Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access

被引:66
作者
Chen, Xiaoming [1 ,2 ]
Zhang, Zhaoyang [1 ]
Zhong, Caijun [1 ]
Ng, Derrick Wing Kwan [3 ]
Jia, Rundong [1 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210018, Peoples R China
[3] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
基金
中国国家自然科学基金;
关键词
Physical layer security; massive connections; NOMA; power allocation; 5G; PHYSICAL LAYER SECURITY; ANTENNA TECHNIQUES; MIMO; DOWNLINK; DESIGN; TRANSMISSION; PERFORMANCE; WIRELESS; SYSTEMS; NOMA;
D O I
10.1109/JSAC.2018.2825058
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper considers the security issue of the fifthgeneration wireless networks with massive connections, where multiple eavesdroppers aim to intercept the confidential messages through active eavesdropping. To realize secure massive access, non-orthogonal channel estimation and non-orthogonal multiple access techniques are combined to enhance the signal quality at legitimate users, while the inter-user interference is harnessed to deliberately confuse the eavesdroppers even without exploiting artificial noise. We first analyze the secrecy performance of the considered secure massive access system and derive a closedform expression for the ergodic secrecy rate. In particular, we reveal the impact of some key system parameters on the ergodic secrecy rate via asymptotic analysis with respect to a large number of antennas and a high transmit power at the base station. Then, to fully exploit the inter-user interference for security enhancement, we propose to optimize the transmit powers in the stages of channel estimation and multiple access. Finally, extensive simulation results validate the effectiveness of the proposed secure massive access scheme.
引用
收藏
页码:788 / 801
页数:14
相关论文
共 37 条
  • [1] [Anonymous], 2017, CVX MATLAB SOFTWARE
  • [2] [Anonymous], 2015, P WM2015 C
  • [3] Fully Non-Orthogonal Communication for Massive Access
    Chen, Xiaoming
    Zhang, Zhaoyang
    Zhong, Caijun
    Jia, Rundong
    Ng, Derrick Wing Kwan
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (04) : 1717 - 1731
  • [4] Exploiting Multiple-Antenna Techniques for Non-Orthogonal Multiple Access
    Chen, Xiaoming
    Zhang, Zhaoyang
    Zhong, Caijun
    Ng, Derrick Wing Kwan
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (10) : 2207 - 2220
  • [5] A Survey on Multiple-Antenna Techniques for Physical Layer Security
    Chen, Xiaoming
    Ng, Derrick Wing Kwan
    Gerstacker, Wolfgang H.
    Chen, Hsiao-Hwa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1027 - 1053
  • [6] Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI-A Unified Secrecy Performance Analysis
    Chen, Xiaoming
    Chen, Hsiao-Hwa
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (23) : 6286 - 6297
  • [7] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [8] Dai LL, 2015, IEEE COMMUN MAG, V53, P74, DOI 10.1109/MCOM.2015.7263349
  • [9] On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming
    Ding, Zhiguo
    Zhao, Zhongyuan
    Peng, Mugen
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (07) : 3151 - 3163
  • [10] Design of Massive-MIMO-NOMA With Limited Feedback
    Ding, Zhiguo
    Poor, H. Vincent
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2016, 23 (05) : 629 - 633