A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks

被引:0
作者
Fan, Xin [1 ,2 ]
Li, Guangkai [3 ]
Li, Jianqiang [3 ]
Wang, Yue [4 ]
Luo, Chuanwen [1 ,2 ]
Hong, Yi [1 ,2 ]
Chen, Ting [5 ]
Huo, Yan [6 ]
机构
[1] Beijing Forestry Univ, Sch Informat Sci & Technol, Beijing 100083, Peoples R China
[2] Natl Forestry & Grassland Adm, Engn Res Ctr Forestry Oriented Intelligent Informa, Beijing 100083, Peoples R China
[3] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
[4] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
[5] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[6] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划; 美国国家科学基金会;
关键词
NOMA; UAV; CoMP; Physical layer security; Stochastic geometry approaches; Secrecy outage probability; NOMA; OPTIMIZATION; ACCESS; COMP; 5G;
D O I
10.1016/j.dcan.2024.11.004
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recognized as a pivotal facet in Beyond Fifth-Generation (B5G) and the upcoming Sixth-Generation (6G) wireless networks, Unmanned Aerial Vehicle (UAV) communications pose challenges due to limited capabilities when serving as mobile base stations, leading to suboptimal service for edge users. To address this, the collaborative formation of Coordinated Multi-Point (CoMP) networks proves instrumental in alleviating the issue of the poor Quality of Service (QoS) at edge users in the network periphery. This paper introduces a groundbreaking solution, the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access (HUD-NOMA) scheme for UAV-aided CoMP networks. Leveraging network coding and NOMA technology, our proposed HUD-NOMA effectively enhances transmission rates for edge users, notwithstanding a minor reduction in signal reception reliability for strong signals. Importantly, the system's overall sum rate is elevated. The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection. The study employs a stochastic geometry approach to derive the Secrecy Outage Probability (SOP) for the transmissions in the CoMP network, revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification. Furthermore, guided by the theoretical SOP derivation, this paper proposes a power allocation strategy to further reduce the system's SOP.
引用
收藏
页码:925 / 936
页数:12
相关论文
共 43 条
[11]  
Tian Y., Nix A.R., Beach M., On the performance of opportunistic noma in downlink comp networks, IEEE Commun. Lett., 20, 5, pp. 998-1001, (2016)
[12]  
Ali M.S., Hossain E., Kim D.I., Coordinated multipoint transmission in downlink multi-cell noma systems: models and spectral efficiency performance, IEEE Wirel. Commun., 25, 2, pp. 24-31, (2018)
[13]  
Fan X., Huo Y., Cooperative secure transmission against collusive eavesdroppers in Internet of things, Int. J. Distrib. Sens. Netw., 16, 6, (2020)
[14]  
Li K., Yan P.-G., Cai Q.-Y., Quantum computing and the security of public key cryptography, Fundam. Res., 1, 1, pp. 85-87, (2021)
[15]  
Huo Y., Fan X., Ma L., Cheng X., Tian Z., Chen D., Secure communications in tiered 5g wireless networks with cooperative jamming, IEEE Trans. Wirel. Commun., 18, 6, pp. 3265-3280, (2019)
[16]  
Huang L., Fan X., Huo Y., Hu C., Tian Y., Qian J., A novel cooperative jamming scheme for wireless social networks without known csi, IEEE Access, 5, pp. 26476-26486, (2017)
[17]  
Fan J., Huo Y., Fan X., Hu C., Jing G., A cooperative jamming based secure uplink transmission scheme for heterogeneous networks supporting d2d communications, International Conference on Wireless Algorithms, Systems, and Applications, pp. 103-114, (2018)
[18]  
Fan X., Huang L., Huo Y., Hu C., Tian Y., Qian J., Space power synthesis-based cooperative jamming for unknown channel state information, International Conference on Wireless Algorithms, Systems, and Applications, pp. 483-495, (2017)
[19]  
Wei L., Jing T., Fan X., Wen Y., Huo Y., The secrecy analysis over physical layer in noma-enabled cognitive radio networks, 2018 IEEE International Conference on Communications (ICC), pp. 1-6, (2018)
[20]  
Xu M., Jing T., Fan X., Wen Y., Huo Y., Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks, 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, (2018)