\) increases and decreases as \(\rho _1\) increases.
Figure 4 represents the plots of SOP versus SNR at different target rates (\(R_1\) and \(R_2\)), specifically \(R_1 = 0.2\), 0.3, 0.4, and 0.5 BPCU, and \(R_2 = 0.5\), 1, 1.5, and 2 BPCU. Here, we take \(\lambda _{R}^{U_2} = 1\), \(\lambda _{R}^{U_1} = 1\), \(\lambda _X^R = 1\), \(\lambda _R^{D_2} = 1\), power of the first allocation factor = 0.87, and \(\rho _2 = 1\) dB. It is observed that SOP increases as the values of the target rate increase and decreases as \(\rho _1\) increases.
Figure 5 illustrates the plots of SOP versus SNR at different values of the power allocation coefficient \(\alpha _{1}\), specifically \(\alpha _{1} = 0.8\), 0.85, 0.90, and 0.95. Here, we take \(R_1 = 0.51\) BPCU, \(R_2 = 2.1\) BPCU, \(\lambda _{R}^{U_2} = 1\), \(\lambda _{R}^{U_1} = 1\), \(\lambda _X^R = 1\), \(\lambda _R^{D_2} = 1\), power of the first allocation factor = 0.87, and \(\rho _2 = 7\) dB. At 30 dB SNR, the SOP values are 0.90, 0.84, 0.74, and 0.62 at \(\alpha _{1} = 0.8\), 0.85, 0.90, and 0.95, respectively. Thus, SOP is 6% less at \(\alpha _{1} = 0.85\), 17% less at \(\alpha _{1} = 0.90\), and 31% less at \(\alpha _{1} = 0.95\) compared to SOP at \(\alpha _{1} = 0.80\). Therefore, it is observed that SOP decreases as the values of \(\alpha _{1}\) increase and decreases as \(\rho _1\) increases.
Figure 6 shows the plots of SPSC versus SNR at different values of average illegal SNR (\(\rho _2\)), specifically at 0 dB, 1 dB, 2 dB, and 4 dB. Here, we take \(\lambda _{R}^{U_2} = 1\), \(\lambda _{R}^{U_1} = 1\), \(\lambda _X^R = 1\), \(\lambda _R^{D_2} = 1\), power of the first allocation factor = 0.81, \(R_1 = 0.51\) BPCU, and \(R_2 = 2.1\) BPCU. At 30 dB SNR, the SPSC values are 0.94, 0.90, 0.84, and 0.68 at \(\rho _2 = 0\) dB, 1 dB, 2 dB, and 4 dB, respectively. Thus, SPSC is 4% less at \(\rho _2 = 1\) dB, 16% less at \(\rho _2 = 2\) dB, and 27% less at \(\rho _2 = 4\) dB compared to SPSC at \(\rho _2 = 0\) dB. Therefore, it is observed that SPSC decreases as \(\rho _2\) increases and also increases with \(\rho _1\) up to 20 dB SNR.
Figure 7 illustrates the plots of SPSC versus average illegal SNR (\(\rho _2\)) at different values of legal SNR (\(\rho _1\)), specifically at 15 dB, 20 dB, 25 dB, and 30 dB. Here, we take \(\lambda _{R}^{U_2} = 1\), \(\lambda _{R}^{U_1} = 1\), \(\lambda _X^R = 1\), \(\lambda _R^{D_2} = 1\), power of the first allocation factor = 0.81, \(R_1 = 0.51\) BPCU, and \(R_2 = 2.1\) BPCU. At 4 dB average illegal SNR, the SPSC values are 0.86, 0.79, 0.66, and 0.58 at legal SNRs of 15 dB, 20 dB, 25 dB, and 30 dB, respectively. Thus, SPSC is 7% less at 20 dB, 23% less at 25 dB, and 32% less at 30 dB compared to SPSC at 15 dB. It is observed that SPSC increases with \(\rho _2\) and decreases as \(\rho _1\) increases.
Figure 8 represents the plots of SPSC versus SNR at different values of the power allocation coefficient \(\alpha _{1}\), specifically \(\alpha _{1} = 0.8, 0.85, 0.90, \text {and } 0.95\). Here, we take \(R_1 = 0.51\) BPCU, \(R_2 = 2.1\) BPCU, \(\lambda _R^{U_2} = 1\), \(\lambda _{R} ^{U_1} = 1\), \(\lambda _X^R = 1\), \(\lambda _R^{D_2} = 1\), and \(\rho _2 = 7\) dB. At 30 dB SNR, the SPSC values are 0.58, 0.68, 0.81, and 0.96 at \(\alpha _{1} = 0.8, 0.85, 0.90, \text {and } 0.95\), respectively. SPSC increases by 17% at \(\alpha _{1} = 0.85\), 40% at \(\alpha _{1} = 0.90\), and 65% at \(\alpha _{1} = 0.95\) compared to \(\alpha _{1} = 0.80\). It is observed that SPSC increases as the value of \(\alpha _{1}\) increases and also with \(\rho _1\) up to 20 dB.
Figure 9 shows the plots of SPSC versus SNR at different values of \(\lambda _{R} ^{U_1}\), specifically \(1, 0.75, 0.50, \text {and } 0.25\). Here, we take \(R_1 = 0.51\) BPCU, \(R_2 = 2.1\) BPCU, \(\lambda _R^{U_2} = 1\), \(\lambda _X^R = 1\), \(\lambda _R^{D_2} = 1\), the power of the first allocation factor = 0.87, and \(\rho _2 = 1\) dB. At 30 dB SNR, the SPSC values are 0.90, 0.82, 0.68, and 0.44 at \(\lambda _{R} ^{U_1} = 1, 0.75, 0.50, \text {and } 0.25\), respectively. SPSC decreases by 8% at \(\lambda _{R} ^{U_1} = 0.75\), 24% at \(\lambda _{R} ^{U_1} = 0.50\), and 51% at \(\lambda _{R} ^{U_1} = 0.25\) compared to \(\lambda _{R} ^{U_1} = 1\). It is observed that SPSC increases as \(\lambda _{R} ^{U_1}\) increases and also with \(\rho _1\) up to 20 dB.
Figure 10 illustrates the plots of SPSC versus SNR at different values of \(\lambda _R^{U_2}\), specifically \(0.25, 0.50, 0.75, \text {and } 1\). Here, we take \(R_1 = 0.51\) BPCU, \(R_2 = 2.1\) BPCU, \(\lambda _{R} ^{U_1} = 1\), \(\lambda _X^R = 1\), \(\lambda _R^{D_2} = 1\), the power of the first allocation factor = 0.87, and \(\rho _2 = 1\) dB. At 10 dB SNR, the SPSC values are 0.719, 0.674, 0.599, and 0.448 at \(\lambda _R^{U_2} = 1, 0.75, 0.50, \text {and } 0.25\), respectively. SPSC decreases by 6% at \(\lambda _R^{U_2} = 0.75\), 17% at \(\lambda _R^{U_2} = 0.50\), and 38% at \(\lambda _R^{U_2} = 0.25\) compared to \(\lambda _R^{U_2} = 1\). It is observed that SPSC increases as \(\lambda _R^{U_2}\) decreases and also with \(\rho _1\) up to 30 dB.
Conclusion
This paper proposed an AF relay based UAV assisted cooperative NOMA system with two untrusted destinations. The exact expression of SOP and SPSC were derived. Simulation results shows that SOP increases with higher values of average illegal SNR, higher target rate and lower values of power allocation coefficient of far destination. Also, SPSC increases with lower values of average illegal SNR, higher values of power allocation coefficient of far destination, higher values of Rayleigh channel parameter between relay and untrusted far destination and untrusted near destination. Furthermore, with high values of average legal SNR, there is a better chance of obtaining a secure communication which leads to the conclusion that in a UAV assisted cooperative NOMA system, the secrecy performance is usually determined by power allocation coefficient, average illegal SNR, target rate and Rayleigh channel parameter between relay and untrusted destinations. Therefore, it is observed from the simulation results that secrecy performance stabilizes at high legal SNR values, showing that enhanced security is not always achieved by only increasing transmission power. Rather, it may be more efficient to optimize system design at lower and moderate SNR values. This analysis may be helpful for providing privacy, integrity and reliability to wireless destinations in presence of untrusted destinations who have strong eavesdropping capabilities. In the future, the full duplex relay and multiple untrusted destinations may be used to analyze the proposed system model. Additionally, future work will include integrating intelligent power allocation through deep learning, adaptive beamforming for UAV mobility, or cooperative jamming strategies to enhance secrecy performance in UAV-assisted NOMA networks.
Data Availability
The data used and/or analyzed during the current study are available from the corresponding author upon reasonable request.
References
Banafaa, M. et al. 6G mobile communication technology: Requirements, targets, applications, challenges, advantages, and opportunities. Alex. Eng. J. 64, 245–274 (2023).
Bhattacharya, P. et al. Coalition of 6G and blockchain in AR/VR space: Challenges and future directions. IEEE Access 9, 168455–168484 (2021).
Cook, J., Rehman, S. U. & Khan, M. A. Security and privacy for low power iot devices on 5G and beyond networks: Challenges and future directions. IEEE Access 11, 39295–39317 (2023).
Arias, O., Wurm, J., Hoang, K. & Jin, Y. Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-scale Comput. Syst. 1, 99–109 (2015).
Mukherjee, A., Fakoorian, S. A. A., Huang, J. & Swindlehurst, A. L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 16, 1550–1573 (2014).
Ding, Z. et al. Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Commun. Mag. 55, 185–191 (2017).
Ding, Z., Peng, M. & Poor, H. V. Cooperative non-orthogonal multiple access in 5G systems. IEEE Commun. Lett. 19, 1462–1465 (2015).
Liu, Y., Ding, Z., Elkashlan, M. & Poor, H. V. Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer. IEEE J. Sel. Areas Commun. 34, 938–953 (2016).
Aggarwal, S., Kumar, N. & Tanwar, S. Blockchain-envisioned UAV communication using 6G networks: Open issues, use cases, and future directions. IEEE Internet Things J. 8, 5416–5441 (2020).
Singh, S. K., Agrawal, K., Singh, K., Li, C.-P. & Huang, W.-J. On UAV selection and position-based throughput maximization in multi-UAV relaying networks. IEEE Access 8, 144039–144050 (2020).
Fotouhi, A., Ding, M. & Hassan, M. Flying drone base stations for macro hotspots. IEEE Access 6, 19530–19539 (2018).
Zhang, L. & Ansari, N. A framework for 5G networks with in-band full-duplex enabled drone-mounted base-stations. IEEE Wirel. Commun. 26, 121–127 (2019).
Zhang, L. & Ansari, N. Approximate algorithms for 3-D placement of IBFD enabled drone-mounted base stations. IEEE Trans. Veh. Technol. 68, 7715–7722 (2019).
Zhang, Q. et al. IoT enabled UAV: Network architecture and routing algorithm. IEEE Internet Things J. 6, 3727–3742 (2019).
Sun, G., Wang, Y., Yu, H. & Guizani, M. Proportional fairness-aware task scheduling in space-air-ground integrated networks. IEEE Trans. Serv. Comput. (2024).
Path loss and shadowing for uav-to-ground uwb channels incorporating the effects of built-up areas and airframe. IEEE Trans. Intell. Transport. Syst. 25, 17066–17077. https://doi.org/10.1109/TITS.2024.3418952 (2024).
Jin, W. et al. Enhanced UAV pursuit-evasion using boids modelling: A synergistic integration of bird swarm intelligence and DRL. Comput. Mater. Continua. 80 (2024).
Zhao, X. et al. Target-driven visual navigation by using causal intervention. IEEE Trans. Intell. Veh. 9, 1294–1304 (2023).
Zhou, S., He, Z., Chen, X. & Chang, W. An anomaly detection method for UAV based on wavelet decomposition and stacked denoising autoencoder. Aerospace 11, 393 (2024).
Chen, J., Wang, J., Wang, J. & Bai, L. Joint fairness and efficiency optimization for CSMA/CA-based multi-user mimo UAV ad hoc networks. IEEE J. Sel. Top. Signal Process. 18, 1311–1323. https://doi.org/10.1109/JSTSP.2024.3435348 (2024).
Wang, J. et al. Age of information based URLLC transmission for UAVS on pylon turn. IEEE Trans. Veh. Technol. 73, 8797–8809. https://doi.org/10.1109/TVT.2024.3358844 (2024).
Gao, N. et al. Energy model for UAV communications: Experimental validation and model generalization. China Commun. 18, 253–264 (2021).
Yin, Y., Wang, Z., Zheng, L., Su, Q. & Guo, Y. Autonomous UAV navigation with adaptive control based on deep reinforcement learning. Electronics 13, 2432 (2024).
Nonut, A. et al. A small fixed-wing UAV system identification using metaheuristics. Cogent Eng. 9, 2114196 (2022).
Tai, S. et al. Identification of aircraft longitudinal aerodynamic parameters using an online corrective test for wind tunnel virtual flight. Chin. J. Aeronaut. 37, 261–275. https://doi.org/10.1016/j.cja.2024.05.031 (2024).
Hu, J., Chen, B. & Ghosh, B. K. Formation-circumnavigation switching control of multiple odin systems via finite-time intermittent control strategies. IEEE Trans. Control Netw. Syst. 11, 1986–1997. https://doi.org/10.1109/TCNS.2024.3371597 (2024).
Zhao, N. et al. Caching UAV assisted secure transmission in hyper-dense networks based on interference alignment. IEEE Trans. Commun. 66, 2281–2294 (2018).
Zhou, X., Wu, Q., Yan, S., Shu, F. & Li, J. UAV-enabled secure communications: Joint trajectory and transmit power optimization. IEEE Trans. Veh. Technol. 68, 4069–4073 (2019).
Ahmad, S., Khan, I. U. & Khan, M. J. Performance analysis of NOMA based UAV-assisted cooperative relaying system with direct link over rician fading channels. Eng. Res. Express 5, 045030 (2023).
Liu, Y., Pan, G., Zhang, H. & Song, M. Hybrid decode-forward & amplify-forward relaying with non-orthogonal multiple access. IEEE Access 4, 4912–4921 (2016).
Li, B., Xu, D., Chen, B. & Ahmad, I. On the secrecy outage performance of cooperative NOMA-assisted hybrid satellite-terrestrial networks. Wirel. Commun. Mob. Comput. (2022).
Ding, Z., Dai, H. & Poor, H. V. Relay selection for cooperative NOMA. IEEE Wirel. Commun. Lett. 5, 416–419 (2016).
Han, M. & Zhang, J. On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems. J. King Saud Univ.-Comput. Inf. Sci. 34, 9455–9463 (2022).
Liang, X. et al. Outage performance for cooperative NOMA transmission with an AF relay. IEEE Commun. Lett. 21, 2428–2431 (2017).
Wyner, A. D. The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975).
Zou, Y., Wang, X. & Shen, W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 31, 2099–2111 (2013).
Yang, N., Suraweera, H. A., Collings, I. B. & Yuen, C. Physical layer security of TAS/MRC with antenna correlation. IEEE Trans. Inf. Forensics Secur. 8, 254–259 (2012).
Zou, Y., Wang, X. & Shen, W. Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans. Commun. 61, 5103–5113 (2013).
Zhang, M. & Liu, Y. Energy harvesting for physical-layer security in OFDMA networks. IEEE Trans. Inf. Forensics Secur. 11, 154–162 (2015).
Qin, Z., Liu, Y., Ding, Z., Gao, Y. & Elkashlan, M. Physical layer security for 5G non-orthogonal multiple access in large-scale networks. In 2016 IEEE International Conference on Communications (ICC), 1–6 (IEEE, 2016).
Zhao, X., Zhao, Y., Huang, J., Zhao, W. & Sun, J. Physical layer security for indoor hybrid PLC/VLC networks with NOMA. IEEE Open J. Commun. Soc. (2024).
Liu, Y., Qin, Z., Elkashlan, M., Gao, Y. & Hanzo, L. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 16, 1656–1672 (2017).
He, B., Liu, A., Yang, N. & Lau, V. K. On the design of secure non-orthogonal multiple access systems. IEEE J. Sel. Areas Commun. 35, 2196–2206 (2017).
Ding, Z., Dai, L. & Poor, H. V. MIMO-NOMA design for small packet transmission in the internet of things. IEEE Access 4, 1393–1405 (2016).
Patel, C. S., Stuber, G. L. & Pratt, T. G. Statistical properties of amplify and forward relay fading channels. IEEE Trans. Veh. Technol. 55, 1–9 (2006).
Khan, M. J., Chauhan, R. C. S. & Singh, I. Performance analysis of heterogeneous network using relay diversity in high-speed vehicular communication. Wirel. Pers. Commun. 125, 1163–1184 (2022).
Khan, M. J., Chauhan, R. C. S. & Singh, I. Outage probability and throughput of cooperative non-orthogonal multiple access with moving relay in heterogeneous network. Trans. Emerg. Telecommun. Technol. E4616. (2022).
Khan, M. J., Chauhan, R. C. S. & Singh, I. Energy-efficient multiple cooperative moving relay selection for heterogeneous nonorthogonal-multiple access systems. Int. J. Commun. Syst. E5408.(2022).
Khan, M. J., Chauhan, R. C. S. & Singh, I. Comparative analysis of full duplex and half duplex relay for high-speed vehicular scenario. Wirel. Pers. Commun. 127, 3435–3448 (2022).
Jiang, K. & Wang, H. Secrecy analysis for full-duplex jamming-aided uplink NOMA system. Proc. Comput. Sci. 187, 116–121 (2021).
Le Cuong, N., Hoang, T. M. & Hiep, P. T. Secrecy outage performance of MIMO-NOMA relay systems with MRT/MRC schemes. Comput. Commun. 219, 116–127 (2024).
Huynh, T.-P., Ha, D.-H., Thanh, C. T., Fazio, P. & Voznak, M. Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks. Sensors 20, 895 (2020).
Godugu, K. K. & Vappangi, S. Investigations on secrecy performance of downlink overlay cr-noma system with sic imperfections. IEEE Access 12, 18051–18072. https://doi.org/10.1109/ACCESS.2024.3361038 (2024).
Abolpour, M., Mirmohseni, M. & Aref, M. R. On the secrecy performance of NOMA systems with both external and internal eavesdroppers. arXiv preprint arXiv:1906.03929 (2019).
Ghosh, S., Maity, S. P. & Chakraborty, C. On EE maximization in d2d-CRN with eavesdropping using LSTM-based channel estimation. IEEE Trans. Consum. Electron. 70, 3906–3913. https://doi.org/10.1109/TCE.2024.3370313 (2024).
Ghosh, S., Al-Dweik, A. & Alouini, M.-S. On the performance of end-to-end cooperative NOMA-based IoT networks with wireless energy harvesting. IEEE Internet Things J. 10, 16253–16270 (2023).
Umakoglu, I., Namdar, M. & Basgumus, A. UAV-assisted cooperative NOMA system with the nth best relay selection. Adv. Electr. Comput. Eng. 23, 39–46 (2023).
Mu, G. Joint beamforming and power allocation for wireless powered UAV-assisted cooperative NOMA systems. EURASIP J. Wirel. Commun. Netw. 2020, 1–14 (2020).
Huang, M. et al. Robust secure precoding for UAV-aided multi-beam satellite noma communications. IEEE Trans. Veh. Technol. 73, 8069–8082. https://doi.org/10.1109/TVT.2024.3349686 (2024).
Simon, M. K. & Alouini, M. S. Digital communications over fading channels. IEEE Trans. Inf. Theory 54, 3369–3370 (2008).
Wang, P. et al. Performance analysis for relay-aided multihop BPPM FSO communication system over exponentiated weibull fading channels with pointing error impairments. IEEE Photon. J. 7, 1–20 (2015).
Zhuang, Y. & Zhang, J. Secrecy performance analysis for a NOMA based fso-rf system with imperfect CSI. J. Opt. Commun. Netw. 14, 500–510 (2022).
Monteiro, M. E. P., Rebelatto, J. L., Souza, R. D. & Brante, G. Maximum secrecy throughput of transmit antenna selection with eavesdropper outage constraints. IEEE Signal Process. Lett. 22, 2069–2072 (2015).
Liu, X. Probability of strictly positive secrecy capacity of the rician-rician fading channel. IEEE Wirel. Commun. Lett. 2, 50–53 (2012).
Chen, J., Yang, L. & Alouini, M. S. Physical layer security for cooperative NOMA systems. IEEE Trans. Veh. Technol. 67, 4645–4649 (2018).
Acknowledgements
The authors would like to express their gratitude to Integral University, Lucknow, Uttar Pradesh, India, for its support. The manuscript communication number for this publication is IU/R&D/2023-MCN0002059.
Funding
Open access funding provided by Manipal Academy of Higher Education, Manipal.
Author information
Authors and Affiliations
Contributions
Conceptualization, methodology, software, investigation, data curation, validation and writing—original draft by M.J.K., S.A.; Formal analysis, visualization by M.J.K., S.A.; Project administration, supervision, visualization by M.J.K., I.S., U.K.S.; Writing—review and editing, M.J.K., I.S., U.K.S. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Ethical approval
This research study did not involve any human participants or animals, and therefore did not require ethical approval.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Khan, M.J., Ahmad, S., Singh, I. et al. Secrecy outage probability and strictly positive secrecy capacity of UAV assisted cooperative NOMA system with two untrusted destinations. Sci Rep 15, 8246 (2025). https://doi.org/10.1038/s41598-025-92321-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-025-92321-0