CN111148096A - Physical layer safety optimization power distribution method in 5G NOMA system - Google Patents

Physical layer safety optimization power distribution method in 5G NOMA system Download PDF

Info

Publication number
CN111148096A
CN111148096A CN201911222698.0A CN201911222698A CN111148096A CN 111148096 A CN111148096 A CN 111148096A CN 201911222698 A CN201911222698 A CN 201911222698A CN 111148096 A CN111148096 A CN 111148096A
Authority
CN
China
Prior art keywords
user
power
signal
physical layer
noma
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911222698.0A
Other languages
Chinese (zh)
Other versions
CN111148096B (en
Inventor
张沉思
张哲�
刘玉涛
葛建华
贾凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
CETC 54 Research Institute
Original Assignee
Xidian University
CETC 54 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University, CETC 54 Research Institute filed Critical Xidian University
Priority to CN201911222698.0A priority Critical patent/CN111148096B/en
Publication of CN111148096A publication Critical patent/CN111148096A/en
Application granted granted Critical
Publication of CN111148096B publication Critical patent/CN111148096B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/22Traffic simulation tools or models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/30TPC using constraints in the total amount of available transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the technical field of wireless communication, and discloses a physical layer safety optimization power distribution method in a 5G NOMA system, which is implemented by a base station BS and two user Us1And U2In the downlink communication network, the selection is made for the near-end user U2Demodulate and then transmit to the remote user U1Demodulating to U2More power is distributed to obtain a user terminal U1And U2The demodulation signal-to-noise ratio of (1); to user U through artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser ofU2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Obtaining the eavesdropping signal-to-noise ratio; defining a safe rate of the system; and obtaining a total power threshold value of the system and solving an optimization equation. According to the system constraint condition, an optimized equation is constructed, a threshold value of total power is obtained through solving, and power distribution is selected according to the threshold value.

Description

Physical layer safety optimization power distribution method in 5G NOMA system
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a physical layer safety optimization power distribution method in a 5G NOMA system.
Background
Currently, the closest prior art: with the advent of the fifth generation mobile communication (5G) era, the NOMA technology, which is a core technology thereof, has become a hot trend.
"Physical Layer security for NOMA: requirementss, memits, changes, and recommends." (2019). "proposed in the document that NOMA technology allocates resources in a non-orthogonal manner to support large-scale connections and improve spectrum utilization as compared to the conventional Orthogonal Multiple Access (OMA) technology, there are two types of solutions for present NOMA, respectively power domain NOMA technology (PD-NOMA) and code domain NOMA technology (CD-NOMA).
In the NOMA technology, in order to provide good quality of service (QoS) for users, a base station provides higher transmission power for far-end users with poor channel conditions than near-end users, and a user receiving end demodulates information required by the user by using a Successive Interference Cancellation (SIC) technique, so-called successive interference cancellation, that is, the far-end user directly demodulates a signal allocated to the near-end user as noise, and the near-end user must demodulate the signal required by the far-end user first, then subtract the signal from the received signal, and then demodulate the signal required by the near-end user. Therefore, the near-end user can eavesdrop the information of the far-end user internally, and certain potential safety hazard is formed.
The eavesdropping is classified into three types in the above document, i.e., external eavesdropping, internal eavesdropping, and internal-external hybrid eavesdropping. The above mentioned hidden security danger is one of internal eavesdropping, that is, if the near-end user is an untrusted user, the communication of the far-end user may be eavesdropped maliciously by the near-end user, which results in the security performance of the communication system being degraded. In order to eliminate this safety risk, it is necessary to find a method that enables the system to prevent internal users from eavesdropping while providing users with a good quality of service, and in this respect, many scholars have studied this problem accordingly.
"d.xu, p.ren, q.du, l.sun, and y.wang," Combat innovative dropping by full-duplex technology and signal transformation in non-orthogonal multi-access processing transmission, "in 2017IEEE int.conf.com. (ICC), May 2017, pp.1-6" proposes a method for preventing a near-end user from eavesdropping on a far-end user, which designs a signal transformation method from the perspective of a modulated signal, i.e., mapping the private information of each user into an original signal, and then transforms the original signal using the designed angle transformation method, and converts the original signal of one constellation into a transmission signal of another constellation by angle transformation. By the method, each user can acquire all transmission signals after SIC, but each user can only acquire private information belonging to the user. Briefly, the data of the far-end user is converted to another domain by using a special sequence, so that the near-end user can demodulate the signal of the far-end user through the SIC, but can not decode the information of the far-end user, and the eavesdropping effect is achieved.
In summary, the problems of the prior art are as follows: in the NOMA technology, due to the nature of SIC and the difference of power distribution, the demodulation sequence of a communication system is different, and a near-end user can eavesdrop a far-end user internally, so that certain potential safety hazard is formed; the existing solution is to convert the data of the remote user to another domain to prevent internal eavesdropping, rather than operating purely in the power domain.
The difficulty of solving the technical problems is as follows: there is no important relevant patent and literature about how to optimize the security rate by the method of power distribution without switching the domain, so as to prevent the eavesdropping of the far-end user by the near-end user.
The significance of solving the technical problems is as follows:
the invention improves the traditional power distribution mode, changes the demodulation sequence of user signals by changing the traditional base station transmitting power distribution mode, and achieves the effect of improving the safety rate of the system only by the power distribution method under the condition that the communication system does not switch the domain by additionally adding the artificial interference mode, thereby solving the potential safety hazard of malicious eavesdropping of internal users.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a method for safely optimizing power allocation of a physical layer in a 5G NOMA system.
The invention is realized in such a way that a method for safely and optimally allocating power to a physical layer in a 5G NOMA system comprises the following steps:
in a first step, a base station BS and two user Us are provided1And U2In the downlink communication network of (2), select pairs of U2Performs demodulation and then performs U1Demodulating to U2More power is distributed to obtain a user terminal U1And U2The demodulation signal-to-noise ratio of (1);
second, user U is treated by artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser U2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Obtaining the eavesdropping signal-to-noise ratio;
thirdly, defining the safety rate of the system;
and fourthly, obtaining a total power threshold value of the system and solving an optimization equation.
Further, in the present invention,the first step specifically comprises: in a cell having a base station BS and two user Us1And U2In the downstream communication network of (3), U2For near end users, the channel condition is better, U1For the remote user, the channel condition is poor, and the base station BS sends different information X to the two users at the same time1And X2Wherein X is1For user U1Required information, X2For user U2Information required, let U be assumed2Internally eavesdropping the user;
U1and U2The received signals are respectively
Figure BDA0002301303430000031
Figure BDA0002301303430000032
Wherein P is1And P2Respectively representing base stations BS to information X1And X2Allocated transmission power, hB,1And hB,2From base station BS to user U, respectively1And user U2Channel gain of, n1And n2Respectively representing additive white Gaussian noise of two users, the noise power spectral densities of the additive white Gaussian noise are N0
Further, prevent eavesdropping end U2To U1Eavesdropping, selecting the first pair of U2Demodulating U1Demodulating to U2Distributing more power, user side U1And U2Respectively of demodulation signal-to-noise ratio of
Figure BDA0002301303430000033
And
Figure BDA0002301303430000034
further, the second step specifically includes: to user U through artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser side U1And U2Respectively of demodulation signal-to-noise ratio of
Figure BDA0002301303430000041
And
Figure BDA0002301303430000042
wherein h isJ,1And hJ,2Respectively interference source to user U1And user U2The channel gain of (a);
user U2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Of the eavesdropping signal-to-noise ratio of
Figure BDA0002301303430000043
Further, the third step specifically includes: defining a safe rate for a system
Figure BDA0002301303430000044
Safe rate of speed
Figure BDA0002301303430000045
Greater than zero, and user U1And user U2Is greater than a threshold value, and is set to be gammath1And gammath2And the sum of the transmission powers of the base station BS and the interference source J does not exceed the total power PTConstructing an optimization equation:
Figure BDA0002301303430000046
further, the solving of the optimization equation in the fourth step includes obtaining the total system power PTThere are thresholds:
Figure BDA0002301303430000051
if PT≥PThAnd then:
Figure BDA0002301303430000052
Figure BDA0002301303430000061
Figure BDA0002301303430000062
if PT<PThAnd then:
Figure BDA0002301303430000063
Figure BDA0002301303430000064
Figure BDA0002301303430000065
according to the power distribution mode, the obtained safe rate
Figure BDA0002301303430000066
To a maximum.
Another object of the present invention is to provide an information data processing terminal to which the physical layer security optimized power allocation method in the 5G NOMA system is applied.
Another object of the present invention is to provide a mobile communication system to which the physical layer security optimized power allocation method in the 5G NOMA system is applied.
Another object of the present invention is to provide a wireless communication system to which the physical layer security optimized power allocation method in the 5G NOMA system is applied.
Another object of the present invention is to provide a 5G NOMA system using the method for safely optimizing power allocation of the physical layer in the 5G NOMA system.
In summary, the advantages and positive effects of the invention are: the invention provides a new power distribution scheme on the basis of the traditional power distribution mode, comprehensively considers the safety rate and the service quality of the system, can maximize the safety rate of the system on the premise of certain total power of the base station, and ensures the service quality of users. Firstly, modeling an internal eavesdropping communication network based on a NOMA system, then comprehensively considering the service quality and the physical layer security of users, constructing an optimized power distribution problem on the premise of ensuring that the total power is certain and the data rate of each user is not equal to a specific threshold, and solving the equation to obtain an optimal power distribution method so as to maximize the security rate of the system. The invention considers the service quality of each user, can maximize the safety rate under the condition of limited total power, and ensures that the data rate of each user is not lower than the specified threshold.
The invention improves the safety rate of the user as much as possible by changing the distribution mode of the power and utilizing the artificial interference to interfere the untrusted stealing points under the condition that the service quality of the user can be ensured by the communication system, and compared with other random power distribution, the safety rate is greatly improved. And constructing an optimized equation according to system limiting conditions, obtaining a threshold value of total power by solving, and selecting power distribution according to the threshold value.
Drawings
Fig. 1 is a flowchart of a method for allocating power in a 5G NOMA system according to an embodiment of the present invention.
Fig. 2 is a diagram of a downlink system model of a three-node NOMA system provided by an embodiment of the present invention.
Fig. 3 is a diagram of a downlink system simulation for a three-node NOMA system provided by an embodiment of the present invention.
Fig. 4 is a system safety rate comparison graph of power allocation in two different ways for a communication system provided by an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a method for safely optimizing power allocation in a physical layer of a 5G NOMA system, and the present invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the method for safely optimizing power allocation of physical layer in 5 gnama system according to the embodiment of the present invention includes the following steps:
s101: in a cell having a base station BS and two user Us1And U2In the downlink communication network of (2), select pairs of U2Performs demodulation and then performs U1Perform demodulation, i.e. to U2More power is distributed to obtain a user terminal U1And U2The demodulation signal-to-noise ratio of (1);
s102: to user U through artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser U2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Obtaining the eavesdropping signal-to-noise ratio;
s103: defining a safe rate of the system;
s104: and obtaining a total power threshold value of the system and solving an optimization equation.
The technical solution of the present invention is further described below with reference to the accompanying drawings.
Embodiments of the present invention include, but are not limited to, the following two-user embodiments, and also include the problem of power allocation for multiple users. A three-node NOMA system downlink system model is first introduced. The model comprises a base station BS and two target users U1And U2Base station BS to user U1And user U2Respectively, the channel gains of hB,1And hB,2Because of the user U2Compared with user U1Is closer to the base station BS, so the user U2Has better channel condition than that of user U1I.e. hB,2>hB,1The base station BS sends different information X to two users simultaneously1And X2,X1And X2Are respectively a user U1And user U2Information required, let U be assumed2For internal eavesdroppingA trusted user; base station BS gives information X1And X2Allocated transmission power of P1And P2In contrast to the conventional power allocation, the present invention assigns P2>P1Assuming that the average noise at the receiving end is zero and the noise power spectral density is N0Is n, is set as1And n2
The invention is carried out by two steps: establishing a system power distribution model and simulating the model.
1. Model establishment, after the base station BS transmits signals, U1And U2The received signals are respectively
Figure BDA0002301303430000091
At this time, the user end U1And U2Respectively has a signal-to-noise ratio of
Figure BDA0002301303430000092
And
Figure BDA0002301303430000093
the invention aims to prevent the user U2It is necessary to perform internal eavesdropping and add external interference to the user end, and the user U is subjected to artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJAt this time, the user terminal U1And U2Respectively has a signal-to-noise ratio of
Figure BDA0002301303430000094
And
Figure BDA0002301303430000095
wherein h isJ,1And hJ,2Respectively interference source to user U1And user U2The channel gain of (1).
User U2If the user U is to be eavesdropped1If the user U needs to demodulate its own signal, then the user U is demodulated1Is a user U2With a eavesdropping signal-to-noise ratio of
Figure BDA0002301303430000096
Defining a safe rate for a system
Figure BDA0002301303430000097
The invention aims to distribute the power of the system, so that the communication system can prevent the internal untrusted user from eavesdropping on the basis of meeting the user requirements, and the safety rate of the system is improved as much as possible.
In order to meet the service requirements of users, the user U of the invention1And user U2Demodulation signal-to-noise ratio of
Figure BDA0002301303430000098
And
Figure BDA0002301303430000099
is greater than a certain threshold value and is set as gammath1And gammath2(ii) a In order to make the safe rate of the system greater than zero, the system needs to satisfy some condition, namely (| h)J,2|2|hB,1|2-|hJ,1|2|hB,2|2) > 0 and hJ,2>hJ,1(ii) a In terms of power allocation, the base station transmitting power and the interference source J need to ensure the minimum allocated power to ensure the normal operation of the system, and are set as PJ,LB、P1,LBAnd P2,LBNamely:
Figure BDA0002301303430000101
Figure BDA0002301303430000102
Figure BDA0002301303430000103
total emission total power P of power setting systemTGreater than the sum of the minimum allocated transmission powers of base station BS and interference source J, i.e. PT>PJ,LB+P1,LB+P2,LB=PT,LBAnd combining the conditions to construct an optimal equation:
Figure BDA0002301303430000104
solving the nonlinear optimization equation by using a Karush-Kuhn-Tucker (KKT) condition; the total power P of the system can be obtainedTThere are thresholds:
Figure BDA0002301303430000105
if PT≥PThAnd then:
Figure BDA0002301303430000111
Figure BDA0002301303430000112
Figure BDA0002301303430000121
if PT<PThAnd then:
Figure BDA0002301303430000122
Figure BDA0002301303430000123
Figure BDA0002301303430000124
2. and (3) simulation of a system model:
as shown in fig. 3, in order to facilitate the simulation of the system, the system normalizes the relative positions of the nodes, and makes a half around the base station BSUnit circle with radius r of 1, where near end user U2At radius r1Random movement in the circle < 0.5, and remote user U1At a radius of 0.5 < r2And (3) randomly moving in the ring of less than 1, and randomly moving the interference source J in the whole unit circle, and performing solution simulation of the system to obtain the safety rate of each condition.
The specific experiment simulation: taking the distance between an interference source J and a base station as a reference system, performing circulation every 0.05 distance, and simulating ten thousand times in each circulation; the angle of the interference source J is randomly generated in each simulation, the radius and the angle of two users are randomly changed in a specified range, each parameter of an experiment is determined according to the coordinate positions of three nodes, power distribution is performed in each simulation according to the power distribution mode of the scheme, the corresponding system safety rate is solved, in order to prove the superiority of the scheme, the same experiment simulation is performed by using the power random distribution method, the corresponding system safety rate is solved, and the corresponding system safety rate is compared with the experiment data of the scheme to be plotted.
Fig. 4 is a diagram showing a comparison of system security rates of a system simulation experiment, where one line is a system security rate diagram obtained by simulation according to the power distribution scheme, and the other line is a system security rate diagram obtained by a power random distribution method, and the two system security rate curves are compared, where the system security rate of the present solution is entirely higher than the system security rate obtained by the power random distribution method, and the system security rate of the present solution is highest at a normalized distance of 0.3 from an interference source J to a base station BS, and at this time, there is a gain of about 20dB compared with the system security rate obtained by the power random distribution method; the system safety rate reaches the lowest at the position farthest away, however, compared with a random distribution mode, the system safety rate also has gain of nearly 12.6dB, comprehensive comparison of the two curves can be obtained, and the power distribution method of the scheme is far superior to the power random distribution method.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. A method for safely and optimally allocating power to a physical layer in a 5G NOMA system is characterized by comprising the following steps of:
in a first step, a base station BS and two user Us are provided1And U2In the downlink communication network of (2), select pairs of U2Performs demodulation and then performs U1Demodulating to U2More power is distributed to obtain a user terminal U1And U2The demodulation signal-to-noise ratio of (1);
second, user U is treated by artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser U2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Obtaining the eavesdropping signal-to-noise ratio;
thirdly, defining the safety rate of the system;
and fourthly, obtaining a total power threshold value of the system and solving an optimization equation.
2. The method for optimized power allocation for physical layer security in a 5G NOMA system as claimed in claim 1, wherein said first step comprises: in a cell having a base station BS and two user Us1And U2In the downstream communication network of (3), U2For near end users, the channel condition is better, U1For the remote user, the channel condition is poor, and the base station BS sends different information X to the two users at the same time1And X2Wherein X is1For user U1Required information, X2For user U2Information required, let U be assumed2Internally eavesdropping the user;
U1and U2The received signals are respectively
Figure FDA0002301303420000011
Figure FDA0002301303420000012
Wherein P is1And P2Respectively representing base stations BS to information X1And X2Allocated transmission power, hB,1And hB,2From base station BS to user U, respectively1And user U2Channel gain of, n1And n2Respectively representing additive white Gaussian noise of two users, the noise power spectral densities of the additive white Gaussian noise are N0
3. The method for physical layer security optimized power allocation in a 5GNOMA system as in claim 2, wherein U-eavesdropping prevention is performed2To U1Eavesdropping, selecting the first pair of U2Performs demodulation and then performs U1Demodulating to U2Distributing more power, user side U1And U2Respectively of demodulation signal-to-noise ratio of
Figure FDA0002301303420000013
And
Figure FDA0002301303420000014
4. the method for optimized power allocation for physical layer security in a 5G NOMA system as claimed in claim 1, wherein said second step comprises: to user U through artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser side U1And U2Respectively of demodulation signal-to-noise ratio of
Figure FDA0002301303420000021
And
Figure FDA0002301303420000022
wherein h isJ,1And hJ,2Respectively interference source to user U1And user U2The channel gain of (a);
user U2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Of the eavesdropping signal-to-noise ratio of
Figure FDA0002301303420000023
5. The method for optimized power allocation for physical layer security in a 5G NOMA system as claimed in claim 1, wherein said third step comprises: defining a safe rate for a system
Figure FDA0002301303420000024
Safe rate of speed
Figure FDA0002301303420000025
Greater than zero, and user U1And user U2Is greater than a threshold value, and is set to be gammath1And gammath2And the sum of the transmission powers of the base station BS and the interference source J does not exceed the total power PTConstructing an optimization equation:
Figure FDA0002301303420000026
Figure FDA0002301303420000027
6. the method of claim 1, wherein the fourth step of solving the optimization equation includes obtaining total system power PTThere are thresholds:
Figure FDA0002301303420000031
if PT≥PThAnd then:
Figure FDA0002301303420000032
Figure FDA0002301303420000041
Figure FDA0002301303420000042
if PT<PThAnd then:
Figure FDA0002301303420000043
Figure FDA0002301303420000044
Figure FDA0002301303420000045
according to the power distribution mode, the obtained safe rate
Figure FDA0002301303420000046
To a maximum.
7. An information data processing terminal to which the method for safely optimizing power allocation in physical layer in a 5G NOMA system according to any one of claims 1 to 6 is applied.
8. A mobile communication system using the method for safely optimizing power allocation in physical layer in 5G NOMA system as claimed in any one of claims 1 to 6.
9. A wireless communication system using the method for safely optimizing power allocation in physical layer in 5G NOMA system as claimed in any one of claims 1 to 6.
10. A5G NOMA system applying the method for safely optimizing power distribution in the physical layer of the 5G NOMA system as claimed in any one of claims 1 to 6.
CN201911222698.0A 2019-12-03 2019-12-03 Physical layer safety optimization power distribution method in 5G NOMA system Active CN111148096B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911222698.0A CN111148096B (en) 2019-12-03 2019-12-03 Physical layer safety optimization power distribution method in 5G NOMA system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911222698.0A CN111148096B (en) 2019-12-03 2019-12-03 Physical layer safety optimization power distribution method in 5G NOMA system

Publications (2)

Publication Number Publication Date
CN111148096A true CN111148096A (en) 2020-05-12
CN111148096B CN111148096B (en) 2022-03-25

Family

ID=70517525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911222698.0A Active CN111148096B (en) 2019-12-03 2019-12-03 Physical layer safety optimization power distribution method in 5G NOMA system

Country Status (1)

Country Link
CN (1) CN111148096B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112260796A (en) * 2020-10-21 2021-01-22 三维通信股份有限公司 Method and device for controlling interference signal emission
CN112367106A (en) * 2020-10-10 2021-02-12 西安电子科技大学 6G RIS-assisted optimization method for physical layer safety combination in NOMA system
CN113098652A (en) * 2021-04-01 2021-07-09 北京信息科技大学 Design method of intelligent reflector assisted power domain NOMA (non-orthogonal multiple access) safety communication system
CN113438651A (en) * 2021-06-17 2021-09-24 河南理工大学 NOMA-based physical layer authentication method of environment backscatter communication system
CN113572500A (en) * 2021-06-25 2021-10-29 西安电子科技大学 NOMA multi-user detection algorithm of hybrid greedy and tabu search strategy
CN114244587A (en) * 2021-12-02 2022-03-25 西安电子科技大学 NOMA multi-user secure computing unloading method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107995615A (en) * 2017-11-15 2018-05-04 中国人民解放军信息工程大学 Heterogeneous network NOMA safe transmission method of physical layer
CN109996264A (en) * 2019-03-27 2019-07-09 西北工业大学深圳研究院 The power distribution method of safe energy efficiency is maximized in non-orthogonal multiple system
CN110022557A (en) * 2019-03-22 2019-07-16 西安交通大学 A kind of physical layer active sniffing method towards non-orthogonal multiple access system
CN110213822A (en) * 2019-04-26 2019-09-06 浙江工业大学 A kind of non-orthogonal multiple access system downlink linear search formula power distribution optimization method based on data safety

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107995615A (en) * 2017-11-15 2018-05-04 中国人民解放军信息工程大学 Heterogeneous network NOMA safe transmission method of physical layer
CN110022557A (en) * 2019-03-22 2019-07-16 西安交通大学 A kind of physical layer active sniffing method towards non-orthogonal multiple access system
CN109996264A (en) * 2019-03-27 2019-07-09 西北工业大学深圳研究院 The power distribution method of safe energy efficiency is maximized in non-orthogonal multiple system
CN110213822A (en) * 2019-04-26 2019-09-06 浙江工业大学 A kind of non-orthogonal multiple access system downlink linear search formula power distribution optimization method based on data safety

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GERARDO GOMEZ等: "Physical Layer Security in Uplink NOMA Multi-Antenna Systems With Randomly Distributed Eavesdroppers", 《IEEE》 *
王钢等: "无线网络中的功率域非正交多址接人技术", 《无线通信技术》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112367106A (en) * 2020-10-10 2021-02-12 西安电子科技大学 6G RIS-assisted optimization method for physical layer safety combination in NOMA system
CN112260796A (en) * 2020-10-21 2021-01-22 三维通信股份有限公司 Method and device for controlling interference signal emission
CN113098652A (en) * 2021-04-01 2021-07-09 北京信息科技大学 Design method of intelligent reflector assisted power domain NOMA (non-orthogonal multiple access) safety communication system
CN113438651A (en) * 2021-06-17 2021-09-24 河南理工大学 NOMA-based physical layer authentication method of environment backscatter communication system
CN113438651B (en) * 2021-06-17 2022-10-11 河南理工大学 NOMA-based physical layer authentication method of environment backscatter communication system
CN113572500A (en) * 2021-06-25 2021-10-29 西安电子科技大学 NOMA multi-user detection algorithm of hybrid greedy and tabu search strategy
CN113572500B (en) * 2021-06-25 2022-09-02 西安电子科技大学 NOMA multi-user detection algorithm of hybrid greedy and tabu search strategy
CN114244587A (en) * 2021-12-02 2022-03-25 西安电子科技大学 NOMA multi-user secure computing unloading method and system

Also Published As

Publication number Publication date
CN111148096B (en) 2022-03-25

Similar Documents

Publication Publication Date Title
CN111148096B (en) Physical layer safety optimization power distribution method in 5G NOMA system
Bansal et al. Subcarrier and power allocation for OFDMA-based cognitive radio systems with joint overlay and underlay spectrum access mechanism
Ruby et al. Enhanced uplink resource allocation in non-orthogonal multiple access systems
AU2020100505A4 (en) Physical Layer Security Method Applicable To Non-Orthogonal Multiple Access System
Khan et al. Performance analysis of cloud radio access networks with distributed multiple antenna remote radio heads
Gardellin et al. Self-coexistence in cellular cognitive radio networks based on the IEEE 802.22 standard
Sultana et al. Efficient resource allocation in SCMA-enabled device-to-device communication for 5G networks
Yu et al. Joint user scheduling and channel allocation for cellular networks with full duplex base stations
Smiljkovikj et al. Efficiency analysis of downlink and uplink decoupling in heterogeneous networks
Tehrani et al. Resource allocation in OFDMA networks with half-duplex and imperfect full-duplex users
CN109327895B (en) NOMA and CR network-based power distribution method
Ho et al. Cooperative non-orthogonal multiple access with physical layer network coding
Yassin et al. Cooperative resource management and power allocation for multiuser OFDMA networks
Hamid et al. An Optimized Algorithm for Resource Allocation for D2D in Heterogeneous Networks.
Song et al. Performance analysis of a low-complexity nonorthogonal multiple access scheme in visible light communication downlinks using pulse modulations
CN110062399B (en) Cognitive heterogeneous cellular network spectrum allocation method based on game theory
Hendraningrat et al. Virtual user pairing based non‐orthogonal multiple access in downlink coordinated multipoint transmissions
CN104105100A (en) Downlink interference elimination method and system based on pseudo random sub-channel selection strategy
CN107148078B (en) User access control method and device for hybrid full-duplex and half-duplex network
Rallis et al. Design of MAC-layer Protocols for Distributed NOMA-based VLC Networks
Khan et al. Non-orthogonal multiple access: Basic interference management technique
A. Alkhazzar et al. Power allocation with fairness for non‐orthogonal multiple access systems
Chung Analysis of achievable data rate under BPSK modulation: CIS NOMA perspective
Huang et al. Performance of subcarrier allocation of D2D multicasting for wireless communication systems
Li et al. An proportional fair resource allocation in OFDM-based cognitive radio networks under imperfect channel-state information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant