Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems

被引:125
作者
Li, Yiqing [1 ]
Jiang, Miao [1 ]
Zhang, Qi [1 ]
Li, Quanzhong [2 ,3 ]
Qin, Jiayin [1 ,4 ]
机构
[1] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[3] Guangdong Prov Key Lab Big Data Anal & Proc, Guangzhou 510006, Guangdong, Peoples R China
[4] Sun Yat Sen Univ, Xinhua Coll, Guangzhou 510520, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Alternating optimization; constrained concave-convex procedure (CCCP); multiple-input-single-output (MISO); nonorthogonal multiple access (NOMA); secrecy rate;
D O I
10.1109/TVT.2017.2658563
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we consider a cellular downlink multipleinput-single-output (MISO) nonorthogonal multiple access (NOMA) secure transmission system, where users are grouped as multiple clusters. Each cluster consists of a central user and a cell-edge user. The central user is an entrusted user, and the cell-edge user is a potential eavesdropper. We focus on the secure beamforming and power allocation design optimization problem which maximizes the sum achievable secrecy rate of central users subject to the transmit power constraint at the base station and transmission rate requirements at cell-edge users. The problem is non-convex because of coupling optimization variables in the considered fractional quadratically constrained quadratic programming. We propose an alternating optimization-based solution and a constrained concave-convex procedure-based solution to the considered problem. Simulation results demonstrate that our proposed NOMA schemes outperform the conventional orthogonal multiple access scheme.
引用
收藏
页码:7563 / 7567
页数:5
相关论文
共 11 条
[1]   New results on Hermitian matrix rank-one decomposition [J].
Ai, Wenbao ;
Huang, Yongwei ;
Zhang, Shuzhong .
MATHEMATICAL PROGRAMMING, 2011, 128 (1-2) :253-283
[2]  
Boyd S., 2004, CONVEX OPTIMIZATION
[3]   On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users [J].
Ding, Zhiguo ;
Yang, Zheng ;
Fan, Pingzhi ;
Poor, H. Vincent .
IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (12) :1501-1505
[4]   Achievable Secrecy Rate Regions for the Two-Way Wiretap Channel [J].
El Gamal, Aly ;
Koyluoglu, Onur Ozan ;
Youssef, Moustafa ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (12) :8099-8114
[5]  
Kim B, 2013, 2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), P1278, DOI 10.1109/MILCOM.2013.218
[6]   5G Network Capacity [J].
Li, Qian ;
Niu, Huaning ;
Papathanassiou, Apostolos ;
Wu, Geng .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2014, 9 (01) :71-78
[7]   Fairness of User Clustering in MIMO Non-Orthogonal Multiple Access Systems [J].
Liu, Yuanwei ;
Elkashlan, Maged ;
Ding, Zhiguo ;
Karagiannidis, George K. .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (07) :1465-1468
[8]  
Saito Y, 2013, IEEE VTS VEH TECHNOL
[9]   Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels [J].
Spencer, QH ;
Swindlehurst, AL ;
Haardt, M .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2004, 52 (02) :461-471
[10]   Robust Beamforming for Nonorthogonal Multiple-Access Systems in MISO Channels [J].
Zhang, Qi ;
Li, Quanzhong ;
Qin, Jiayin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (12) :10231-10236