Secure Transmit Antenna Selection Protocol for MIMO NOMA Networks Over Nakagami-m Channels

被引:19
作者
Duc-Dung Tran [1 ]
Ha-Vu Tran [2 ]
Dac-Binh Ha [1 ]
Kaddoum, Georges [2 ]
机构
[1] Duy Tan Univ, Fac Elect & Elect Engn, Danang 550000, Vietnam
[2] Univ Quebec, LACIME Lab, ETS Engn Sch, Montreal, PQ H3C 1K3, Canada
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 01期
基金
加拿大自然科学与工程研究理事会;
关键词
MIMO; nonorthorgonal multiple access; physical layer security; transmit antenna selection; NONORTHOGONAL MULTIPLE-ACCESS; SYSTEMS;
D O I
10.1109/JSYST.2019.2900090
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider a multi-input multioutput (MIMO) nonorthogonal multiple access (NOMA) network consisting of one source and two legitimate users (LUs), so-called near and far users according to their distances to the source, and one passive eavesdropper, over Nakagami-m fading channels. Specifically, we investigate the cases where the signals of the far user might or might not be successfully decoded at the eavesdropper and the near user. Thus, we aim to design a transmit antenna selection (TAS) secure communication protocol for the network; where, two TAS solutions, namely Solutions I and II, are proposed. Specifically, Solutions I and II focus on maximizing the received signal power between the source and the near user, and between the source and the far user, respectively. Accordingly, exact and asymptotic closed-form expressions for the secrecy outage probability of the LUs and the overall system are derived. Our analytical results corroborated by the Monte Carlo simulation indicate that the secrecy performance could be significantly improved by properly selecting the power allocation coefficients and increasing the number of antennas at the source and the LUs. Interestingly, solution II is shown to provide a better overall secrecy performance over solution I.
引用
收藏
页码:253 / 264
页数:12
相关论文
共 34 条
  • [1] On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback
    Bashar, Shafi
    Ding, Zhi
    Li, Geoffrey Ye
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (04) : 1212 - 1223
  • [2] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [3] Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers
    Chen, Gaojie
    Coon, Justin P.
    Di Renzo, Marco
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1195 - 1206
  • [4] Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications
    Chen, He
    Li, Yonghui
    Rebelatto, Joao Luiz
    Uchoa-Filho, Bartolomeu F.
    Vucetic, Branka
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (07) : 1700 - 1711
  • [5] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [6] Dai LL, 2015, IEEE COMMUN MAG, V53, P74, DOI 10.1109/MCOM.2015.7263349
  • [7] Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions
    Ding, Zhiguo
    Fan, Pingzhi
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) : 6010 - 6023
  • [8] The Application of MIMO to Non-Orthogonal Multiple Access
    Ding, Zhiguo
    Adachi, Fumiyuki
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 537 - 552
  • [9] On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users
    Ding, Zhiguo
    Yang, Zheng
    Fan, Pingzhi
    Poor, H. Vincent
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (12) : 1501 - 1505
  • [10] Physical Layer Secrecy Performance of Multi-hop Decode-and-Forward Relay Networks with Multiple Eavesdroppers
    Duc-Dung Tran
    Nguyen-Son Vo
    Tan-Loc Vo
    Dac-Binh Ha
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 430 - 435