CN111148096A - Physical layer safety optimization power distribution method in 5G NOMA system - Google Patents
Physical layer safety optimization power distribution method in 5G NOMA system Download PDFInfo
- Publication number
- CN111148096A CN111148096A CN201911222698.0A CN201911222698A CN111148096A CN 111148096 A CN111148096 A CN 111148096A CN 201911222698 A CN201911222698 A CN 201911222698A CN 111148096 A CN111148096 A CN 111148096A
- Authority
- CN
- China
- Prior art keywords
- user
- power
- signal
- physical layer
- noma
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/22—Traffic simulation tools or models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/30—TPC using constraints in the total amount of available transmission power
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0473—Wireless resource allocation based on the type of the allocated resource the resource being transmission power
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to the technical field of wireless communication, and discloses a physical layer safety optimization power distribution method in a 5G NOMA system, which is implemented by a base station BS and two user Us1And U2In the downlink communication network, the selection is made for the near-end user U2Demodulate and then transmit to the remote user U1Demodulating to U2More power is distributed to obtain a user terminal U1And U2The demodulation signal-to-noise ratio of (1); to user U through artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser ofU2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Obtaining the eavesdropping signal-to-noise ratio; defining a safe rate of the system; and obtaining a total power threshold value of the system and solving an optimization equation. According to the system constraint condition, an optimized equation is constructed, a threshold value of total power is obtained through solving, and power distribution is selected according to the threshold value.
Description
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a physical layer safety optimization power distribution method in a 5G NOMA system.
Background
Currently, the closest prior art: with the advent of the fifth generation mobile communication (5G) era, the NOMA technology, which is a core technology thereof, has become a hot trend.
"Physical Layer security for NOMA: requirementss, memits, changes, and recommends." (2019). "proposed in the document that NOMA technology allocates resources in a non-orthogonal manner to support large-scale connections and improve spectrum utilization as compared to the conventional Orthogonal Multiple Access (OMA) technology, there are two types of solutions for present NOMA, respectively power domain NOMA technology (PD-NOMA) and code domain NOMA technology (CD-NOMA).
In the NOMA technology, in order to provide good quality of service (QoS) for users, a base station provides higher transmission power for far-end users with poor channel conditions than near-end users, and a user receiving end demodulates information required by the user by using a Successive Interference Cancellation (SIC) technique, so-called successive interference cancellation, that is, the far-end user directly demodulates a signal allocated to the near-end user as noise, and the near-end user must demodulate the signal required by the far-end user first, then subtract the signal from the received signal, and then demodulate the signal required by the near-end user. Therefore, the near-end user can eavesdrop the information of the far-end user internally, and certain potential safety hazard is formed.
The eavesdropping is classified into three types in the above document, i.e., external eavesdropping, internal eavesdropping, and internal-external hybrid eavesdropping. The above mentioned hidden security danger is one of internal eavesdropping, that is, if the near-end user is an untrusted user, the communication of the far-end user may be eavesdropped maliciously by the near-end user, which results in the security performance of the communication system being degraded. In order to eliminate this safety risk, it is necessary to find a method that enables the system to prevent internal users from eavesdropping while providing users with a good quality of service, and in this respect, many scholars have studied this problem accordingly.
"d.xu, p.ren, q.du, l.sun, and y.wang," Combat innovative dropping by full-duplex technology and signal transformation in non-orthogonal multi-access processing transmission, "in 2017IEEE int.conf.com. (ICC), May 2017, pp.1-6" proposes a method for preventing a near-end user from eavesdropping on a far-end user, which designs a signal transformation method from the perspective of a modulated signal, i.e., mapping the private information of each user into an original signal, and then transforms the original signal using the designed angle transformation method, and converts the original signal of one constellation into a transmission signal of another constellation by angle transformation. By the method, each user can acquire all transmission signals after SIC, but each user can only acquire private information belonging to the user. Briefly, the data of the far-end user is converted to another domain by using a special sequence, so that the near-end user can demodulate the signal of the far-end user through the SIC, but can not decode the information of the far-end user, and the eavesdropping effect is achieved.
In summary, the problems of the prior art are as follows: in the NOMA technology, due to the nature of SIC and the difference of power distribution, the demodulation sequence of a communication system is different, and a near-end user can eavesdrop a far-end user internally, so that certain potential safety hazard is formed; the existing solution is to convert the data of the remote user to another domain to prevent internal eavesdropping, rather than operating purely in the power domain.
The difficulty of solving the technical problems is as follows: there is no important relevant patent and literature about how to optimize the security rate by the method of power distribution without switching the domain, so as to prevent the eavesdropping of the far-end user by the near-end user.
The significance of solving the technical problems is as follows:
the invention improves the traditional power distribution mode, changes the demodulation sequence of user signals by changing the traditional base station transmitting power distribution mode, and achieves the effect of improving the safety rate of the system only by the power distribution method under the condition that the communication system does not switch the domain by additionally adding the artificial interference mode, thereby solving the potential safety hazard of malicious eavesdropping of internal users.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a method for safely optimizing power allocation of a physical layer in a 5G NOMA system.
The invention is realized in such a way that a method for safely and optimally allocating power to a physical layer in a 5G NOMA system comprises the following steps:
in a first step, a base station BS and two user Us are provided1And U2In the downlink communication network of (2), select pairs of U2Performs demodulation and then performs U1Demodulating to U2More power is distributed to obtain a user terminal U1And U2The demodulation signal-to-noise ratio of (1);
second, user U is treated by artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser U2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Obtaining the eavesdropping signal-to-noise ratio;
thirdly, defining the safety rate of the system;
and fourthly, obtaining a total power threshold value of the system and solving an optimization equation.
Further, in the present invention,the first step specifically comprises: in a cell having a base station BS and two user Us1And U2In the downstream communication network of (3), U2For near end users, the channel condition is better, U1For the remote user, the channel condition is poor, and the base station BS sends different information X to the two users at the same time1And X2Wherein X is1For user U1Required information, X2For user U2Information required, let U be assumed2Internally eavesdropping the user;
U1and U2The received signals are respectively Wherein P is1And P2Respectively representing base stations BS to information X1And X2Allocated transmission power, hB,1And hB,2From base station BS to user U, respectively1And user U2Channel gain of, n1And n2Respectively representing additive white Gaussian noise of two users, the noise power spectral densities of the additive white Gaussian noise are N0。
Further, prevent eavesdropping end U2To U1Eavesdropping, selecting the first pair of U2Demodulating U1Demodulating to U2Distributing more power, user side U1And U2Respectively of demodulation signal-to-noise ratio ofAnd
further, the second step specifically includes: to user U through artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser side U1And U2Respectively of demodulation signal-to-noise ratio ofAndwherein h isJ,1And hJ,2Respectively interference source to user U1And user U2The channel gain of (a);
user U2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Of the eavesdropping signal-to-noise ratio of
Further, the third step specifically includes: defining a safe rate for a systemSafe rate of speedGreater than zero, and user U1And user U2Is greater than a threshold value, and is set to be gammath1And gammath2And the sum of the transmission powers of the base station BS and the interference source J does not exceed the total power PTConstructing an optimization equation:
further, the solving of the optimization equation in the fourth step includes obtaining the total system power PTThere are thresholds:
if PT≥PThAnd then:
if PT<PThAnd then:
Another object of the present invention is to provide an information data processing terminal to which the physical layer security optimized power allocation method in the 5G NOMA system is applied.
Another object of the present invention is to provide a mobile communication system to which the physical layer security optimized power allocation method in the 5G NOMA system is applied.
Another object of the present invention is to provide a wireless communication system to which the physical layer security optimized power allocation method in the 5G NOMA system is applied.
Another object of the present invention is to provide a 5G NOMA system using the method for safely optimizing power allocation of the physical layer in the 5G NOMA system.
In summary, the advantages and positive effects of the invention are: the invention provides a new power distribution scheme on the basis of the traditional power distribution mode, comprehensively considers the safety rate and the service quality of the system, can maximize the safety rate of the system on the premise of certain total power of the base station, and ensures the service quality of users. Firstly, modeling an internal eavesdropping communication network based on a NOMA system, then comprehensively considering the service quality and the physical layer security of users, constructing an optimized power distribution problem on the premise of ensuring that the total power is certain and the data rate of each user is not equal to a specific threshold, and solving the equation to obtain an optimal power distribution method so as to maximize the security rate of the system. The invention considers the service quality of each user, can maximize the safety rate under the condition of limited total power, and ensures that the data rate of each user is not lower than the specified threshold.
The invention improves the safety rate of the user as much as possible by changing the distribution mode of the power and utilizing the artificial interference to interfere the untrusted stealing points under the condition that the service quality of the user can be ensured by the communication system, and compared with other random power distribution, the safety rate is greatly improved. And constructing an optimized equation according to system limiting conditions, obtaining a threshold value of total power by solving, and selecting power distribution according to the threshold value.
Drawings
Fig. 1 is a flowchart of a method for allocating power in a 5G NOMA system according to an embodiment of the present invention.
Fig. 2 is a diagram of a downlink system model of a three-node NOMA system provided by an embodiment of the present invention.
Fig. 3 is a diagram of a downlink system simulation for a three-node NOMA system provided by an embodiment of the present invention.
Fig. 4 is a system safety rate comparison graph of power allocation in two different ways for a communication system provided by an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a method for safely optimizing power allocation in a physical layer of a 5G NOMA system, and the present invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the method for safely optimizing power allocation of physical layer in 5 gnama system according to the embodiment of the present invention includes the following steps:
s101: in a cell having a base station BS and two user Us1And U2In the downlink communication network of (2), select pairs of U2Performs demodulation and then performs U1Perform demodulation, i.e. to U2More power is distributed to obtain a user terminal U1And U2The demodulation signal-to-noise ratio of (1);
s102: to user U through artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser U2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Obtaining the eavesdropping signal-to-noise ratio;
s103: defining a safe rate of the system;
s104: and obtaining a total power threshold value of the system and solving an optimization equation.
The technical solution of the present invention is further described below with reference to the accompanying drawings.
Embodiments of the present invention include, but are not limited to, the following two-user embodiments, and also include the problem of power allocation for multiple users. A three-node NOMA system downlink system model is first introduced. The model comprises a base station BS and two target users U1And U2Base station BS to user U1And user U2Respectively, the channel gains of hB,1And hB,2Because of the user U2Compared with user U1Is closer to the base station BS, so the user U2Has better channel condition than that of user U1I.e. hB,2>hB,1The base station BS sends different information X to two users simultaneously1And X2,X1And X2Are respectively a user U1And user U2Information required, let U be assumed2For internal eavesdroppingA trusted user; base station BS gives information X1And X2Allocated transmission power of P1And P2In contrast to the conventional power allocation, the present invention assigns P2>P1Assuming that the average noise at the receiving end is zero and the noise power spectral density is N0Is n, is set as1And n2。
The invention is carried out by two steps: establishing a system power distribution model and simulating the model.
1. Model establishment, after the base station BS transmits signals, U1And U2The received signals are respectivelyAt this time, the user end U1And U2Respectively has a signal-to-noise ratio ofAnd
the invention aims to prevent the user U2It is necessary to perform internal eavesdropping and add external interference to the user end, and the user U is subjected to artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJAt this time, the user terminal U1And U2Respectively has a signal-to-noise ratio ofAndwherein h isJ,1And hJ,2Respectively interference source to user U1And user U2The channel gain of (1).
User U2If the user U is to be eavesdropped1If the user U needs to demodulate its own signal, then the user U is demodulated1Is a user U2With a eavesdropping signal-to-noise ratio ofDefining a safe rate for a system
The invention aims to distribute the power of the system, so that the communication system can prevent the internal untrusted user from eavesdropping on the basis of meeting the user requirements, and the safety rate of the system is improved as much as possible.
In order to meet the service requirements of users, the user U of the invention1And user U2Demodulation signal-to-noise ratio ofAndis greater than a certain threshold value and is set as gammath1And gammath2(ii) a In order to make the safe rate of the system greater than zero, the system needs to satisfy some condition, namely (| h)J,2|2|hB,1|2-|hJ,1|2|hB,2|2) > 0 and hJ,2>hJ,1(ii) a In terms of power allocation, the base station transmitting power and the interference source J need to ensure the minimum allocated power to ensure the normal operation of the system, and are set as PJ,LB、P1,LBAnd P2,LBNamely:
total emission total power P of power setting systemTGreater than the sum of the minimum allocated transmission powers of base station BS and interference source J, i.e. PT>PJ,LB+P1,LB+P2,LB=PT,LBAnd combining the conditions to construct an optimal equation:
solving the nonlinear optimization equation by using a Karush-Kuhn-Tucker (KKT) condition; the total power P of the system can be obtainedTThere are thresholds:
if PT≥PThAnd then:
if PT<PThAnd then:
2. and (3) simulation of a system model:
as shown in fig. 3, in order to facilitate the simulation of the system, the system normalizes the relative positions of the nodes, and makes a half around the base station BSUnit circle with radius r of 1, where near end user U2At radius r1Random movement in the circle < 0.5, and remote user U1At a radius of 0.5 < r2And (3) randomly moving in the ring of less than 1, and randomly moving the interference source J in the whole unit circle, and performing solution simulation of the system to obtain the safety rate of each condition.
The specific experiment simulation: taking the distance between an interference source J and a base station as a reference system, performing circulation every 0.05 distance, and simulating ten thousand times in each circulation; the angle of the interference source J is randomly generated in each simulation, the radius and the angle of two users are randomly changed in a specified range, each parameter of an experiment is determined according to the coordinate positions of three nodes, power distribution is performed in each simulation according to the power distribution mode of the scheme, the corresponding system safety rate is solved, in order to prove the superiority of the scheme, the same experiment simulation is performed by using the power random distribution method, the corresponding system safety rate is solved, and the corresponding system safety rate is compared with the experiment data of the scheme to be plotted.
Fig. 4 is a diagram showing a comparison of system security rates of a system simulation experiment, where one line is a system security rate diagram obtained by simulation according to the power distribution scheme, and the other line is a system security rate diagram obtained by a power random distribution method, and the two system security rate curves are compared, where the system security rate of the present solution is entirely higher than the system security rate obtained by the power random distribution method, and the system security rate of the present solution is highest at a normalized distance of 0.3 from an interference source J to a base station BS, and at this time, there is a gain of about 20dB compared with the system security rate obtained by the power random distribution method; the system safety rate reaches the lowest at the position farthest away, however, compared with a random distribution mode, the system safety rate also has gain of nearly 12.6dB, comprehensive comparison of the two curves can be obtained, and the power distribution method of the scheme is far superior to the power random distribution method.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
Claims (10)
1. A method for safely and optimally allocating power to a physical layer in a 5G NOMA system is characterized by comprising the following steps of:
in a first step, a base station BS and two user Us are provided1And U2In the downlink communication network of (2), select pairs of U2Performs demodulation and then performs U1Demodulating to U2More power is distributed to obtain a user terminal U1And U2The demodulation signal-to-noise ratio of (1);
second, user U is treated by artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser U2If the user U is to be eavesdropped1Then demodulates its own signal and demodulates user U1Obtaining the eavesdropping signal-to-noise ratio;
thirdly, defining the safety rate of the system;
and fourthly, obtaining a total power threshold value of the system and solving an optimization equation.
2. The method for optimized power allocation for physical layer security in a 5G NOMA system as claimed in claim 1, wherein said first step comprises: in a cell having a base station BS and two user Us1And U2In the downstream communication network of (3), U2For near end users, the channel condition is better, U1For the remote user, the channel condition is poor, and the base station BS sends different information X to the two users at the same time1And X2Wherein X is1For user U1Required information, X2For user U2Information required, let U be assumed2Internally eavesdropping the user;
U1and U2The received signals are respectively Wherein P is1And P2Respectively representing base stations BS to information X1And X2Allocated transmission power, hB,1And hB,2From base station BS to user U, respectively1And user U2Channel gain of, n1And n2Respectively representing additive white Gaussian noise of two users, the noise power spectral densities of the additive white Gaussian noise are N0。
3. The method for physical layer security optimized power allocation in a 5GNOMA system as in claim 2, wherein U-eavesdropping prevention is performed2To U1Eavesdropping, selecting the first pair of U2Performs demodulation and then performs U1Demodulating to U2Distributing more power, user side U1And U2Respectively of demodulation signal-to-noise ratio ofAnd
4. the method for optimized power allocation for physical layer security in a 5G NOMA system as claimed in claim 1, wherein said second step comprises: to user U through artificial interference source J1And U2Transmitting an artificial interference signal with a transmission power PJUser side U1And U2Respectively of demodulation signal-to-noise ratio ofAndwherein h isJ,1And hJ,2Respectively interference source to user U1And user U2The channel gain of (a);
5. The method for optimized power allocation for physical layer security in a 5G NOMA system as claimed in claim 1, wherein said third step comprises: defining a safe rate for a systemSafe rate of speedGreater than zero, and user U1And user U2Is greater than a threshold value, and is set to be gammath1And gammath2And the sum of the transmission powers of the base station BS and the interference source J does not exceed the total power PTConstructing an optimization equation:
7. An information data processing terminal to which the method for safely optimizing power allocation in physical layer in a 5G NOMA system according to any one of claims 1 to 6 is applied.
8. A mobile communication system using the method for safely optimizing power allocation in physical layer in 5G NOMA system as claimed in any one of claims 1 to 6.
9. A wireless communication system using the method for safely optimizing power allocation in physical layer in 5G NOMA system as claimed in any one of claims 1 to 6.
10. A5G NOMA system applying the method for safely optimizing power distribution in the physical layer of the 5G NOMA system as claimed in any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911222698.0A CN111148096B (en) | 2019-12-03 | 2019-12-03 | Physical layer safety optimization power distribution method in 5G NOMA system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911222698.0A CN111148096B (en) | 2019-12-03 | 2019-12-03 | Physical layer safety optimization power distribution method in 5G NOMA system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111148096A true CN111148096A (en) | 2020-05-12 |
CN111148096B CN111148096B (en) | 2022-03-25 |
Family
ID=70517525
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911222698.0A Active CN111148096B (en) | 2019-12-03 | 2019-12-03 | Physical layer safety optimization power distribution method in 5G NOMA system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111148096B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112260796A (en) * | 2020-10-21 | 2021-01-22 | 三维通信股份有限公司 | Method and device for controlling interference signal emission |
CN112367106A (en) * | 2020-10-10 | 2021-02-12 | 西安电子科技大学 | 6G RIS-assisted optimization method for physical layer safety combination in NOMA system |
CN113098652A (en) * | 2021-04-01 | 2021-07-09 | 北京信息科技大学 | Design method of intelligent reflector assisted power domain NOMA (non-orthogonal multiple access) safety communication system |
CN113438651A (en) * | 2021-06-17 | 2021-09-24 | 河南理工大学 | NOMA-based physical layer authentication method of environment backscatter communication system |
CN113572500A (en) * | 2021-06-25 | 2021-10-29 | 西安电子科技大学 | NOMA multi-user detection algorithm of hybrid greedy and tabu search strategy |
CN114244587A (en) * | 2021-12-02 | 2022-03-25 | 西安电子科技大学 | NOMA multi-user secure computing unloading method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107995615A (en) * | 2017-11-15 | 2018-05-04 | 中国人民解放军信息工程大学 | Heterogeneous network NOMA safe transmission method of physical layer |
CN109996264A (en) * | 2019-03-27 | 2019-07-09 | 西北工业大学深圳研究院 | The power distribution method of safe energy efficiency is maximized in non-orthogonal multiple system |
CN110022557A (en) * | 2019-03-22 | 2019-07-16 | 西安交通大学 | A kind of physical layer active sniffing method towards non-orthogonal multiple access system |
CN110213822A (en) * | 2019-04-26 | 2019-09-06 | 浙江工业大学 | A kind of non-orthogonal multiple access system downlink linear search formula power distribution optimization method based on data safety |
-
2019
- 2019-12-03 CN CN201911222698.0A patent/CN111148096B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107995615A (en) * | 2017-11-15 | 2018-05-04 | 中国人民解放军信息工程大学 | Heterogeneous network NOMA safe transmission method of physical layer |
CN110022557A (en) * | 2019-03-22 | 2019-07-16 | 西安交通大学 | A kind of physical layer active sniffing method towards non-orthogonal multiple access system |
CN109996264A (en) * | 2019-03-27 | 2019-07-09 | 西北工业大学深圳研究院 | The power distribution method of safe energy efficiency is maximized in non-orthogonal multiple system |
CN110213822A (en) * | 2019-04-26 | 2019-09-06 | 浙江工业大学 | A kind of non-orthogonal multiple access system downlink linear search formula power distribution optimization method based on data safety |
Non-Patent Citations (2)
Title |
---|
GERARDO GOMEZ等: "Physical Layer Security in Uplink NOMA Multi-Antenna Systems With Randomly Distributed Eavesdroppers", 《IEEE》 * |
王钢等: "无线网络中的功率域非正交多址接人技术", 《无线通信技术》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112367106A (en) * | 2020-10-10 | 2021-02-12 | 西安电子科技大学 | 6G RIS-assisted optimization method for physical layer safety combination in NOMA system |
CN112260796A (en) * | 2020-10-21 | 2021-01-22 | 三维通信股份有限公司 | Method and device for controlling interference signal emission |
CN113098652A (en) * | 2021-04-01 | 2021-07-09 | 北京信息科技大学 | Design method of intelligent reflector assisted power domain NOMA (non-orthogonal multiple access) safety communication system |
CN113438651A (en) * | 2021-06-17 | 2021-09-24 | 河南理工大学 | NOMA-based physical layer authentication method of environment backscatter communication system |
CN113438651B (en) * | 2021-06-17 | 2022-10-11 | 河南理工大学 | NOMA-based physical layer authentication method of environment backscatter communication system |
CN113572500A (en) * | 2021-06-25 | 2021-10-29 | 西安电子科技大学 | NOMA multi-user detection algorithm of hybrid greedy and tabu search strategy |
CN113572500B (en) * | 2021-06-25 | 2022-09-02 | 西安电子科技大学 | NOMA multi-user detection algorithm of hybrid greedy and tabu search strategy |
CN114244587A (en) * | 2021-12-02 | 2022-03-25 | 西安电子科技大学 | NOMA multi-user secure computing unloading method and system |
Also Published As
Publication number | Publication date |
---|---|
CN111148096B (en) | 2022-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111148096B (en) | Physical layer safety optimization power distribution method in 5G NOMA system | |
Bansal et al. | Subcarrier and power allocation for OFDMA-based cognitive radio systems with joint overlay and underlay spectrum access mechanism | |
Ruby et al. | Enhanced uplink resource allocation in non-orthogonal multiple access systems | |
AU2020100505A4 (en) | Physical Layer Security Method Applicable To Non-Orthogonal Multiple Access System | |
Khan et al. | Performance analysis of cloud radio access networks with distributed multiple antenna remote radio heads | |
Gardellin et al. | Self-coexistence in cellular cognitive radio networks based on the IEEE 802.22 standard | |
Sultana et al. | Efficient resource allocation in SCMA-enabled device-to-device communication for 5G networks | |
Yu et al. | Joint user scheduling and channel allocation for cellular networks with full duplex base stations | |
Smiljkovikj et al. | Efficiency analysis of downlink and uplink decoupling in heterogeneous networks | |
Tehrani et al. | Resource allocation in OFDMA networks with half-duplex and imperfect full-duplex users | |
CN109327895B (en) | NOMA and CR network-based power distribution method | |
Ho et al. | Cooperative non-orthogonal multiple access with physical layer network coding | |
Yassin et al. | Cooperative resource management and power allocation for multiuser OFDMA networks | |
Hamid et al. | An Optimized Algorithm for Resource Allocation for D2D in Heterogeneous Networks. | |
Song et al. | Performance analysis of a low-complexity nonorthogonal multiple access scheme in visible light communication downlinks using pulse modulations | |
CN110062399B (en) | Cognitive heterogeneous cellular network spectrum allocation method based on game theory | |
Hendraningrat et al. | Virtual user pairing based non‐orthogonal multiple access in downlink coordinated multipoint transmissions | |
CN104105100A (en) | Downlink interference elimination method and system based on pseudo random sub-channel selection strategy | |
CN107148078B (en) | User access control method and device for hybrid full-duplex and half-duplex network | |
Rallis et al. | Design of MAC-layer Protocols for Distributed NOMA-based VLC Networks | |
Khan et al. | Non-orthogonal multiple access: Basic interference management technique | |
A. Alkhazzar et al. | Power allocation with fairness for non‐orthogonal multiple access systems | |
Chung | Analysis of achievable data rate under BPSK modulation: CIS NOMA perspective | |
Huang et al. | Performance of subcarrier allocation of D2D multicasting for wireless communication systems | |
Li et al. | An proportional fair resource allocation in OFDM-based cognitive radio networks under imperfect channel-state information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |