On Secure QoS-based NOMA Networks with Multiple Antennas and Eavesdroppers over Nakagami-m Fading

被引:0
作者
Tam Nguyen Kieu [1 ]
Duc-Dung Tran [2 ]
Dac-Binh Ha [2 ]
Voznak, Miroslav [3 ]
机构
[1] Ton Duc Thang Univ, Fac Elect & Elect Engn, 19 Nguyen Huu Tho St,7th Dist, Ho Chi Minh City, Vietnam
[2] Duy Tan Univ, Fac Elect & Elect Engn, 3 Quang Trung St, Hai Chau Dist, Danang, Vietnam
[3] VSB Tech Univ Ostrava, 17 Listopadu 15-2172, Ostrava 70833, Czech Republic
关键词
NOMA; physical layer security; secrecy capacity; secrecy outage probability; SIC; TAS; ACCESS; SYSTEMS;
D O I
10.1080/03772063.2019.1610088
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study the physical layer security of a downlink multi-input single-output non-orthogonal multiple access (NOMA) system, in which transmit antenna selection (TAS) scheme, users' quality of service (QoS) requirements, Nakagami-m fading channel, and user selection solution are considered for secure NOMA transmission. Specifically, we investigate the scenario that a base station (BS) (source) communicates with two legitimate user (LU) clusters with different priority depending on their QoS requirements in the presence of multiple passive eavesdroppers over Nakagami-m fading. To enhance the secrecy performance, we examine a TAS scheme and a user selection method. In this context, prior to transmission, a transmit antenna and a user in high-priority LU cluster are jointly selected to maximize the channel quality of the link from the BS to the selected user. Furthermore, together with the selected high-priority user, a user in low-priority LU cluster, which has the best channel condition, is chosen for performing two-user NOMA. In order to evaluate the secrecy performance, tight and asymptotic closed-form expressions of secrecy outage probability for selected LUs and overall system are derived. Our theoretical results confirmed by Monte-Carlo simulation show that in QoS-based NOMA system, high-priority users cause the higher effects on the overall secrecy performance in comparison with low-priority users. Finally, these results also indicate that our proposed communication protocol achieves the secrecy performance greater than conventional protocol.
引用
收藏
页码:436 / 448
页数:13
相关论文
共 24 条
  • [1] [Anonymous], INTRO NUMERICAL ANAL
  • [2] [Anonymous], 2005, FUNDAMENTALS WIRELES
  • [3] [Anonymous], 2016, P IEEE INT C COMM IC
  • [4] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [5] Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications
    Chen, He
    Li, Yonghui
    Rebelatto, Joao Luiz
    Uchoa-Filho, Bartolomeu F.
    Vucetic, Branka
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (07) : 1700 - 1711
  • [6] Dai LL, 2015, IEEE COMMUN MAG, V53, P74, DOI 10.1109/MCOM.2015.7263349
  • [7] Relay Selection for Cooperative NOMA
    Ding, Zhiguo
    Dai, Huaiyu
    Poor, H. Vincent
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (04) : 416 - 419
  • [8] Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions
    Ding, Zhiguo
    Fan, Pingzhi
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) : 6010 - 6023
  • [9] On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users
    Ding, Zhiguo
    Yang, Zheng
    Fan, Pingzhi
    Poor, H. Vincent
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (12) : 1501 - 1505
  • [10] Tran DD, 2018, PROCEEDINGS OF 2018 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SIGNAL PROCESSING, TELECOMMUNICATIONS & COMPUTING (SIGTELCOM 2018), P187, DOI 10.1109/SIGTELCOM.2018.8325787