Secure Communications for Cooperative NOMA Networks with Imperfect CSI

被引:0
|
作者
Chen Y. [1 ]
Zhang Z.-P. [1 ]
Li B.-R. [1 ]
机构
[1] National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu
关键词
Imperfect channel state information; Non-orthogonal multiple access; Power allocation; Secrecy outage probability; Secrecy rate;
D O I
10.12178/1001-0548.2020066
中图分类号
学科分类号
摘要
This paper studied secure transmission in cooperative non-orthogonal multiple access (NOMA) networks, where one legitimate user with high-level security requirement (LU1) is overhead by multiple non-colluding eavesdroppers (Eves), and another normal user (LU2) is served by the source (Alice) simultaneously. Aiming to improve the secrecy performance, a cooperative jammer (Charlie) is employed to confound the Eves. In this more practical communication scenario, take both secrecy outage restriction of LU1 and the desired quality of service (QoS) demand of LU2 into consideration, the paper propose an adaptive power allocation strategy for maximizing secrecy rate under imperfect channel state information (CSI). Numerical results are provided to verify the effectiveness of the proposed scheme and show that the system security would be seriously degenerated with channel uncertainty. © 2020, Editorial Board of Journal of the University of Electronic Science and Technology of China. All right reserved.
引用
收藏
页码:674 / 679
页数:5
相关论文
共 15 条
  • [1] DAI Ling-long, WANG Bai-chai, YUAN Yi-fei, Et al., Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends, IEEE Communications Magazine, 53, 9, pp. 74-81, (2015)
  • [2] DING Zhi-guo, LEI Xian-fu, KARAGIANNIDIS G K, Et al., A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends, IEEE Journal on Selected Areas in Communications, 35, 10, pp. 2181-2195, (2017)
  • [3] DING Zhi-guo, PENG Mu-gen, POOR H V, Cooperative non-orthogonal multiple access in 5G systems, IEEE Communications Letters, 19, 8, pp. 1462-1465, (2015)
  • [4] CHEN Jian-chao, YANG Liang, ALOUINI M S, Physical layer security for cooperative NOMA systems, IEEE Transactions on Vehicular Technology, 67, 5, pp. 4645-4649, (2018)
  • [5] YU Chao, KO H L, PENG Xin, Et al., Jammer-aided secure communications for cooperative NOMA systems, IEEE Communications Letters, 23, 11, pp. 1935-1939, (2019)
  • [6] CAO Yang, ZHAO Nao, PAN Gao-feng, Et al., Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay, IEEE Transactions on Communications, 67, 8, pp. 5574-5587, (2019)
  • [7] ARZYKULOV S, TSIFTSIS T A, NAURYZBAYEV G, Et al., Outage performance of cooperative underlay CR-NOMA with imperfect CSI, IEEE Communication Letters, 23, 1, pp. 176-179, (2019)
  • [8] SU Bin-bin, NI Qiang, YU Wen-juan, Robust transmit beamforming for SWIPT-enabled cooperative NOMA with channel uncertainties, IEEE Transactions on Communications, 67, 6, pp. 4381-4392, (2019)
  • [9] YUAN Yi, XU Peng, YANG Zheng, Et al., Joint robust beamforming and power-splitting ratio design in SWIPT-based cooperative NOMA systems with CSI uncertainty, IEEE Transactions on Vehicular Technology, 68, 3, pp. 2386-2400, (2019)
  • [10] VO V N, SOIN C, TRAN H, Et al., On security and throughput for energy harvesting untrusted relays in IoT systems using NOMA, IEEE Access, 7, pp. 149341-149354, (2019)