Physical Layer Security for Keyhole-based NOMA Downlink Systems with a Multi-antenna Eavesdropper
DOI:
https://doi.org/10.26636/jtit.2025.3.2116Keywords:
keyhole, multi-antenna, NOMA, physical layer security, secrecy outage probabilityAbstract
This paper investigates the physical layer security of downlink nonorthogonal multiple access (NOMA) systems operating over a degenerate keyhole channel in the presence of a multi-antenna eavesdropper. We propose a joint antenna selection framework with transmit antenna selection at the source and receive antenna selection at both legitimate users and eavesdroppers, thus striving to reduce hardware complexity while maximizing secrecy performance. In this framework, the efficacy of confidentiality is assessed for a specific user allocation methodology by deriving the closed-form approximate expression of secrecy outage probability (SOP). Extensive Monte Carlo simulations validate analytical results and reveal that increasing the number of antennas at the source and legitimate users dramatically lowers SOP, whereas a more capable eavesdropper raises the risk of secrecy. Our findings demonstrate that strategic antenna deployment and non-orthogonal access can effectively safeguard communications even through severely scattering environments.
Downloads
References
[1] A. Lozano and A.M. Tulino, "Capacity of Multiple-transmit Multiple-receive Antenna Architectures", IEEE Transactions on Information Theory, vol. 48, pp. 3117-3128, 2002. DOI: https://doi.org/10.1109/TIT.2002.805084
View in Google Scholar
[2] W. Gao, X. Lu, C. Han, and Z. Chen, "On Multiple-antenna Techniques for Physical-layer Range Security in the Terahertz Band", arXiv, 2022.
View in Google Scholar
[3] D. Chizhik, G.J. Foschini, M.J. Gans, and R.A. Valenzuela, "Keyholes, Correlations, and Capacities of Multielement Transmit and Receive Antennas", IEEE Transactions on Wireless Communications, vol. 1, pp. 361-368, 2002. DOI: https://doi.org/10.1109/7693.994830
View in Google Scholar
[4] D. Chizhik, G.J. Foschini, and R.A. Valenzuela, "Capacities of Multielement Transmit and Receive Antennas: Correlations and Keyholes", Electronics Letters, vol. 36, pp. 1099-1100, 2000. DOI: https://doi.org/10.1049/el:20000828
View in Google Scholar
[5] D. Gesbert, H. Bolcskei, D.A. Gore, and A.J. Paulraj, "Outdoor MIMO Wireless Channels: Models and Performance Prediction", IEEE Transactions on Communications, vol. 50, pp. 1926-1934, 2002. DOI: https://doi.org/10.1109/TCOMM.2002.806555
View in Google Scholar
[6] S. Loyka and A. Kouki, "On MIMO Channel Capacity, Correlations, and Keyholes: Analysis of Degenerate Channels", IEEE Transactions on Communications, vol. 50, pp. 1886-1888, 2002. DOI: https://doi.org/10.1109/TCOMM.2002.806543
View in Google Scholar
[7] H. Rahbari and M. Krunz, "Secrecy Beyond Encryption: Obfuscating Transmission Signatures in Wireless Communications", IEEE Communications Magazine, vol. 53, pp. 54-60, 2015. DOI: https://doi.org/10.1109/MCOM.2015.7355566
View in Google Scholar
[8] M. Mitev, A. Chorti, H.V. Poor and G.P. Fettweis, "What Physical Layer Security Can Do for 6G Security", IEEE Open Journal of Vehicular Technology, vol. 4, pp. 375-388, 2023. DOI: https://doi.org/10.1109/OJVT.2023.3245071
View in Google Scholar
[9] P. Almers, F. Tufvensson, and A.F. Molisch, "Keyhole Effect in MIMO Wireless Channels: Measurements and Theory", IEEE Transactions on Wireless Communications, vol. 5, pp. 359-3604, 2006. DOI: https://doi.org/10.1109/TWC.2006.256982
View in Google Scholar
[10] H. Zhang et al., "Performance Analysis of MIMO-HARQ Assisted V2V Communications with Keyhole Effect", IEEE Transactions on Communications, vol. 70, pp. 3034-3046, 2022. DOI: https://doi.org/10.1109/TCOMM.2022.3163779
View in Google Scholar
[11] X. Zang, H. Xu, C. Ouyang, and H. Yang, "PHY Security in MIMOME Keyhole Channels", IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Beijing, China, 2023. DOI: https://doi.org/10.1109/BMSB58369.2023.10211340
View in Google Scholar
[12] S.Q. Nguyen et al., "Performance Evaluation of Downlink Multiple Users NOMA-able UAV-aided Communication Systems over Nakagami-m Fading Environments", IEEE Access, vol. 9, pp. 151641-151653, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3124017
View in Google Scholar
[13] B.V. Minh et al., "Performance Prediction in UAV-terrestrial Networks with Hardware Noise", IEEE Access, vol. 11, pp. 117562-117575, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3325478
View in Google Scholar
[14] C.B. Le et al., "Joint Design of Improved Spectrum and Energy Efficiency with Backscatter NOMA for IoT", IEEE Access, vol. 10, pp. 7504-7519, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3139118
View in Google Scholar
[15] J. Chen, L. Yang, and M.-S. Alouini, "Physical Layer Security for Cooperative NOMA Systems", IEEE Transactions on Vehicular Technology, vol. 67, pp. 4645-4649, 2018. DOI: https://doi.org/10.1109/TVT.2017.2789223
View in Google Scholar
[16] M. Abramowitz and I.A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, New York, USA: Dover, 1072 p., 1972 (ISBN: 9780486612720).
View in Google Scholar
[17] Y. Cheng et al., "Downlink and Uplink Intelligent Reflecting Surface Aided Networks: NOMA and OMA", IEEE Transactions on Wireless Communications, vol. 20, pp. 3988-4000, 2021. DOI: https://doi.org/10.1109/TWC.2021.3054841
View in Google Scholar

Downloads
Published
Issue
Section
License
Copyright (c) 2025 Sang-Quang Nguyen, Chi-Bao Le

This work is licensed under a Creative Commons Attribution 4.0 International License.