Secure User Pairing and Power Allocation for Downlink Non-Orthogonal Multiple Access against External Eavesdropping

被引:1
作者
Li, Yuxuan [1 ]
Chen, Yanqiu [1 ]
Ji, Xiaopeng [1 ]
机构
[1] Nanjing Univ Informat Sci Technol, Sch Elect & Informat Engn, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
user pairing; power allocation; NOMA; external eavesdropping; secure communication; NOMA SYSTEMS; TRANSMISSION; PERFORMANCE;
D O I
10.3390/e26010064
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We propose a secure user pairing (UP) and power allocation (PA) strategy for a downlink Non-Orthogonal Multiple Access (NOMA) system when there exists an external eavesdropper. The secure transmission of data through the downlink is constructed to optimize both UP and PA. This optimization aims to maximize the achievable sum secrecy rate (ASSR) while adhering to a limit on the rate for each user. However, this poses a challenge as it involves a mixed integer nonlinear programming (MINLP) problem, which cannot be efficiently solved through direct search methods due to its complexity. To handle this gracefully, we first divide the original problem into two smaller issues, i.e., an optimal PA problem for two paired users and an optimal UP problem. Next, we obtain the closed-form optimal solution for PA between two users and UP in a simplified NOMA system involving four users. Finally, the result is extended to a general 2K-user NOMA system. The proposed UP and PA method satisfies the minimum rate constraints with an optimal ASSR as shown theoretically and as validated by numerical simulations. According to the results, the proposed method outperforms random UP and that in a standard OMA system in terms of the ASSR and the average ASSR. It is also interesting to find that increasing the number of user pairs will bring more performance gain in terms of the average ASSR.
引用
收藏
页数:14
相关论文
共 24 条
[1]   Secure Transmission via Beamforming Optimization for NOMA Networks [J].
Cao, Yang ;
Zhao, Nan ;
Chen, Yunfei ;
Jin, Minglu ;
Ding, Zhiguo ;
Li, Yonghui ;
Yu, F. Richard .
IEEE WIRELESS COMMUNICATIONS, 2020, 27 (01) :193-199
[2]   Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems: A Zero-Sum Game Approach [J].
Chen, Yanqiu ;
Ji, Xiaopeng .
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023, 136 (01) :531-553
[4]  
Cormen T. H., 2022, Introduction to Algorithms, V4th, P1312
[5]  
Dai LL, 2015, IEEE COMMUN MAG, V53, P74, DOI 10.1109/MCOM.2015.7263349
[6]   On the Application of BAC-NOMA to 6G umMTC [J].
Ding, Zhiguo ;
Poor, H. Vincent .
IEEE COMMUNICATIONS LETTERS, 2021, 25 (08) :2678-2682
[7]   Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions [J].
Ding, Zhiguo ;
Fan, Pingzhi ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) :6010-6023
[8]   On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users [J].
Ding, Zhiguo ;
Yang, Zheng ;
Fan, Pingzhi ;
Poor, H. Vincent .
IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (12) :1501-1505
[9]   Beamforming Design and Power Allocation for Secure Transmission With NOMA [J].
Feng, Youhong ;
Yan, Shihao ;
Yang, Zhen ;
Yang, Nan ;
Yuan, Jinhong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (05) :2639-2651
[10]   Graph-Theoretical Dynamic User Pairing for Downlink NOMA Systems [J].
Kose, Alper ;
Koca, Mutlu ;
Anarim, Emin ;
Medard, Muriel ;
Gokcesu, Hakan .
IEEE COMMUNICATIONS LETTERS, 2021, 25 (10) :3234-3238