基于协作多点网络的非正交多址系统的物理层安全研究
Performance Analysis of Physical Layer Security of Non-Orthogonal Multiple Access System in Coordinated Multi-Point Network
DOI: 10.12677/SEA.2019.86038, PDF,    科研立项经费支持
作者: 黄 勇, 吴 江*:浙江理工大学信息学院,浙江 杭州
关键词: 协作多点非正交多址物理层安全放大转发Coordinated Multi-Point Non-Orthogonal Multiple Access Physical Layer Security
摘要: 研究了基于协作多点网络的非正交多址系统的物理层安全问题,在协作多点网络中存在一个窃听者且中继采用放大转发策略的场景下,对NOMA-CoMP系统的物理层安全性能进行理论分析,推导了全局保密中断概率和各子信道保密中断概率的闭式解。经验证,NOMA-CoMP系统的物理层安全性能优于非CoMP的多小区NOMA系统。
Abstract: The physical layer security of non-orthogonal multiple access systems based on cooperative mul-ti-point network is studied. Considering the presence of eavesdroppers in a coordinated multi-point network, the relay adopts an amplification and forwarding (AF) strategy to analyze the physical layer security performance of NOMA-CoMP system and derive the expression of the global secret outage probability and the secret outage probability of each subchannel. It is verified that the physical layer security performance of the NOMA-CoMP system is better than that of the non-CoMP multi-cell NOMA system.
文章引用:黄勇, 吴江. 基于协作多点网络的非正交多址系统的物理层安全研究[J]. 软件工程与应用, 2019, 8(6): 311-318. https://doi.org/10.12677/SEA.2019.86038

参考文献

[1] Saito, Y., Kishiyama, Y., Benjebbour, A., Nakamura, T., Li, A. and Higuchi, K. (2013) Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access. IEEE 77th Vehicular Technology Conference, Dresden, 1-5. [Google Scholar] [CrossRef
[2] Ding, Z., Fan, P. and Poor, H.V. (2016) Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions. IEEE Transactions on Vehicular Technology, 65, 6010-6023. [Google Scholar] [CrossRef
[3] Ali, M.S., Tabassum, H. and Hossain, E. (2016) Dynamic User Clustering and Power Allocation for Uplink and Downlink Non-Orthogonal Multiple Access (NOMA) Systems. IEEE Access, 4, 6325-6343. [Google Scholar] [CrossRef
[4] Bassoy, S., Farooq, H., Imran, M.A. and Imran, A. (2017) Coordinated Multi-Point Clustering Schemes: A Survey. IEEE Communications Surveys & Tutorials, 19, 743-764. [Google Scholar] [CrossRef
[5] Liu, D., Han, S., Yang, C. and Zhang, Q. (2016) Semi-Dynamic User-Specific Clustering for Downlink Cloud Radio Access Network. IEEE Transactions on Vehicular Technology, 65, 2063-2077. [Google Scholar] [CrossRef
[6] Choi, J. (2014) Non-Orthogonal Multiple Access in Downlink Coordinated Two-Point Systems. IEEE Communications Letters, 18, 313-316. [Google Scholar] [CrossRef
[7] Tian, Y., et al. (2016) On the Perfor-mance of Opportunistic NOMA in Downlink CoMP Networks. IEEE Communications Letters, 20, 998-1001. [Google Scholar] [CrossRef
[8] Tian, Y., Nix, A. and Beach, M. (2017) On the Performance of a Multi-Tier NOMA Strategy in Coordinated Multi-Point Networks. IEEE Communications Letters, 21, 2448-2451. [Google Scholar] [CrossRef
[9] Ali, M.S., Hossain, E. and Kim, D.I. (2018) Coordinated Multipoint Transmission in Downlink Multi-Cell NOMA Systems: Models and Spectral Efficiency Performance. IEEE Wireless Communications, 25, 24-31. [Google Scholar] [CrossRef
[10] Singh, R. (2017) Sub-Channel Assignment and Resource Scheduling for Non-Orthogonal Multiple Access (NOMA) in Downlink Coor-dinated Multi-Point Systems. 20th Conference on Innovations in Clouds, Internet and Networks, Paris, 17-22. [Google Scholar] [CrossRef
[11] Sun, X., et al. (2018) Joint Beamforming and Power Allocation in Downlink NOMA Multiuser MIMO Networks. IEEE Transactions on Wireless Communications, 17, 5367-5381. [Google Scholar] [CrossRef
[12] Wyner, A.D. (1975) The Wire-Tap Channel. The Bell System Technical Journal, 54, 1355-1387. [Google Scholar] [CrossRef
[13] 钟州, 张波, 戚晓慧, 黄开枝. 多天线全双工中继辅助的异构蜂窝网物理层安全性能分析[J]. 通信学报, 2019, 40(5): 24-31.
[14] He, B., Liu, A., Yang, N. and Lau, V.K.N. (2017) On the Design of Secure Non-Orthogonal Multiple Access Systems. IEEE Journal on Selected Areas in Communications, 35, 2196-2206. [Google Scholar] [CrossRef
[15] Chen, J., Yang, L. and Alouini, M. (2018) Physical Layer Se-curity for Cooperative NOMA Systems. IEEE Transactions on Vehicular Technology, 67, 4645-4649. [Google Scholar] [CrossRef
[16] Feng, Y., Yan, S., Liu, C., Yang, Z. and Yang, N. (2019) Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access. IEEE Trans-actions on Information Forensics and Security, 14, 1670-1683. [Google Scholar] [CrossRef
[17] Wang, X., Jia, M., Ho, I.W., Guo, Q. and Lau, F.C.M. (2019) Exploiting Full-Duplex Two-Way Relay Cooperative Non-Orthogonal Multiple Access. IEEE Transactions on Com-munications, 67, 2716-2729. [Google Scholar] [CrossRef