Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions
This study focuses on optimizing the performance of an uplink pairwise Non-Orthogonal Multiple Access (NOMA) scenario with and without the support of a relayer, while subject to jamming attacks. We consider two different relaying protocols, one where the sources and the destination are within range...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Open Journal of the Communications Society |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10342734/ |
_version_ | 1827398887472627712 |
---|---|
author | Van-Lan Dao Elisabeth Uhlemann Svetlana Girs |
author_facet | Van-Lan Dao Elisabeth Uhlemann Svetlana Girs |
author_sort | Van-Lan Dao |
collection | DOAJ |
description | This study focuses on optimizing the performance of an uplink pairwise Non-Orthogonal Multiple Access (NOMA) scenario with and without the support of a relayer, while subject to jamming attacks. We consider two different relaying protocols, one where the sources and the destination are within range of each other and one where they are not. The relay node can be mobile, e.g., a mobile base station, an unmanned aerial vehicle (UAV) or a stationary node that is chosen as a result of a relay selection procedure. We also benchmark with a NOMA retransmission protocol and an Orthogonal Multiple Access (OMA) scheme without a relayer. We analyze, adjust and compare the four protocols for different settings using outage analysis, which is an efficient tool for establishing communication reliability for both individual nodes and the overall wireless network. Closed-form expressions of outage probabilities can be adopted by deep reinforcement learning (RL) algorithms to optimize wireless networks online. Accordingly, we first derive closed-form expressions for the individual outage probability (IOP) of each source node link and the relayer link using both pairwise NOMA and OMA. Next, we analyze the IOP for one packet (IOPP) for each source node considering all possible links between the source node to the destination, taking both phases into account for the considered protocols when operating in Nakagami-<inline-formula> <tex-math notation="LaTeX">$m$ </tex-math></inline-formula> fading channels. The overall outage probability for all packets (OOPP) is defined as the maximum IOPP obtained among the source nodes. This metric is useful to optimize the whole wireless network, e.g., to ensure fairness among the source nodes. Then, we propose a method using deep RL where the OOPP is used as a reward function in order to adapt to the dynamic environment associated with jamming attacks. Finally, we discuss valuable guidelines for enhancing the communication reliability of the legitimate system. |
first_indexed | 2024-03-08T19:36:23Z |
format | Article |
id | doaj.art-6a53a95aee0847de959b005fa039bd2d |
institution | Directory Open Access Journal |
issn | 2644-125X |
language | English |
last_indexed | 2024-03-08T19:36:23Z |
publishDate | 2024-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Open Journal of the Communications Society |
spelling | doaj.art-6a53a95aee0847de959b005fa039bd2d2023-12-26T00:12:23ZengIEEEIEEE Open Journal of the Communications Society2644-125X2024-01-01511212610.1109/OJCOMS.2023.333917510342734Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant TransmissionsVan-Lan Dao0https://orcid.org/0000-0001-8109-1685Elisabeth Uhlemann1https://orcid.org/0000-0001-6497-4099Svetlana Girs2https://orcid.org/0000-0001-9589-6986School of Innovation, Design and Engineering, Malardalen University, Västerås, SwedenSchool of Innovation, Design and Engineering, Malardalen University, Västerås, SwedenSchool of Innovation, Design and Engineering, Malardalen University, Västerås, SwedenThis study focuses on optimizing the performance of an uplink pairwise Non-Orthogonal Multiple Access (NOMA) scenario with and without the support of a relayer, while subject to jamming attacks. We consider two different relaying protocols, one where the sources and the destination are within range of each other and one where they are not. The relay node can be mobile, e.g., a mobile base station, an unmanned aerial vehicle (UAV) or a stationary node that is chosen as a result of a relay selection procedure. We also benchmark with a NOMA retransmission protocol and an Orthogonal Multiple Access (OMA) scheme without a relayer. We analyze, adjust and compare the four protocols for different settings using outage analysis, which is an efficient tool for establishing communication reliability for both individual nodes and the overall wireless network. Closed-form expressions of outage probabilities can be adopted by deep reinforcement learning (RL) algorithms to optimize wireless networks online. Accordingly, we first derive closed-form expressions for the individual outage probability (IOP) of each source node link and the relayer link using both pairwise NOMA and OMA. Next, we analyze the IOP for one packet (IOPP) for each source node considering all possible links between the source node to the destination, taking both phases into account for the considered protocols when operating in Nakagami-<inline-formula> <tex-math notation="LaTeX">$m$ </tex-math></inline-formula> fading channels. The overall outage probability for all packets (OOPP) is defined as the maximum IOPP obtained among the source nodes. This metric is useful to optimize the whole wireless network, e.g., to ensure fairness among the source nodes. Then, we propose a method using deep RL where the OOPP is used as a reward function in order to adapt to the dynamic environment associated with jamming attacks. Finally, we discuss valuable guidelines for enhancing the communication reliability of the legitimate system.https://ieeexplore.ieee.org/document/10342734/Dynamic decoding orderimperfect CSIoutage performancecooperative NOMAdeep reinforcement learning |
spellingShingle | Van-Lan Dao Elisabeth Uhlemann Svetlana Girs Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions IEEE Open Journal of the Communications Society Dynamic decoding order imperfect CSI outage performance cooperative NOMA deep reinforcement learning |
title | Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions |
title_full | Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions |
title_fullStr | Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions |
title_full_unstemmed | Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions |
title_short | Dealing With Jamming Attacks in Uplink Pairwise NOMA Using Outage Analysis, Smart Relaying, and Redundant Transmissions |
title_sort | dealing with jamming attacks in uplink pairwise noma using outage analysis smart relaying and redundant transmissions |
topic | Dynamic decoding order imperfect CSI outage performance cooperative NOMA deep reinforcement learning |
url | https://ieeexplore.ieee.org/document/10342734/ |
work_keys_str_mv | AT vanlandao dealingwithjammingattacksinuplinkpairwisenomausingoutageanalysissmartrelayingandredundanttransmissions AT elisabethuhlemann dealingwithjammingattacksinuplinkpairwisenomausingoutageanalysissmartrelayingandredundanttransmissions AT svetlanagirs dealingwithjammingattacksinuplinkpairwisenomausingoutageanalysissmartrelayingandredundanttransmissions |