Massive Access in Secure NOMA Under Imperfect CSI: Security Guaranteed Sum-Rate Maximization With First-Order Algorithm

被引:18
作者
Li, Zongze [1 ]
Xia, Minghua [2 ,3 ]
Wen, Miaowen [4 ]
Wu, Yik-Chung [1 ]
机构
[1] Univ Hong Kong, Dept Elect & Elect Engn, Hong Kong, Peoples R China
[2] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Peoples R China
[3] Southern Marine Sci & Engn Guangdong Lab, Zhuhai 519082, Peoples R China
[4] South China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510640, Peoples R China
关键词
NOMA; Interference; Security; Probabilistic logic; Uncertainty; Simulation; Power system reliability; First-order algorithm; limited feedback; massive access; non-orthogonal multiple access; outage probability; physical layer security; NONORTHOGONAL MULTIPLE-ACCESS; RATIOS FRACTIONAL PROGRAMS; RESOURCE-ALLOCATION; POWER ALLOCATION; LIMITED FEEDBACK; SOLVING SUM; SYSTEMS; INTERFERENCE; TRANSMISSION; OPTIMIZATION;
D O I
10.1109/JSAC.2020.3018805
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Non-orthogonal multiple access (NOMA) is a promising solution for secure transmission under massive access. However, in addition to the uncertain channel state information (CSI) of the eavesdroppers due to their passive nature, the CSI of the legitimate users may also be imperfect at the base station due to the limited feedback. Under both channel uncertainties, the optimal power allocation and transmission rate design for a secure NOMA scheme is currently not known due to the difficulty of handling the probabilistic constraints. This article fills this gap by proposing novel transformation of the probabilistic constraints and variable decoupling so that the security guaranteed sum-rate maximization problem can be solved by alternatively executing branch-and-bound method and difference of convex programming. To scale the solution to a truly massive access scenario, a first-order algorithm with very low complexity is further proposed. Simulation results show that the proposed first-order algorithm achieves identical performance to the conventional method but saves at least two orders of magnitude in computation time. Moreover, the resultant transmission scheme significantly improves the security guaranteed sum-rate compared to the orthogonal multiple access transmission and NOMA ignoring CSI uncertainty.
引用
收藏
页码:998 / 1014
页数:17
相关论文
共 56 条
[1]   On the Distribution of Indefinite Quadratic Forms in Gaussian Random Variables [J].
Al-Naffouri, Tareq Y. ;
Moinuddin, Muhammed ;
Ajeeb, Nizar ;
Hassibi, Babak ;
Moustakas, Aris L. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (01) :153-165
[2]   The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems [J].
An, LTH ;
Tao, PD .
ANNALS OF OPERATIONS RESEARCH, 2005, 133 (1-4) :23-46
[3]   PROPAGATION MEASUREMENTS AND MODELS FOR WIRELESS COMMUNICATIONS CHANNELS [J].
ANDERSEN, JB ;
RAPPAPORT, TS ;
YOSHIDA, S .
IEEE COMMUNICATIONS MAGAZINE, 1995, 33 (01) :42-49
[4]  
[Anonymous], 2000, TABLE INTEGRALS SERI
[5]  
[Anonymous], 2013, MIMO wireless networks: Channels, techniques and standards for multi-antenna, multi-user and multi-cell systems
[6]  
Bartle R. G., 2011, Introduction to Real Analysis
[7]  
Bechar I., 2009, ARXIV09093595
[8]   ON THE CONVERGENCE OF ALTERNATING MINIMIZATION FOR CONVEX PROGRAMMING WITH APPLICATIONS TO ITERATIVELY REWEIGHTED LEAST SQUARES AND DECOMPOSITION SCHEMES [J].
Beck, Amir .
SIAM JOURNAL ON OPTIMIZATION, 2015, 25 (01) :185-209
[9]   An Investigation of Aided Language Stimulation: Does it Increase AAC Use with Adults with Developmental Disabilities and Complex Communication Needs? [J].
Beck, Ann R. ;
Stoner, Julia B. ;
Dennis, Marcia L. .
AUGMENTATIVE AND ALTERNATIVE COMMUNICATION, 2009, 25 (01) :42-54
[10]  
Ben-Tal A, 2001, LECT MODERN CONVEX O, V2