Keywords

1 Introduction

Non-orthogonal multiple access (NOMA), which allows mobile users (MUs) to simultaneously use a same frequency channel for data transmission and further adopts the principle of successive interference cancellation (SIC) to mitigate the MUs’ co-channel interference, has been considered as one of the enabling technologies for the fifth generation (5G) cellular systems [1, 2]. Compared with the conventional orthogonal multiple access (OMA), NOMA has been expected to significantly improve the spectrum efficiency and the system throughput, and thus has attracted lots of research efforts. Many studies have been devoted to analyzing the potential performance advantage of NOMA [3, 4], and NOMA has been exploited for many potential applications, e.g., heterogeneous cellular systems and mobile data offloading [5, 6]. In particular, the proper radio resource allocation plays a critical role to reap the benefits of NOMA, and thus has attracted lost of interests for different network paradigms [7,8,9,10,11].

In addition to the improvement on spectrum efficiency and throughput, the simultaneous data transmissions of different MUs over a same frequency channel can also yield an important benefit, namely, the cooperative jamming to encounter the overhearing of some potential eavesdropper. Specifically, let us consider that a downlink NOMA scenario in which the base station (BS) uses NOMA to simultaneously transmit to a group of MUs. There exists a malicious eavesdropper who intentionally overhears the transmission of a targeted MU. Thanks to NOMA, the BS’s transmissions to other MUs provide the cooperative jamming to the eavesdropper, which thus improves the secrecy level of the targeted MU. In this work, we thus investigate this cooperative jamming provided by NOMA via proper power allocation. Our detailed contributions in this work can be summarized as follows.

  • We consider a representative scenario in which the BS uses NOMA to send data to two different MUs, i.e., one MU with a strong channel power gain and the other with a weak channel power gain, and there exists a malicious eavesdropper who intentionally overhears the strong MU’s data. Thanks to NOMA, the BS’s transmission to the weak MU provides a cooperative jamming to the eavesdropper and thus helps enhance the secure throughput for the strong MU. To analytically study this problem, we formulate an optimal power allocation problem that aims at maximizing the strong MU’s secure throughput while satisfying the throughput requirement of the weak MU and the total power capacity of the BS.

  • We use the secrecy-outage probability based on the physical layer security [12, 13] to quantify how secure it is for the strong MU’s transmission. Despite the non-convexity of the formulated power allocation problem, we identify the monotonic property via a vertical decomposition and thus propose an efficient layered-algorithm to compute the optimal solution. To further reduce the complexity, we exploit the hidden unimodal property with the respective to the secrecy-outage level and propose a low-complexity to compute the solution.

  • We provide extensive numerical results to validate the effectiveness of our proposed algorithm and the performance advantage of the optimal cooperative jamming in enhancing the user’s secure throughput.

The remainder of this paper is organized as follows. In Sect. 2, we present the system model and problem formulation. We focus on analyzing the most general case of the formulated problem in Sect. 3 and propose an efficient algorithm to compute the optimal solution. Numerical results are provided in Sect. 4, and conclusions are given in Sect. 5.

Fig. 1.
figure 1

System model

2 System Model and Problem Formulation

2.1 System Model and Formulation

We consider a two-user downlink NOMA scenario as shown in Fig. 1, in which the BS uses NOMA to simultaneously send data to two MUs. We use \(g_1\), \(g_2\), and \(g_\text {E}\) to denote the channel power gains from the BS to MU 1, MU 2, and the eavesdropper, respectively. For the sake of easy presentation, we assume that \(g_1\ge g_2\), meaning that MU 1 has a stronger downlink channel power gain than MU 2. Meanwhile, there exists a malicious eavesdropper who intentionally overhears the BS’s data transmission to MU 1 (i.e., the strong user). Exploiting NOMA, the transmission to MU 2 provides a cooperative jamming to the eavesdropper for enhancing the security of MU 1’s transmission. Let \(p_1\) and \(p_2\) denote the BS’s transmit-powers to MU 1 and MU 2, respectively. Thus, based on the physical layer security [12, 13], the secure throughput from the BS to MU 1 can be given as

$$\begin{aligned} R_1^{\text {sec}}=\left[ W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1g_E}{n_E+p_2g_E})\right] ^+, \end{aligned}$$
(1)

in which W denotes the channel bandwidth, \(n_1\) and \(n_E\) denote the power of the background noise, respectively. Here, function \([x]^+\) denotes \(\max (x,0)\). In particular, the accurate value of \(g_\text {E}\) may not be available, since the eavesdropper may intentionally hide its location information. Thus, similar to [13], we assume that \(g_{\text {E}}\) follows an exponential distribution with the mean equal \(\theta \). Taking into account the randomness in \(g_{\text {E}}\), we can express the probability that MU 1’s data cannot be overheard by the eavesdropper as follows

$$\begin{aligned} \text {P}_{\text {secure}}(x_1,p_1,p_2)=\text {Pr}\big \{R_1^{\text {sec}}\ge x_1|R_1^{\text {sec}}\ge 0\big \}, \end{aligned}$$
(2)

where variable \(x_1\) denotes the assigned throughput \(x_1\) for MU 1. Correspondingly, the outage probability, i.e., the probability that MU 1’s data is overheard by the eavesdropper is

$$\begin{aligned} \text {P}_{\text {outage}}(x_1, p_1, p_2)=1-\text {P}_{\text {secure}}(x_1,p_1,p_2). \end{aligned}$$
(3)

With (3) we formulate the following secure throughput maximization (STM) as follows.

$$\begin{aligned} \text {(STM)}\,&\max x_1 \big (1-\text {P}_{\text {outage}}(x_1, p_1, p_2)\big ) \nonumber \\ \text {subject to: }&\text {P}_{\text {outage}}(x_1, p_1, p_2) \le \epsilon ^{\max }, \end{aligned}$$
(4)
$$\begin{aligned}&p_1+p_2\le P_{\text {B}}^{\text {tot}}, \end{aligned}$$
(5)
$$\begin{aligned}&W \log _2 \big (1+\frac{p_2g_2}{p_1g_2 +n_2}\big ) \ge R_2^{\text {req}}, \\ \text {variables:}\,&x_1, p_1, \text { and } p_2. \nonumber \end{aligned}$$
(6)

In Problem (STM), the objective function denotes MU 1’s secure throughput. Constraint (4) limits the secure-outage probability for MU 1’s transmission no greater than the required secrecy-requirement \(\epsilon ^{\max }\). Constraint (5) means that the BS’s total power consumption for both MUs cannot exceed the budget of \(P_{\text {B}}^{\text {tot}}\), and finally, constraint (6) means that MU 2 can reach its throughput requirement \(R_2^{\text {req}}\).

2.2 Analysis of the Secrecy-Outage Probability

To solve Problem (STM), we firstly derive the analytical expression of \(\text {P}_{\text {outage}}(x_1, p_1, p_2)\) as follows.

Proposition 1

The analytical expression of the outage probability \(\text {P}_{\text {outage}}(x_1, p_1, p_2)\) can be given in the following four cases:

  • (Case-I) when \(x_1> W\log _2(1+\frac{p_1g_1}{n_1})\), then we have

    $$\begin{aligned} P_{\text {outage}}(x_1, p_1, p_2)=1. \end{aligned}$$
    (7)
  • (Case-II) when \(W\log _2(1+\frac{p_1g_1}{n_1})\ge x_1\ge W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1}{p_2})\) and \(p_2\ge \frac{n_1}{g_1}\), then we have

    $$\begin{aligned} P_{\text {outage}}(x_1, p_1, p_2)=e^{-\frac{1}{\theta }M}, \end{aligned}$$
    (8)

    where parameter M is given by:

    $$\begin{aligned} M=\frac{n_E}{p_1} \frac{1}{\frac{1}{(1+\frac{p_1g_1}{n_1})2^{-\frac{x_1}{W}}-1}-\frac{p_2}{p_1}}. \end{aligned}$$
    (9)
  • (Case-III) when \(W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1}{p_2})\ge x_1\) and \(p_2\ge \frac{n_1}{g_1}\), we have

    $$\begin{aligned} P_{\text {outage}}(x_1, p_1, p_2)=0. \end{aligned}$$
    (10)
  • (Case-IV) when \(W\log _2(1+\frac{p_1g_1}{n_1})\ge x_1\ge W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1}{p_2})\) and \(p_2<\frac{n_1}{g_1}\), then we have

    $$\begin{aligned} P_{\text {outage}}(x_1,p_1,p_2)= \frac{e^{-\frac{1}{\theta }M}-e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}}{1-e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}}, \end{aligned}$$
    (11)

    with parameter M given in (9) before.

Proof

Based on (2), we have

$$\begin{aligned} \text {P}_{\text {secure}}(x_1,p_1,p_2)=\frac{\text {Pr}\big \{R_1^{\text {sec}}\ge x_1\big \}}{\text {Pr}\big \{R_1^{\text {sec}}\ge 0\big \}} . \end{aligned}$$
(12)

In particular, based on (1), we can derive \(\text {Pr}\big \{R_1^{\text {sec}}\ge 0\big \}\) as

$$\begin{aligned} \text {Pr}\big \{R_1^{\text {sec}}\ge 0\big \}=\left\{ \begin{array}{ll} 1, &{} \hbox { when } p_2\ge \frac{n_1}{g_1} \\ 1-e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}, &{} \hbox { when } p_2 <\frac{n_1}{g_1} \end{array} \right. \end{aligned}$$
(13)

In particular, (13) is consistent with the intuition, namely, \(R_1^{\text {sec}}\) is always positive when \(p_2\) is sufficiently large (i.e., MU 2 provides a sufficiently large jamming to the eavesdropper).

To derive \(\text {Pr}\big \{R_1^{\text {sec}}\ge x_1\big \}\) (with \(x_1\ge 0\)), we consider:

$$\begin{aligned}&W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1g_E}{n_E+p_2g_E})\ge x_1 \nonumber \\&\Longleftrightarrow \frac{n_1+p_1g_1}{n_1}2^{-\frac{x_1}{W}}-1\ge \frac{p_1g_E}{n_E+p_2g_E} \end{aligned}$$
(14)
$$\begin{aligned}&\Longleftrightarrow \frac{n_E}{p_1g_E}\ge \frac{1}{(1+\frac{p_1g_1}{n_1})2^{-\frac{x_1}{W}}-1}-\frac{p_2}{p_1} \end{aligned}$$
(15)

Notice that the equivalence between (14) and (15) requires \(x_1\le W\log _2(1+\frac{p_1g_1}{n_1})\). Otherwise (i.e., \(x_1>W\log _2(1+\frac{p_1g_1}{n_1})\)), there always exists \(\text {Pr}\big \{R_1^{\text {sec}}\ge x_1\big \}=0\) according to (1), which leads to Case-I in Proposition 1.

In the next, we consider \(x_1\le W\log _2(1+\frac{p_1g_1}{n_1})\) for Case-II, Case-III, and Case-IV.

In particular, let us first consider the case that \(p_2\ge \frac{n_1}{g_1}\) (i.e., the case of \(\text {Pr}\big \{R_1^{\text {sec}}\ge 0\big \}=1\) in Eq. (13)). Then, we have

$$\begin{aligned} \text {Pr}\big \{R_1^{\text {sec}}\ge x_1\big \}=1 \text { when } p_2\ge \frac{n_1}{g_1} \text { and }\nonumber \\ x_1\le W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1}{p_2}). \end{aligned}$$
(16)

As a result, we have \(\text {P}_{\text {outage}}(x_1,p_1,p_2)=0\), which corresponds to Case-III in Proposition 1.

In addition, we have

$$\begin{aligned} \text {Pr}\big \{R_1^{\text {sec}}\ge x_1\big \}=\text {Pr}\{g_E\le M\} \text { when } p_2\ge \frac{n_1}{g_1}, \end{aligned}$$

and

$$\begin{aligned} W\log _2(1+\frac{p_1g_1}{n_1}) \ge x_1 \ge W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1}{p_2}), \end{aligned}$$

where parameter M is given in Eq. (9) (notice that M can be derived from (15)). As a result, we have

$$\begin{aligned} \text {P}_{\text {outage}}(x_1,p_1,p_2)=e^{-\frac{1}{\theta }M}, \end{aligned}$$
(17)

which corresponds to Case-II in Proposition 1.

Finally, when \(p_2 <\frac{n_1}{g_1}\), i.e., the case of \(\text {Pr}\big \{R_1^{\text {sec}}\ge 0\big \}=1-e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}\) in Eq. (13), then we again have

$$\begin{aligned} \text {Pr}\big \{R_1^{\text {sec}}\ge x_1\big \}=\text {Pr}\{g_E\le M\} \text { when } p_2 <\frac{n_1}{g_1}, \end{aligned}$$

and

$$\begin{aligned} W\log _2(1+\frac{p_1g_1}{n_1}) \ge x_1 \ge W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1}{p_2}). \end{aligned}$$

As a result, we have

$$\begin{aligned} \text {P}_{\text {outage}}(x_1,p_1,p_2)=\frac{e^{-\frac{1}{\theta }M}-e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}}{1-e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}} \end{aligned}$$
(18)

which corresponds to Case-IV in Proposition 1. Notice that based on (9), there always exists \(M<\frac{g_1n_E}{n_1-g_1p_2}\).

We thus finish the proof of Proposition 1.

To solve Problem (STM), we need to consider the above four cases given in Proposition 1, and the maximum secure throughput \(V^*\) of Problem (STM) can be given as:

$$\begin{aligned} V^*=\max \{V^{\text {I}*},V^{\text {II}*},V^{\text {III}*},V^{\text {IV}*}\}, \end{aligned}$$
(19)

where \(V^{\text {I}*},V^{\text {II}*},V^{\text {III}*}\), and \(V^{\text {IV}*}\) denote MU 1’s maximum secure throughput under Case-I, Case-II, Case-III, and Case-IV, respectively. It is noticed that Case-I is a trivial case since \(V^{\text {I}*}=0\). In the following, due to the limited space in the paper, we focus on solving Problem (STM) under the most difficult case, i.e., Case-IV. The other two cases, i.e., Case-II and Case-III, can solved in a similar manner.

3 Optimization Problem Under Case IV

In this section, we focus on solving Problem (STM) under Case-IV. We introduce an auxiliary variable \(\epsilon \) which denotes the secrecy-outage probability of MU 1, i.e.,

$$\begin{aligned} \epsilon =\frac{e^{-\frac{1}{\theta }M}-e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}}{1-e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}} \end{aligned}$$
(20)

according to (11).

Thus, based on (20), we can derive the following secrecy-based throughput for MU 1:

$$\begin{aligned} \hat{x}_1^{\text {IV}}(\epsilon ,p_1,p_2)= W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1z_{(\epsilon ,p_2)}}{n_E+p_2z_{(\epsilon ,p_2)}}), \end{aligned}$$
(21)

where parameter \(z_{(\epsilon ,p_2)}\) is given by:

$$\begin{aligned} z_{(\epsilon , p_2)}=-\theta \ln \left( \epsilon +(1-\epsilon )e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}\right) . \end{aligned}$$
(22)

Notice that \(z_{(\epsilon , p_2)}\) is always positive, since \(p_2\le \frac{n_1}{g_1}\) holds in Case-IV. The secrecy-based throughput \(\hat{x}_1^{\text {IV}}(\epsilon ,p_1,p_2)\) can be treated as the maximum throughput of MU 1, under the given transmit-powers \((p_1,p_2)\) as well as the given level of the secrecy-outage \(\epsilon \).

An observation on \(\hat{x}_1^{\text {IV}}(\epsilon ,p_1,p_2)\) is as follows.

Lemma 1

There always exists

$$\begin{aligned} \hat{x}_1^{\text {IV}}(\epsilon ,p_1,p_2)>W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1}{p_2}), \end{aligned}$$

meaning that \(\hat{x}_1^{\text {IV}}(\epsilon ,p_1,p_2)\) is compatible with the conditions of Case- IV in Proposition 1.

Proof

Based on (21), we can analytically express \(\hat{x}_1^{\text {IV}}(\epsilon ,p_1,p_2)\) as follows:

$$\begin{aligned} \hat{x}_1^{\text {IV}}(\epsilon ,p_1,p_2)&=W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1z_{(\epsilon ,p_2)}}{n_E+p_2z_{(\epsilon ,p_2)}})\\&>W\log _2(1+\frac{p_1g_1}{n_1})-W\log _2(1+\frac{p_1}{p_2}). \end{aligned}$$

We thus finish the proof of Lemma 1.

Based on Lemma 1, we can obtain the equivalent form of Problem (STM) under Case-IV as follows:

$$\begin{aligned}&\text {(STM-E-IV):}\,\,\, \max \hat{x}_1^{\text {IV}}(\epsilon ,p_1,p_2) (1-\epsilon ) \nonumber \\&\quad \text {subject to: }\,\,\, p_2\le \frac{n_1}{g_1}, \end{aligned}$$
(23)
$$\begin{aligned}&\qquad \qquad \qquad \,\,\, 0\le \epsilon \le \epsilon ^{\max }, \\&\qquad \qquad \qquad \,\,\, \text {constraints } (5),(6), \text { and } (21). \nonumber \\&\quad \,\,\, \text {variables: } \,\,\, p_1,p_2, \text { and } \epsilon . \nonumber \end{aligned}$$
(24)

Notice that constraint (23) comes from the condition of Case-IV. However, directly solving Problem (STM-E-IV) is still difficult since Problem (STM-E-IV) is a non-convex optimization problem [14].

To tackle with this difficulty, we exploit a vertical decomposition as follows. Suppose that the values of \((p_2,\epsilon )\) are given in advance. We firstly aim at finding the corresponding optimal \(p_1\) (as a response to \((p_2,\epsilon )\)), which corresponds to solving the following optimization problem:

$$\begin{aligned}&\text {(STM-E-IV-Sub)}\,V^{\text {IV-Sub}}_{(p_2,\epsilon )}=\max \frac{n_1(n_E+p_2z_{(\epsilon , p_2)})+p_1g_1(n_E+p_2z_{(\epsilon , p_2)})}{n_1(n_E+p_2z_{(\epsilon , p_2)})+p_1n_1z_{(\epsilon , p_2)}} \nonumber \\&\qquad \qquad \text {variable:}\, 0\le p_1\le \min \big \{p_2(2^{\frac{R_2^{\text {req}}}{W}}-1)^{-1}-\frac{n_2}{g_2},P_B^{\text {tot}}-p_2\big \}. \end{aligned}$$
(25)

In particular, we can analytically solve Problem (STM-E-IV-Sub) based on the following result.

Proposition 2

Given \((p_2,\epsilon )\), the optimal solution of Problem (STM-E-IV-Sub) can be analytically given by:

$$\begin{aligned} p_{1,(p_2)}^{\text {IV}*}=\left\{ \begin{array}{ll} p_2(2^{\frac{R_2^{\text {req}}}{W}}-1)^{-1}-\frac{n_2}{g_2}, &{} \hbox { if } p_2\le p_{2}^{\text {IV},\text {Tr}}\\ P_B^{\text {tot}}-p_2, &{} \hbox {else} \end{array} \right. \end{aligned}$$
(26)

where \(p_{2}^{\text {IV},\text {Tr}}= \frac{2^\frac{R_2^{\text {req}}}{W}-1}{2^\frac{R_2^{\text {req}}}{W}}(P_B^{\text {tot}}+\frac{n_2}{g_2})\), if the following condition holds:

$$\begin{aligned} \frac{n_1(n_E+p_2z_{(\epsilon , p_2)})+p_{1,(p_2)}^{\text {IV}*}g_1(n_E+p_2z_{(\epsilon , p_2)})}{n_1(n_E+p_2z_{(\epsilon , p_2)})+p_{1,(p_2)}^{\text {IV}*} n_1z_{(\epsilon , p_2)}}>1. \end{aligned}$$
(27)

Otherwise (namely, (27) does not hold), then Problem (STM-E-IV-Sub) is infeasible.

Proof

The key of the proof is to show that the first order derivative of the objective function of Problem (STM-E-IV-Sub) is increasing in \(p_1\). Therefore, for the sake of clear presentation, we introduce the following three auxiliary parameters:

$$\begin{aligned} A= & {} n_1(n_E+p_2z_{(\epsilon , p_2)}), \end{aligned}$$
(28)
$$\begin{aligned} B= & {} g_1(n_E+p_2z_{(\epsilon , p_2)}), \end{aligned}$$
(29)
$$\begin{aligned} C= & {} n_1z_{(\epsilon , p_2)}. \end{aligned}$$
(30)

With the above defined A, B, and C, we can derive

$$\begin{aligned} \frac{d}{d p_1} \big (\frac{A+B p_1}{A+ C p_1}\big )=\frac{A(B-C)}{(A+C p_1)^2}. \end{aligned}$$
(31)

We next focus on proving that \(B>C\), namely, \(g_1(n_E+p_2z_{(\epsilon , p_2)})>n_1 z_{(\epsilon , p_2)}\) always holds. The details are as follows. Based on (22) and \(p_2<\frac{n_1}{g_1}\), we can make the following derivations:

$$\begin{aligned}&\,\,\,\,\, g_1(n_E+p_2z_{(\epsilon , p_2)})>n_1 z_{(\epsilon , p_2)}\\&\Longleftrightarrow \frac{g_1n_E}{n_1-g_1p_2}\ge z_{(\epsilon , p_2)}=-\theta \ln \left( \epsilon +(1-\epsilon )e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}\right) \\&\Longleftrightarrow e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}\le \epsilon +(1-\epsilon )e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}\\&\Longleftrightarrow e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}\le e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}+(1-e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}})\epsilon . \end{aligned}$$

With \(p_2<\frac{n_1}{g_1}\), we have \(e^{-\frac{1}{\theta }\frac{g_1n_E}{n_1-g_1p_2}}<1\), meaning that the above inequality always holds. As a result, \(B>C\) always holds, which finishes the proof. Since the objective function of Problem (STM-E-IV-Sub) is increasing in \(p_1\), it gives us the optimal solution in (26). Meanwhile, condition 27 is used to guarantee that \(\hat{x}_1^{\text {IV}}(\epsilon ,p_{1,(p_2)}^{\text {IV}*},p_2)\ge 0\).

As a result, we can analytically express \(V^{\text {IV-Sub}}_{(p_2,\epsilon )}\) as follows:

$$\begin{aligned} V^{\text {IV-Sub}}_{(p_2,\epsilon )}= \frac{n_1(n_E+p_2z_{(\epsilon , p_2)})+p_{1,(p_2)}^{\text {IV}*}g_1(n_E+p_2z_{(\epsilon , p_2)})}{n_1(n_E+p_2z_{(\epsilon , p_2)})+p_{1,(p_2)}^{\text {IV}*}n_1z_{(\epsilon , p_2)}}. \end{aligned}$$
(32)

3.1 Proposed Algorithm to Find the Optimal \((p_2,\epsilon )\)

Based on (32), we then continue to find the optimal \((p_2,\epsilon )\), which corresponds to solving the following problem:

$$\begin{aligned} \begin{array}{rl} \text {(STM-E-IV-Top):}\, &{}\quad \max (1-\epsilon ) W \log _2\big (V^{\text {IV-Sub}}_{(p_2,\epsilon )}\big ) \\ \text {subject to:}\, &{}\quad 0\le p_2\le \min \{P_B^{\text {tot}},\frac{n_1}{g_1}\}, \\ &{} \quad \text {constraints:}\, (32) \text { and } (24), \\ \text {variables:}\, &{}\quad (p_2,\epsilon ). \end{array} \end{aligned}$$

An important observation of Problem (STM-E-IV-Top) is that \(p_2\) falls within a fixed interval \(p_2\in [0,\min \{P_B^{\text {tot}},\frac{n_1}{g_1}\}]\), and \(\epsilon \) falls within a fixed interval \(\epsilon \in [0,\epsilon ^{\max }]\). Therefore, to solve Problem (STM-E-IV-Top), we can perform a two-dimensional linear-search (2DLS) on \((p_2,\epsilon )\) within \([0,\min \{P_B^{\text {tot}},\frac{n_1}{g_1}\}]\times [0,\epsilon ^{\max }]\) (with small step-sizes \(\varDelta _{\epsilon }\) and \(\varDelta _p\)). The details are shown in the following 2DLS-Algorithm. Notice that the overall complexity in solving Problem (STM) under Case-IV is just \(\frac{\epsilon ^{\max }}{\varDelta _{\epsilon }} \frac{\min \{P_B^{\text {tot}},\frac{n_1}{g_1}\}}{\varDelta _p}\).

figure a
figure b

Let \((p_2^{\text {IV}*},\epsilon ^{\text {IV}*})\) denote the output of our 2DLS-Algorithm. Then, we have \(p_1^{\text {IV}*}=p_{1,(p_2^{\text {IV}*})}^{\text {IV}*}\) (according to (26)), and \(x_1^{\text {IV}*}=\hat{x}_1^{\text {IV}}(\epsilon ^{\text {IV}*},p_1^{\text {IV}*},p_2^{\text {IV}*})\) (according to (21)). Thus, the maximum secure throughput of MU 1 under Case-IV is \(V^{\text {IV}*}=x_1^{\text {IV}*}(1-\epsilon ^{\text {IV}*})\).

3.2 A Low-Complexity Algorithm Based on the Brent’s Method

To further reduce the complexity of 2DLS-Algorithm, we identify the following property. Specifically, support that the value of \(p_2\) is given in advance, we enumerate \(\epsilon \in [0,\epsilon ^{\max }]\) with a small step-size \(\varDelta _{\epsilon }\). The corresponding results are shown in Fig. 2 below. Notice that for each given \((p_2,\epsilon )\), we can use (26) to compute \(p_{1,(p_2)}^{\text {IV}*}\) and obtain the corresponding secure throughput \((1-\epsilon ) W \log _2\big (V^{\text {IV-Sub}}_{(p_2,\epsilon )}\big )\). Specifically, the left subplot shows the case when \(p_{1,(p_2)}^{\text {IV}*}=p_2(2^{\frac{R_2^{\text {req}}}{W}}-1)^{-1}-\frac{n_2}{g_2}\), and the right subplot shows the case when \(p_{1,(p_2)}^{\text {IV}*}=P_B^{\text {tot}}-p_2\).

As shown in both subplots, with the respectively given \(p_2\), the secure throughput is always unimodal in \(\epsilon \). Such a phenomenon is consistent with the intuition, namely, neither a too large \(\epsilon \) nor a too small \(\epsilon \) will be beneficial to the secure throughput. A too large \(\epsilon \) (meaning a too weak secrecy-level) will directly reduce the secure throughput. In comparison, a too small \(\epsilon \) (meaning a too strict secrecy-level) will require larger a larger power consumption, which consequently limits the secure throughput due to (5). Thanks to this hidden unimodal property, we can use the Brent’s method [15] to find \(\epsilon ^*\) under given \(p_2\). The Brent’s method is a numerical algorithm that jointly exploits the golden-section search and the parabolic interpolation, with the objective of efficiently finding the optimum of a single-variable function. In particular, for the unimodal function [15], the Brent’s method is guaranteed to find its global optimum within a given interval. Due to the limited space in this paper, we skip the detailed operations of the Brent’s method here. Interested readers can refer to [15] for the details. In particular, we emphasize within each round of the iteration in this Brent’s method, we need to Sub-Algorithm to compute the value of \(V^{\text {IV-Sub}}_{(p_{2}^{\text {cur}},\epsilon )}\) under the given \(\epsilon \) (which is being currently evaluated in the Brent’s method) as well as the given \(p_{2}^{\text {cur}}\). Therefore, based on the output of the Brent’s, we can further execute a linear-search of \(p_2\in [0,\min \{P_B^{\text {tot}},\frac{n_1}{g_1}\}]\), which leads to the proposed LSBM-Algorithm. Here, “LSBM” means linear-search and the Brent’s method.

Although it is technically challenging to prove the unimodal property of the secure throughput of MU 1 with respect to \(\epsilon \), our following numerical results in Tables 1 and 2 show that our proposed LSBM-Algorithm can achieve the result almost same (with a negligible relative error) as our 2DLS-Algorithm. In the meantime, thanks to exploiting the Brent’s method, LSBM-Algorithm can significantly reduce the computational time compared with 2DLS-Algorithm.

figure c
Fig. 2.
figure 2

Illustration of hidden unimodal property of the secure throughput in \(\epsilon \) under the given \(p_2\). We set \(W=10\)MHz, \(P_B^{\text {tot}}=2\)W, \(R_2^{\text {req}}=1\)Mbits, \(n_1=1*10^{-6}\), \(n_2=1*10^{-6}\), \(n_E=1*10^{-6}\), \(\theta =1*10^{-7}\), and \(\epsilon ^{\text {max}}=0.2\). In addition, the randomly generated channel power gains from the BS to the two MUs are \(\{g_{i}\}=\{1.9330*10^{-6},1.9047*10^{-6}\}\).

4 Numerical Results

We present the numerical results in this section. Figure 2 validates the unimodal property of the secure throughput in \(\epsilon \) under the given \(p_2\). Specifically, the left subplot shows the case when \(p_2\le p_{2}^{\text {IV},\text {Tr}}\), which leads to \(p_{1,(p_2)}^{\text {IV}*}=p_2(2^{\frac{R_2^{\text {req}}}{W}}-1)^{-1}-\frac{n_2}{g_2}\), The right subplot shows the case when \(p_2>p_{2}^{\text {IV},\text {Tr}}\), which thus leads to \(p_{1,(p_2)}^{\text {IV}*}=P_B^{\text {tot}}-p_2\). As explained before in Sect. 3.2, when we enumerate \(\epsilon \), the corresponding MU 1’s secure throughput (under different given \(p_2\)) always increases firstly and then gradually decreases, i.e., showing the unimodal property.

Tables 1 and 2 show the performance comparison between our proposed 2DLS-Algorithm and LSBM-Algorithm. In particular, the results show that LSBM-Algorithm can achieve approximately the same result as 2DLS-Algorithm(\(\varDelta _p=0.001\),\(\varDelta _\epsilon =0.001\)), while consuming a significantly less computation time. Such an advantage essentially stems from that we exploit the unimodal property of the secure throughput with respect to \(\epsilon \), which thus saves the operation of the linear-search in \(\epsilon \).

Table 1. 2-MU Scenario: We fix \(W_i=10\) MHz, and \(\epsilon ^{\text {max}}=0.2\)
Table 2. 2-MU Scenario: We fix \(W_i=16\) MHz, and \(\epsilon ^{\text {max}}=0.2\)
Fig. 3.
figure 3

Impact of MU 2’s throughput requirement \(R_2^{\text {req}}\).

Figure 3 shows the impact of MU 2’s throughput requirement \(R_2^{\text {req}}\). We set \(W=10\)MHz, \(n_1=1*10^{-6}\), \(n_2=1*10^{-6}\), \(n_E=1*10^{-6}\), \(\theta =1*10^{-7}\), and \(\epsilon ^{\text {max}}=0.2\). In addition, the randomly generated channel power gains from the BS to the two MUs are \(\{g_{i}\}=\{1.9330*10^{-6},1.9047*10^{-6}\}\). As shown in Fig. 3, the MU 1’s maximum secure throughput gradually decreases when \(R_2^{\text {req}}\) increases, which is consistent with the intuition. Corresponding, the corresponding \(\epsilon ^*\) gradually decreases, meaning that a stronger secrecy-level is provided to avoid a significant loss in the secure throughput.

5 Conclusion

In this paper, we have investigated the optimal power allocation for cooperative jamming in NOMA systems under a two-user downlink scenario. Specifically, exploiting the two MUs’ simultaneous transmissions in NOMA, we use the BS’s transmission to MU 2 (i.e., the MU with a weak channel power gain) to provide a jamming to the eavesdropper who intentionally overhears the BS’s transmission to MU 1 (i.e., the MU with a strong channel power gain). To study this cooperative jamming, we have formulated a power allocation problem to maximize the secure throughput of MU 1 while satisfying the throughput requirement of MU 2. Despite the non-convexity of the above formulated problem, we have provided two efficient algorithms to compute the optimal solution. In addition, Numerical results have been provided to validate the effectiveness of our proposed algorithms and the performance of our proposed cooperative jamming scheme in NOMA.