On the security and reliability performance of SWIPT-enabled full-duplex relaying in the non-orthogonal multiple access networks

ABSTRACT The performance of the simultaneous wireless information and power transfer (SWIPT) enabled full-duplex (FD) relaying in non-orthogonal multiple access (NOMA) networks is investigated in both reliability and security aspects. More precisely, for the viewpoint of reliability, we derive in the closed-form expression the outage probability (OP) at both end-users. On the other hand, intercept probability (IP) is considered a helpful metric to measure the security of the considered systems. Moreover, we derive the IP in the closed-form expression too. Numerical results are also given to confirm the correctness of the derived mathematical framework as well as to identify the insights of both metrics as a function of some key parameters such as the transmit power, the power-splitting (PS) ratio, and the power allocation ratio.


Introduction
Recently, simultaneous wireless information and power transfer (SWIPT) has gained lots of attraction from both industry and academia thanks to its capabilities to both bear information and charge a battery of low energy devices (LEDs) (Li et al., 2020).To make it feasible, the SWIPT-enabled receiver needs to equip an energy harvesting (EH) circuit besides the conventional information decoding circuit.The EH circuit can be made by low-cost passive devices such as resistance and capacitors or from an advanced microprocessor.Additionally, relying on the adopted protocol some other hardware is required.For example, if the power splitting (PS) protocol is taken into consideration, a power splitter is used to divide the incoming signals into two parts.The first part is sent to the EH circuit and the remained part is guided to the information decoding (ID) receiver (Lam et al., 2016b).On the other hand, if the time-switching (TS) protocol is used, an electronic switch is mandatory to realize this protocol so that the switch will periodically switch between the EH and ID receivers.Finally, if the receiver is equipped with multiple antennae, an antenna-splitting (AS) protocol can be applied where parts of the antennae are for EH and the remaining is for ID (Lam et al., 2016a).
On the other hand, full-duplex (FD) communications (T.N. Nguyen, Tu, et al., 2022) and non-orthogonal multiple access (NOMA) are also effective techniques to boost the spectral efficiency (SE) and energy efficiency (EE) of the wireless networks (Bariah et al., 2019).In particular, by allowing simultaneous transmitting and receiving of information, FD communications can doubly improve the SE of the whole network provided that the self-interference is appropriately suppressed.It is obvious that the combinations of fullduplex with SWIPT can not only improve the spectral efficiency (SE) but also energy efficiency (EE).Its advantages was proven in Yang et al. (2022), Wang et al. (2017) and Phu et al. (2021b).Particularly, in Yang et al. (2022), the authors designed the transceiver supporting FD SWIPT-enabled networks.They showed that the proposed design achieves lower transmit power compared with FD without SWIPT-enabled networks.The capacity and outage probability of the FD SWIPT-based networks were significantly improved in Wang et al. (2017) and Phu et al. (2021b).NOMA which allows multiple signals concurrently transmit on the same resource blocks (time and frequency) will scale up both the SE and EE of the networks.As a consequence, in this work, we investigate the performance of the SWIPT-enabled NOMA-based wireless networks.Before going to discuss the contributions and novelties of the current work, let us first summarize the state-of-theart of these techniques.
The performance of FD communications, NOMA-based and SWIPT-supported wireless networks were extensively given in Kurup and Babu (2020), Li et al. (2020), Liu et al. (2019), Liu et al. (2020), T. N. Nguyen et al. (2019), Nguyen et al. (2022a), B. C. Nguyen et al. (2019), Tran et al. (2021), Tu et al. (2018), Tu et al. (2023) and Wu et al. (2019).More precisely, the authors in (Kurup & Babu, 2020) studied the adaptive power allocation (APA) in the SWIPTbased full duplex cooperative NOMA networks by employing the TS protocol.Their work, nonetheless, focuses on the reliability problem rather than considering both reliability and security like the present work.Outage probability (OP) under the TS protocol was investigated in Li et al. (2020) where the imperfect channel state information (CSI) and hardware impairments were taken into account.They, however, do not derive the intercept probability (IP).The OP under the SWIPT-based cooperative NOMA networks was addressed in Liu et al. (2019) where the near user acts as a relay for the far user.Their work does not consider the full-duplex transmission owing to the single antenna at all nodes.A non-linear energy harvester was considered in Liu et al. (2020) to capture the non-linear behaviour of the harvested energy.Nevertheless, they also do not study the IP like the current work.The performance of the partial and full relay selection under the EH-enabled two-way relaying networks was investigated in Nguyen et al. (2019a), Nguyen et al. (2019b),and Nguyen et al. (2022a).Nguyen and other authors in B. C. Nguyen et al. (2019) derived the OP of NOMA networks.Tran and others studied the performance of cognitive radio networks (CRNs) subject to the joint impact of interference and hardware noises (Tran et al., 2021).Tools from stochastic geometry were applied in Tu et al. (2018) to study the coverage probability of receiver diversity in cellular networks with SWIPT.The impact of imperfect interference cancellation and near field path-loss on the performance of OP was conducted in Tu et al. (2023).They, nonetheless, do not study the security aspect of NOMA networks as well as energy harvesting.Wu and other authors proposed a novel transceiver design for the downlink SWIPT-enabled NOMA systems in Wu et al. (2019).
Different from the above-mentioned works, in the present paper, we investigate the trade-off between the security and reliability of the SWIPT-enabled full-duplex relaying NOMA networks.In particular, we derive both the OP and IP at all destinations in the closed-form expressions.The main contributions and novelties are given as follows: . We take into account several advanced techniques that are full-duplex relaying, NOMA, and SWIPT.The considered systems, as a consequence, are complicated and involve many random variables (RVs) that are not necessarily independent of each other. .We derive in closed-form expression both the OP and IP of all destinations.
. We provide simulation results from the Monte-Carlo method to verify the accuracy of the derived mathematical framework. .We highlight the impact of some key parameters on the system performance.
The remainder of the manuscript is organized as follows: Section 2 provides the system model.The main derivations and trends are given in Section 3. Numerical results are provided in Section 4. Section 5 concludes the paper.

System model
Figure 1 depicts the system model of the proposed networks, in which a source S communicates with two users denoted by D1 and D2 (D1: weak user and D2: strong user) via the help of a full-duplex relay denoted by R. 1 Besides, there is an eavesdropper denoted by E attempting to wiretap the secure information at R, D1, and D2.It is assumed that the direct link between S and two users does not exist owing to long transmission distance and deep shadow fading (Minh Nam et al., 2022).Since the relay is not connected to the power grid, it counts only on the harvested energy from S to operate and forward information to two destinations.It is noted that all nodes in the considered networks are equipped with an antenna except for the relay which is equipped with two antennae.It is noted that if the eavesdropper is equipped with multiple antennae, the wiretap channel will be enhanced.As a consequence, the intercept probability will go up and the systems will be less secure.One of the effective ways to mitigate such cases is to employ artificial noise from the source node and/or the destination to deteriorate the quality of the eavesdropper links.On the other hand, multiple antennae at eavesdropper have a tiny effect on the performance of the outage probability since the signal-to-noise-ratio (SNR) at both destinations is independent of the eavesdropper.As a consequence, the relay node is able to work in the full-duplex mode while all remaining operate in the half-duplex mode.

Channel modelling
Both large-scale path-loss and small-scale fading are studied in this paper.The impact of shadowing is not taken into account as it is a general case in the literature (Lam & Di Renzo, 2020).

Small-scale fading
Let us denote h SR , h RD i , i [ {1, 2}, and h RE as the channel coefficients from S → R, from R →D 1 , and from R → E, respectively.We also denote h RR as the self-interference from the transmit antenna to the receive antenna at the relay node.Assuming that h SR , h RD i , i [ {1, 2}, and h RE are followed by a complex Gaussian distribution, their channel gains denoted by where l SR , l RE , l RD i are the average channel gain from S to R, from R to two destinations, and from R to E that are a function of the transmission distance defined in the following Section.In the present work, we assume that the global channel state information of all nodes is available at the source node via a high-accuracy feedback network.Nonetheless, it is true that obtaining the global CSI in wireless networks is an extreme task, thus, considering imperfect CSI is a promising extension for the current work.However, it is proven in Tu et al. (2022) that the negative impact of the imperfect CSI can be effectively mitigated by employing multiple antennae and/or multiple relays.
where d a,b is the transmission distance from node a to node b and β is the path-loss exponent.

Transmission procedure
The transmission commences with the transmission from the source S to the relay R. At the relay, it employs one of its antennae to both decode information and harvest energy thanks to the power splitting protocol in the simultaneous wireless information and power transfer enabled systems.Particularly, the incoming signals are split into two parts.The first part is sent to the harvesting circuit which will absorb and store the harvested energy in a super capacity battery.The harvested energy denoted by E R is formulated as where 0 , h ≤ 1 is the conversion efficiency, 0 , r , 1 is the PS ratio, T is the transmission duration (in second), P S is the transmit power of S, and g SR is the channel gain from S to R. The transmit power of R is then formulated as Besides, the remained part is sent to the information decoding circuit, the received signal denoted by y R at the input of this circuit is given below where a 1 √ x 1 + a 2 √ x 2 is the transmitted signal from S which is superimposed of two signals for D 1 and D 2 ; a 1 .a 2 , a 1 + a 2 = 1 are the power allocation for the destination D 1 and D 2 , respectively.Here, the near and far users are identified based on the largescale path-loss criteria.Particularly, a user who enjoys the larger path-loss is labelled as the far user and another will be the nearer.In the present work, without any explicit explanations, we assume that D 1 is the far user.Other criteria such as one based on simultaneously received power are left for future work.h RR is the self-interference at R owing to the full-duplex mode and the imperfect cancellation; x R is the transmitted signal from relay; } is the expectation operator.n R is the additive white Gaussian noise.Based on the successive interference cancellation (SIC) principle, the relay first decodes the signal x 1 while considering x 2 as the background noise.It then removes the signal x 1 from the received signal and decodes the signal x 2 .Therefore, the instantaneous signal-to-interference-plus-noise-ratio (SINR) of signals x 1 and x 2 at R are expressed as where N 0 is the noise variance.Next, substituting (4) into (6), we have After decoding the information of both destinations, the relay re-encodes and forwards this information to both destinations.The received signals at two destinations are then given as Here n D i is the AWGN at the ith destination; the SINR at D 1 is formulated as and the SNR of D 2 is held by first subtracting the x 1 and is given as Finally, the instantaneous rate of D i is computed as

Performance analysis
In this section, we evaluate the performance of the reliability and security of the considered networks.More precisely, outage probability is chosen as a key metric of the reliability while intercept probability is a representation from the security aspect.

Outage probability
Outage probability is referred to the probability that the instantaneous rate is below the predefined threshold.Particularly, the OP of the ith destination is mathematically computed as Proof.Let us commence with the derivation of the D 1 , we have where g th = 2 R − 1, (a) is held by employing the independent properties of two hops.J 1 and J 2 are given as follows: where K 1 ( †) is the modified Bessel function of second kind with the 1st order.Finally, by substituting J 1 and J 2 from ( 14) into (13), we obtain the OP of D 1 .Next, we derive the OP of D 2 as follows: where We conclude the proof here.

Intercept probability
The considered system will be wiretapped if E can successfully decode x 1 or x 2 from the relay.Mathematical speaking, the IP of x 1 and x 2 is computed as follows: Here the last equation is achieved by applying the same steps as the outage probability.

Numerical results
Simulation results based on the Monte-Carlo method as T. N. Nguyen et al. (2018) are given in this section to clarify the accuracy of the developed mathematical frameworks as well as to give some insights into the considered metrics.Without loss of generality, the following set of parameters is used in this section: β = 2.5, η = 0.8, R = 0.125 [bits/ s/Hz], a 1 = 0.7, a 2 = 0.3, ρ = 0.5, d SR = 0.5, d RD 1 = 0.75, d RD 2 = 0.35, and d RE = 3. Figures 2 and 3 depict the OP and IP versus a 1 .We observe that there is a good agreement between the developed mathematical framework and the Monte-Carlo simulation in both figures.Additionally, increasing a 1 is beneficial for the D 1 but not necessarily for the D 2 .In particular, when a 1 increases from 0.55 to 0.95, the OP of D 1 steadily decreases from 0.2 to below 0.1 while OP of D 2 dramatically scales up from 0.08 to above 0.2.In Figure 3, we also observe a contrary behaviour of IP 1 and IP 2 regarding a 1 .More precisely, we see that increasing a 1 , the security of D 2 improves significantly while the security of D 1 is gradually lost.
Figures 4 and 5 illustrate the performance of the outage probability and intercept probability with respect to the transmit power of source S. We experience again that the derived mathematical frameworks have coincided with the simulation results.Furthermore, surging the transmit power is useful for both OP and IP.More precisely, the OP improves 100 times when the transmit power increases from −5 to 20 dB for two destinations.Looking at Figure 4, we observe that OP 2 is substantially better than OP 1 , and the gap between the two curves is almost stable for the whole range of observation.Regarding IP, we see that increasing Ψ will increase IP regardless of destinations.However, the IP 2 seems to increase quicker than IP 1 especially when the system is in the low transmit power regime.Finally, from Figures 4 and 5, it is important to optimize the transmit power of the source node since we experience a contrary behaviour of the reliability and security aspects.
Figures 6 and 7 show the impact of the power-splitting ratio ρ on the performance of the OP and IP.In Figure 6, we see that the OP has a U-shape behaviour with respect to ρ. Particularly, OP starts decreasing when ρ increases after reaching its minimum, it keeps increasing.Interestingly, the OP of D 2 does not consistently outperform the OP of D 1 .As for the IP, we observe a different behaviour regarding ρ.More precisely, increasing ρ monotonically increases IP.
Figure 8 studies the interaction between OP and IP.We observe that the smaller the OP the larger the IP.As a consequence, it is important to optimize a set of parameters that simultaneously satisfies both the reliability and security aspects of the networks.

Conclusion
In the present work, we studied both the intercept and outage probability of the dual-hop SWIPT-enabled networks.In particular, we derived the outage probability (OP) and intercept probability (IP) of the considered networks in the closed-form expressions.Simulation results were given to confirm the correctness of the derived frameworks.Finally, the performance of the considered networks can be enhanced in several ways.One of the feasible extensions is to consider the random position of all nodes in the networks via tools from stochastic geometry.Additionally, the imperfect cancellation at the relay could also be considered to capture the practical hardware constraint.Another possible extension was to install more antennae at both source and destinations to further improve the system's reliability and security.Note 1.Although reconfigurable intelligent surfaces (RIS) has recently emerged as a potential technique to enhance the system performance of the wireless networks we here employ the relay owing to the following reasons.First, it is certain that both RIS and relaying are effective means to ameliorate wireless networks.However, to truly exploit the benefit of these techniques, global channel state information should be available at the central node, i.e. source node.Nonetheless, estimating channel coefficients in RIS-assisted networks is more challenging compared to relaying networks since most of the RIS elements are made up of passive devices (Van Chien et al., 2021).Regarding the relay, ones can straightforwardly estimate the channel coefficient without any problems.Next, another difference between these two techniques is that the RIS is generally classified as a passive device while the relay is an active device with full signal processing functions as well as a power amplifier.

Disclosure statement
No potential conflict of interest was reported by the author(s).
then modelled by an exponential distribution whose cumulative distribution function (CDF) are given asPham et al. (2020)

2. 1
.2. Large-scale path-loss Let us denote l a,b as the large-scale path-loss from node a [ {S, R} to node b [ {R, E, D i } and is given as follows (N.-L.Nguyen et al., 2023):

Figure 2 .
Figure 2. Outage probability vs. a 1 ; solid lines are from Monte-Carlo simulation while markers are from (12).

Figure 3 .
Figure 3. Intercept probability vs. a 1 ; solid lines are from Monte-Carlo simulation while markers are from (17).