Massive Access in Secure NOMA Under Imperfect CSI: Security Guaranteed Sum-Rate Maximization With First-Order Algorithm

被引:18
作者
Li, Zongze [1 ]
Xia, Minghua [2 ,3 ]
Wen, Miaowen [4 ]
Wu, Yik-Chung [1 ]
机构
[1] Univ Hong Kong, Dept Elect & Elect Engn, Hong Kong, Peoples R China
[2] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Peoples R China
[3] Southern Marine Sci & Engn Guangdong Lab, Zhuhai 519082, Peoples R China
[4] South China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510640, Peoples R China
关键词
NOMA; Interference; Security; Probabilistic logic; Uncertainty; Simulation; Power system reliability; First-order algorithm; limited feedback; massive access; non-orthogonal multiple access; outage probability; physical layer security; NONORTHOGONAL MULTIPLE-ACCESS; RATIOS FRACTIONAL PROGRAMS; RESOURCE-ALLOCATION; POWER ALLOCATION; LIMITED FEEDBACK; SOLVING SUM; SYSTEMS; INTERFERENCE; TRANSMISSION; OPTIMIZATION;
D O I
10.1109/JSAC.2020.3018805
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Non-orthogonal multiple access (NOMA) is a promising solution for secure transmission under massive access. However, in addition to the uncertain channel state information (CSI) of the eavesdroppers due to their passive nature, the CSI of the legitimate users may also be imperfect at the base station due to the limited feedback. Under both channel uncertainties, the optimal power allocation and transmission rate design for a secure NOMA scheme is currently not known due to the difficulty of handling the probabilistic constraints. This article fills this gap by proposing novel transformation of the probabilistic constraints and variable decoupling so that the security guaranteed sum-rate maximization problem can be solved by alternatively executing branch-and-bound method and difference of convex programming. To scale the solution to a truly massive access scenario, a first-order algorithm with very low complexity is further proposed. Simulation results show that the proposed first-order algorithm achieves identical performance to the conventional method but saves at least two orders of magnitude in computation time. Moreover, the resultant transmission scheme significantly improves the security guaranteed sum-rate compared to the orthogonal multiple access transmission and NOMA ignoring CSI uncertainty.
引用
收藏
页码:998 / 1014
页数:17
相关论文
共 56 条
[21]   On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users [J].
Ding, Zhiguo ;
Yang, Zheng ;
Fan, Pingzhi ;
Poor, H. Vincent .
IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (12) :1501-1505
[22]   Solving sum-of-ratios fractional programs using efficient points [J].
Dür, M ;
Horst, R ;
Van Thoai, N .
OPTIMIZATION, 2001, 49 (5-6) :447-466
[23]  
Evolved Universal Terrestrial Radio Access, 2013, TS37104 3GPP
[24]   Joint User Scheduling and Power Allocation Optimization for Energy-Efficient NOMA Systems With Imperfect CSI [J].
Fang, Fang ;
Zhang, Haijun ;
Cheng, Julian ;
Roy, Sebastien ;
Leung, Victor C. M. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (12) :2874-2885
[25]   Beamforming Design and Power Allocation for Secure Transmission With NOMA [J].
Feng, Youhong ;
Yan, Shihao ;
Yang, Zhen ;
Yang, Nan ;
Yuan, Jinhong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (05) :2639-2651
[26]   Secure Transmission Design With Feedback Compression for the Internet of Things [J].
Hu, Jianwei ;
Cai, Yueming ;
Yang, Nan .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (06) :1580-1593
[27]   MIMO broadcast channels with finite-rate feedback [J].
Jindal, Nihar .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (11) :5045-5060
[28]   Downlink SDMA with Limited Feedback in Interference-Limited Wireless Networks [J].
Kountouris, Marios ;
Andrews, Jeffrey G. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (08) :2730-2741
[29]   Variations and extension of the convex-concave procedure [J].
Lipp, Thomas ;
Boyd, Stephen .
OPTIMIZATION AND ENGINEERING, 2016, 17 (02) :263-287
[30]   Massive Connectivity With Massive MIMO-Part I: Device Activity Detection and Channel Estimation [J].
Liu, Liang ;
Yu, Wei .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (11) :2933-2946