Robust Physical Layer Security for Power Domain Non-orthogonal Multiple Access-Based HetNets and HUDNs, SIC Avoidance at Eavesdroppers

06/06/2018
by   Moslem Forouzesh, et al.
0

In this paper, we investigate the physical layer security in downlink of Power Domain Non Orthogonal Multiple Access based heterogeneous cellular network in presence of multiple eavesdroppers. Our aim is to maximize the sum secrecy rate of the network. To this end, we formulate joint subcarrier and power allocation optimization problems to increase sum secrecy rate. Moreover, we propose a novel scheme at which the eavesdroppers are prevented from doing Successive Interference Cancellation, while legitimate users are able to do it. In practical systems, availability of eavesdroppers Channel State Information is impractical, hence we consider two scenarios: 1 Perfect CSI of the eavesdroppers, 2 imperfect CSI of the eavesdroppers. Since the proposed optimization problems are nonconvex, we adopt the well known iterative algorithm called Alternative Search Method. In this algorithm, the optimization problems are converted to two subproblems, power allocation and subcarrier allocation. We solve the power allocation problem by the Successive Convex Approximation approach and solve the subcarrier allocation subproblem, by exploiting the Mesh Adaptive Direct Search algorithm. Moreover, in order to study the optimality gap of the proposed solution method, we apply the monotonic optimization method. Moreover, we evaluate the proposed scheme for secure massive connectivity in 5G networks. Numerical results highlight that the proposed scheme significantly improves the sum secrecy rate compared with the conventional case at which the eavesdroppers are able to apply SIC.

READ FULL TEXT
research
07/27/2020

Massive Access in Secure NOMA under Imperfect CSI: Security Guaranteed Sum-Rate Maximization with First-Order Algorithm

Non-orthogonal multiple access (NOMA) is a promising solution for secure...
research
03/30/2021

Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective

The amalgamation of non-orthogonal multiple access (NOMA) and physical l...
research
01/13/2018

Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation

Secure communication is a promising technology for wireless networks bec...
research
03/23/2018

Joint Head Selection and Airtime Allocation for Data Dissemination in Mobile Social Networks

Mobile social networks (MSNs) enable people with similar interests to in...
research
02/19/2018

Single or Multiple Frames Content Delivery for Robust and Secure Communication in Energy and Spectrum Efficient 5G Networks?

This paper addresses the four enabling technologies, namely multi-user s...
research
02/09/2020

Robust URLLC Packet Scheduling of OFDM Systems

In this paper, we consider the power minimization problem of joint physi...
research
08/07/2023

Sensing-Communication-Computing-Control Closed Loop for Unmanned Space Exploration

With a growing interest in outer space, space robots have become a focus...

Please sign up or login with your details

Forgot password? Click here to reset