Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions

This study focuses on optimizing the performance of an uplink pairwise Non-Orthogonal Multiple Access (NOMA) scenario with and without the support of a relayer, while subject to jamming attacks. We consider two different relaying protocols, one where the sources and the destination are within range...

Full description

Bibliographic Details
Main Authors: Van-Lan Dao, Elisabeth Uhlemann, Svetlana Girs
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Open Journal of the Communications Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10342734/
_version_ 1827398887472627712
author Van-Lan Dao
Elisabeth Uhlemann
Svetlana Girs
author_facet Van-Lan Dao
Elisabeth Uhlemann
Svetlana Girs
author_sort Van-Lan Dao
collection DOAJ
description This study focuses on optimizing the performance of an uplink pairwise Non-Orthogonal Multiple Access (NOMA) scenario with and without the support of a relayer, while subject to jamming attacks. We consider two different relaying protocols, one where the sources and the destination are within range of each other and one where they are not. The relay node can be mobile, e.g., a mobile base station, an unmanned aerial vehicle (UAV) or a stationary node that is chosen as a result of a relay selection procedure. We also benchmark with a NOMA retransmission protocol and an Orthogonal Multiple Access (OMA) scheme without a relayer. We analyze, adjust and compare the four protocols for different settings using outage analysis, which is an efficient tool for establishing communication reliability for both individual nodes and the overall wireless network. Closed-form expressions of outage probabilities can be adopted by deep reinforcement learning (RL) algorithms to optimize wireless networks online. Accordingly, we first derive closed-form expressions for the individual outage probability (IOP) of each source node link and the relayer link using both pairwise NOMA and OMA. Next, we analyze the IOP for one packet (IOPP) for each source node considering all possible links between the source node to the destination, taking both phases into account for the considered protocols when operating in Nakagami-<inline-formula> <tex-math notation="LaTeX">$m$ </tex-math></inline-formula> fading channels. The overall outage probability for all packets (OOPP) is defined as the maximum IOPP obtained among the source nodes. This metric is useful to optimize the whole wireless network, e.g., to ensure fairness among the source nodes. Then, we propose a method using deep RL where the OOPP is used as a reward function in order to adapt to the dynamic environment associated with jamming attacks. Finally, we discuss valuable guidelines for enhancing the communication reliability of the legitimate system.
first_indexed 2024-03-08T19:36:23Z
format Article
id doaj.art-6a53a95aee0847de959b005fa039bd2d
institution Directory Open Access Journal
issn 2644-125X
language English
last_indexed 2024-03-08T19:36:23Z
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of the Communications Society
spelling doaj.art-6a53a95aee0847de959b005fa039bd2d2023-12-26T00:12:23ZengIEEEIEEE Open Journal of the Communications Society2644-125X2024-01-01511212610.1109/OJCOMS.2023.333917510342734Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant TransmissionsVan-Lan Dao0https://orcid.org/0000-0001-8109-1685Elisabeth Uhlemann1https://orcid.org/0000-0001-6497-4099Svetlana Girs2https://orcid.org/0000-0001-9589-6986School of Innovation, Design and Engineering, Malardalen University, V&#x00E4;ster&#x00E5;s, SwedenSchool of Innovation, Design and Engineering, Malardalen University, V&#x00E4;ster&#x00E5;s, SwedenSchool of Innovation, Design and Engineering, Malardalen University, V&#x00E4;ster&#x00E5;s, SwedenThis study focuses on optimizing the performance of an uplink pairwise Non-Orthogonal Multiple Access (NOMA) scenario with and without the support of a relayer, while subject to jamming attacks. We consider two different relaying protocols, one where the sources and the destination are within range of each other and one where they are not. The relay node can be mobile, e.g., a mobile base station, an unmanned aerial vehicle (UAV) or a stationary node that is chosen as a result of a relay selection procedure. We also benchmark with a NOMA retransmission protocol and an Orthogonal Multiple Access (OMA) scheme without a relayer. We analyze, adjust and compare the four protocols for different settings using outage analysis, which is an efficient tool for establishing communication reliability for both individual nodes and the overall wireless network. Closed-form expressions of outage probabilities can be adopted by deep reinforcement learning (RL) algorithms to optimize wireless networks online. Accordingly, we first derive closed-form expressions for the individual outage probability (IOP) of each source node link and the relayer link using both pairwise NOMA and OMA. Next, we analyze the IOP for one packet (IOPP) for each source node considering all possible links between the source node to the destination, taking both phases into account for the considered protocols when operating in Nakagami-<inline-formula> <tex-math notation="LaTeX">$m$ </tex-math></inline-formula> fading channels. The overall outage probability for all packets (OOPP) is defined as the maximum IOPP obtained among the source nodes. This metric is useful to optimize the whole wireless network, e.g., to ensure fairness among the source nodes. Then, we propose a method using deep RL where the OOPP is used as a reward function in order to adapt to the dynamic environment associated with jamming attacks. Finally, we discuss valuable guidelines for enhancing the communication reliability of the legitimate system.https://ieeexplore.ieee.org/document/10342734/Dynamic decoding orderimperfect CSIoutage performancecooperative NOMAdeep reinforcement learning
spellingShingle Van-Lan Dao
Elisabeth Uhlemann
Svetlana Girs
Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions
IEEE Open Journal of the Communications Society
Dynamic decoding order
imperfect CSI
outage performance
cooperative NOMA
deep reinforcement learning
title Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions
title_full Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions
title_fullStr Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions
title_full_unstemmed Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions
title_short Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions
title_sort dealing with jamming attacks in uplink pairwise noma using outage analysis smart relaying and redundant transmissions
topic Dynamic decoding order
imperfect CSI
outage performance
cooperative NOMA
deep reinforcement learning
url https://ieeexplore.ieee.org/document/10342734/
work_keys_str_mv AT vanlandao dealingwithjammingattacksinuplinkpairwisenomausingoutageanalysissmartrelayingandredundanttransmissions
AT elisabethuhlemann dealingwithjammingattacksinuplinkpairwisenomausingoutageanalysissmartrelayingandredundanttransmissions
AT svetlanagirs dealingwithjammingattacksinuplinkpairwisenomausingoutageanalysissmartrelayingandredundanttransmissions