Secure Users Oriented Downlink MISO NOMA

03/01/2019
by   Hui-Ming Wang, et al.
0

This paper proposes a secure users oriented multiple-input and single-output (MISO) non-orthogonal multiple access (NOMA) downlink transmission scheme, where multiple legitimate users are categorized as quality of service (QoS)-required users (QU) and the security-required users (SU) overheard by a passive eavesdropper. The basic idea is to exploit zero-forcing beamforming (ZFBF) to cancel interference among SUs, and then several QUs are efficiently scheduled based on the obtained beamforming vectors to divide the legitimate users into several user clusters, in such a way that the QUs could share the concurrent transmissions and help to interfere with the eavesdropper to enhance SU secrecy. The goal is to maximize the achievable minimum secrecy rate (MSR) and sum secrecy rate (SSR) of all SUs, respectively, subject to the secrecy outage probability (SOP) constraint of each SU and the QoS constraint of each QU. To provide a comprehensive investigation we consider two extreme cases that the eavesdropper has perfect multiuser detection ability (lower bound of secrecy) or does not have multiuser detection ability (upper bound of secrecy). In the lower bound case, the Dinkelbach algorithm and the monotonic optimization (MO)-based outer polyblock approximation algorithm are proposed to solve the max-min secrecy rate (MMSR) and max-sum secrecy rate (MSSR) problems, respectively. As for the upper bound case, an alternative optimization (AO)-based algorithm is proposed to solve the two non-convex problems. Finally, the superiority of the proposed cases to the conventional orthogonal multiple access (OMA) one is verified by numerical results.

READ FULL TEXT

page 3

page 5

page 6

page 7

page 8

page 9

page 10

page 12

research
06/09/2020

UAV Secure Downlink NOMA Transmissions: A Secure Users Oriented Perspective

This paper proposes a secure downlink multi-user transmission scheme ena...
research
07/03/2018

Secure Transmission to the Strong User with Optimal Power Allocation in NOMA

With non-orthogonal multiple access(NOMA), we tackle the maximization of...
research
10/21/2022

Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks

The performance of physical layer secrecy approach in non-orthogonal mul...
research
05/13/2021

Robust Beamforming for Enhancing Security in Multibeam Satellite Systems

This paper proposes a robust beamforming (BF) scheme to enhance physical...
research
07/09/2018

Beamforming Techniques for Non-Orthogonal Multiple Access in 5G Cellular Networks

In this paper, we develop various beamforming techniques for downlink tr...
research
04/24/2018

On the Secrecy Capacity of a Full-Duplex Wirelessly Powered Communication System in the Presence of a Passive Eavesdropper

In this paper, we investigate the secrecy capacity of a point-to-point, ...
research
03/30/2021

Decoding Orders for Securing Untrusted NOMA

This letter focuses on exploring a new decoding order to resolve the sec...

Please sign up or login with your details

Forgot password? Click here to reset