CN113423141A - Bilateral matching-based downlink multi-carrier NOMA system resource allocation method - Google Patents
Bilateral matching-based downlink multi-carrier NOMA system resource allocation method Download PDFInfo
- Publication number
- CN113423141A CN113423141A CN202110600160.XA CN202110600160A CN113423141A CN 113423141 A CN113423141 A CN 113423141A CN 202110600160 A CN202110600160 A CN 202110600160A CN 113423141 A CN113423141 A CN 113423141A
- Authority
- CN
- China
- Prior art keywords
- user
- subcarrier
- carrier
- matching
- pair
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 206010042135 Stomatitis necrotising Diseases 0.000 title claims abstract description 94
- 201000008585 noma Diseases 0.000 title claims abstract description 94
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000002146 bilateral effect Effects 0.000 title claims abstract description 20
- 238000013468 resource allocation Methods 0.000 title claims abstract description 14
- 230000005540 biological transmission Effects 0.000 claims abstract description 20
- 239000000969 carrier Substances 0.000 claims description 14
- 238000005457 optimization Methods 0.000 claims description 12
- 238000011160 research Methods 0.000 abstract description 3
- 238000010845 search algorithm Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 4
- 238000002474 experimental method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0453—Resources in frequency domain, e.g. a carrier in FDMA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0473—Wireless resource allocation based on the type of the allocated resource the resource being transmission power
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
- H04W72/542—Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
- H04W72/543—Allocation or scheduling criteria for wireless resources based on quality criteria based on requested quality, e.g. QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, and aims to solve the problem that safety-oriented multi-carrier NOMA system resource allocation research is lacked in the prior art. The invention is different from a single carrier NOMA system which only uses one carrier to carry out information transmission, considers the downlink transmission of the multi-carrier NOMA system, and provides a user and sub-carrier matching method based on a bilateral matching algorithm and a sub-carrier power distribution method based on a binary search algorithm under the requirements of the user reachable rate and the total power limit and with the aim of maximizing the system secret throughput. The invention can obviously improve the safety performance of the system while ensuring that the service quality of all users is met.
Description
Technical Field
The invention relates to a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, belonging to the technical field of wireless communication.
Background
In addition, various wireless terminal devices are increased explosively, and the requirement for mass connectivity is increasingly urgent, which all cause the research of the multi-carrier NOMA system to be more and more concerned. For a multi-carrier NOMA system, the key point is how to optimally allocate resources such as power, subcarriers and the like to users to maximize the system performance by fully utilizing the NOMA technical advantages. The throughput or energy efficiency of a multipurpose system is researched by the existing NOMA system as an optimization target, and the optimization consideration for the security performance is less, but in the NOMA technology, a superposed signal of a plurality of users is transmitted on one carrier, and an eavesdropper influences all the users in a cluster after intercepting the signal, so that the security of the NOMA system is worth considering.
In addition, at present, the security discussion about the NOMA system focuses on the single carrier NOMA system, and the problem of resource allocation of the multi-carrier NOMA system facing the security is only discussed for a specific relay scenario, which is not beneficial to the development and application of the multi-carrier NOMA system.
Disclosure of Invention
Aiming at the problem that safety-oriented multi-carrier NOMA system resource allocation research is lacked in the prior art, the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which can maximize the confidential throughput of a system under the user reachable rate requirement and total power limitation so as to improve the safety performance of a multi-carrier NOMA system.
In order to solve the technical problems, the invention adopts the following technical means:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which comprises the following steps:
under the constraints of user reachable rate and base station transmission power, taking the secret throughput of a downlink multi-carrier NOMA system as a target function to obtain the joint optimization problem of user subcarrier matching and user power distribution;
carrying out user pairing on users in a downlink multi-carrier NOMA system to obtain a user pair set, and obtaining a subcarrier priority list of each user pair in the user pair set;
and based on the joint optimization problem, performing resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
Further, the downlink multi-carrier NOMA system includes a base station, K users and 1 eavesdropper, wherein the downlink multi-carrier NOMA system has M subcarriers, and K is 2M.
Further, the expression of the joint optimization problem of the user subcarrier matching and the user power allocation is as follows:
wherein, { UCn,mDenotes user sub-carrier matching, UCn,mDenotes the nth user on the mth subcarrier, { pn,mDenotes user power allocation, pn,mIndicating user UCn,mThe power of the user is set to be,indicating user UCn,mSecurity capacity of Rn,mIndicating user UCn,mThe achievable rate of the speed of the motor,indicating user UCn,mEavesdropping rate of, RminRepresents the minimum value of the reachable rate in the downlink multi-carrier NOMA system, P represents the maximum total transmitting power of the base station in the downlink multi-carrier NOMA system,for the total user set of the downlink multi-carrier NOMA system,for the subcarrier set, UC, of downlink multicarrier NOMA systemsn′,m′And (3) representing the nth user on the mth sub-carrier, wherein M is 1, 2, …, and M is the total number of sub-carriers in the downlink multi-carrier NOMA system.
Further, the method for obtaining the subcarrier priority list of each user pair in the user pair set and the user pair set comprises the following steps:
acquiring a total user set of channel descending order arrangement according to the channel of each user in a downlink multi-carrier NOMA systemK is the total number of users in the downlink multi-carrier NOMA system;
set total usersThe front K/2 users and the back K/2 users in the system are pairwise paired to obtain a user pairing setWherein, UiRepresents the ith user pair, U i1, 2, …, M is K/2, and M is the total number of subcarriers in the downlink multicarrier NOMA system;
for user to UiAccording to the user to UiAll subcarriers in a downlink multicarrier NOMA system are subjected to descending order arrangement by channels on each subcarrier to obtain a user pair UiA subcarrier priority list.
Further, the method for obtaining user subcarrier matching and user power allocation that maximizes secret throughput includes the steps of:
(1) initializing random number lambda to make unmatched user pair setSubcarrier matching setAnd subcarrier matching capacityWherein λ is a positive integer, M is 1, 2, …, M;
(2) when in useThen, all the user pairs in { U _ un } send matching requests to the subcarriers with the highest priority in the subcarrier priority lists of the user pairs at the same time, calculate the power of each unmatched user pair on each subcarrier, and obtain the secret capacity of each unmatched user pair on each subcarrier;
(3) matching judgment is carried out according to the secret capacity of the user on the subcarriers, the subcarrier matching set and the subcarrier matching capacity, a matching user pair of each subcarrier is determined, and the subcarrier matching set, the subcarrier priority list and the unmatched user pair set are updated;
(4) repeating the steps (2) and (3) according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair set until the time is up to
(5) Updating data on each subcarrier according to the matched user pair to complete matching operation of the subcarriers and the user pair;
(6) and (3) updating the random number lambda according to a preset updating step length, judging whether the lambda is converged, returning to the step (1) when the lambda is not converged, and otherwise, ending iteration to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
Further, in the step (2), the user pairs UiThe power on the mth subcarrier is calculated as follows:
p2,m=pm-p1,m (3)
wherein p is1,mRepresents the user to UiThe power on the m-th sub-carrier of the 1 st user,Rminrepresents the minimum achievable rate in a downlink multi-carrier NOMA system, BscWhich represents the bandwidth of the sub-carriers, represents the channel coefficients from the base station to the nth user on the mth subcarrier, n ∈ {1, 2}, σ2Representing the channel noise variance, p, over the sub-carriersmDenotes the power of the m-th sub-carrier, p2,mRepresents the user to UiThe power on the m sub-carrier of the 2 nd user, gmrepresenting the channel coefficients from the base station to the eavesdropper,representing the minimum power of the mth subcarrier.
Further, in the step (2), the user pairs UiThe method for calculating the secret capacity on the mth subcarrier comprises the following steps:
according to user pairs UiCalculating user pairs U in power on mth subcarrieriThe reachable rate and the eavesdropping rate of each user;
calculating user pair U according to user reachable rate and eavesdropping rateiIn the privacy of each userRate:
wherein,represents the user to UiThe secret rate of the nth user on the mth sub-carrier, n is equal to {1, 2}, Rn,mRepresents the user to UiThe achievable rate of the nth user on the mth subcarrier,represents the user to UiThe interception rate of the nth user on the mth subcarrier;
calculating user pairs U according to the secret rate of each useriSecret capacity on mth subcarrier:
further, the specific operation of step (3) is as follows:
when m sub-carrier SCmMatched set of subcarriersWhen it is, it is considered to be SCmUnmatched from to SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiAs SCmIs matched with the user pair, is matched with the user pair UiAdd { SC _ m (m) }, add SCmDeleting the user pairs from the subcarrier priority lists of other unmatched user pairs and combining the user pairs UiDeleting from the set { U _ un } of unmatched user pairs;
when m sub-carrier SCmMatched set of subcarriersWhen it is, consider thatSCmAlready paired with user UjMatch, j =1, 2, …, M and j ≠ i, from SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiPair users to UiAt SCmSecurity capacity ofAnd SCmSub-carrier matching capacity ofBy comparison, whenThen, SCmRejecting user pairs UiIs requested to match the SCmFrom user to UiSubcarrier priority list PL _ SC (U)i) Deleting; when in useThen, select the user to UiAs SCmOf the matched user pair, SCmRejecting user pairs UjBy using the user pairs UiReplace user pair U in { SC _ m (m) }jTo connect SCmFrom user to UjSubcarrier priority list PL _ SC (U)j) Deleting and pairing the user with UjAnd adding the unmatched user pair set (U _ un).
Further, let the user pair UiFor the m sub-carrier SCmIf the user pairs are matched, the specific operation of the step (5) is as follows:
couple users to UiAnd the m sub-carrier SCmThe matching is carried out in a matching way,and according to the user pair UiUpdating subcarriers SC in sequencemMatched user pair, subcarrier matching capacity and user power allocation, wherein the subcarriers SCmThe matching user pairs of (1) are as follows:
wherein,representing subcarriers SCmIs matched with the user pair, UC1,mDenotes the 1 st user on the m sub-carrier, UC2,mRepresenting the 2 nd user on the mth subcarrier.
Further, in step (6), the formula for updating the random number λ according to the preset updating step is as follows:
wherein, θ is an updating step length, and P represents the maximum total transmitting power of the base station in the downlink multi-carrier NOMA system.
The following advantages can be obtained by adopting the technical means:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which is different from a single-carrier NOMA system which only uses one carrier for information transmission, fully considers the downlink transmission of the multi-carrier NOMA system, takes the user reachable rate requirement and the total power as constraints in the multi-carrier transmission scene, and performs the joint optimization of sub-carrier matching and power allocation by taking the maximized system secret throughput as a target. The method of the invention can obviously improve the safety performance of the system while ensuring the service quality of all users.
Drawings
Fig. 1 is a flowchart of the steps of the downlink multi-carrier NOMA system resource allocation method based on bilateral matching according to the present invention;
fig. 2 is a schematic model diagram of a downlink multi-carrier NOMA system according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating the steps of sub-carrier matching and user power allocation for users in an embodiment of the present invention;
FIG. 4 is a diagram illustrating the variation of the security throughput with respect to P for different multiple access modes and total number of users in an embodiment of the present invention;
FIG. 5 is a graph of secret throughput versus R for different transmit powers and total number of users in an embodiment of the present inventionminSchematic diagram of variations of (a);
FIG. 6 shows secret throughput versus d for different multiple access modes and transmission powers in an embodiment of the present inventioneSchematic diagram of the variation of (1).
Detailed Description
The technical scheme of the invention is further explained by combining the accompanying drawings as follows:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, as shown in figure 1, comprising the following steps:
step A, under the constraint of user reachable rate and base station transmission power, taking the secret throughput of a downlink multi-carrier NOMA system as a target function to obtain a joint optimization problem of user subcarrier matching and user power distribution;
b, carrying out user pairing on users in the downlink multi-carrier NOMA system to obtain a user pair set, and obtaining a subcarrier priority list of each user pair in the user pair set;
and C, performing resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list based on a joint optimization problem to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
The scenario considered by the method of the present invention is shown in fig. 2, where a downlink multi-carrier NOMA system includes a base station, K users and 1 eavesdropper, and the total user set of the system In descending order from user 1 to user K channels. The downlink multi-carrier NOMA system has M sub-carriers, and K is 2M. The total frequency spectrum bandwidth of the downlink multi-carrier NOMA system in the embodiment of the invention is B, which is divided into M sub-carriers, and the bandwidth of each sub-carrier is BscSet of these subcarriers is B/MSC for the method of the inventionmRepresenting the mth subcarrier.
In the method of the present invention, it is assumed that each user only occupies one subcarrier, and each subcarrier has 2 users, then K is 2M, and UC is used1,mAnd UC2,mRespectively representing sub-carriers SCmTwo users of, SCmThe user pair of (1) can be expressed as UCm={UC1,m,UC2,m},n ∈ {1, 2}, andrepresenting base stations to SCmThe channel coefficients of the last 1 st user,representing base stations to SCmChannel coefficient of last 2 nd user, UC1,mAnd UC2,mPower is p respectively1,mAnd p2,m. The maximum total transmitting power of a downlink multi-carrier NOMA system base station is P, the sum of the transmitting power of all users cannot be larger than P, namely the requirement of meetingAt the receiving end, considering the conservative eavesdropping condition, the eavesdropper can also successfully perform SIC to decode the user information.
In step a, based on the downlink multi-carrier NOMA system, the expression of the joint optimization problem of the user subcarrier matching and the user power allocation is as follows:
wherein, { UCn,mDenotes user sub-carrier matching, UCn,mDenotes the nth user on the mth subcarrier, { pn,mDenotes user power allocation, pn,mIndicating user UCn,mThe power of the user is set to be,indicating user UCn,mSecurity capacity of Rn,mIndicating user UCn,mThe achievable rate of the speed of the motor,indicating user UCn,mEavesdropping rate of, RminRepresents the minimum achievable rate in a downlink multi-carrier NOMA system,for the total user set of the downlink multi-carrier NOMA system,for the subcarrier set, UC, of downlink multicarrier NOMA systemsn′,m′And (3) representing the nth user on the mth sub-carrier, wherein M is 1, 2, …, and M is the total number of sub-carriers in the downlink multi-carrier NOMA system.
In the embodiment of the present invention, the specific operation of step B is as follows:
step B01, according to the channel of each user in the downlink multi-carrier NOMA system, obtaining the total user set of the channel descending sequence arrangementAnd K is the total number of users in the downlink multi-carrier NOMA system.
Step B02, total user setThe front K/2 users and the back K/2 users in the system are pairwise paired to obtain a user pairing setWherein, UiRepresents the ith user pair, Ui={i,i+M},i=1,2,…,M,M=K/2。
Step B03, aiming at user pair UiAccording to the user to UiAll subcarriers in a downlink multicarrier NOMA system are subjected to descending order arrangement by channels on each subcarrier to obtain a user pair UiSubcarrier priority list PL _ SC (U)i)。
In the embodiment of the present invention, as shown in fig. 3, the specific operation of step C is as follows:
step C01, initializing random number lambda, making unmatched user pair setSubcarrier matching setAnd subcarrier matching capacityWherein λ is a positive integer.
Step C02, whenAnd then, all the user pairs in the { U _ un } simultaneously send matching requests to the subcarriers with the highest priority in the priority lists of the respective subcarriers, calculate the power of each unmatched user pair on each subcarrier, and obtain the secret capacity of each unmatched user pair on each subcarrier.
201. Unmatched user pairs UiThe power on the mth subcarrier is calculated as follows:
p2,m=pm-p1,m (11)
wherein p is1,mRepresents the user to UiThe power on the m-th sub-carrier of the 1 st user,represents the channel coefficients from the base station to the nth user on the mth subcarrier, n ∈ {1, 2}, σ2Representing the channel noise variance, p, over the sub-carriersmDenotes the power of the m-th sub-carrier, p2,mRepresents the user to UiThe power on the m sub-carrier of the 2 nd user, gmrepresenting the channel coefficients from the base station to the eavesdropper,representing the minimum power of the mth subcarrier.
202. According to user pairs UiPower (p) on the m-th subcarrier1,mAnd p2,m) Computing user pairs UiThe reachable rate and the interception rate of each user are calculated by the following specific calculation formula:
wherein R isn,mRepresents the user to UiThe achievable rate of the nth user on the mth subcarrier,represents the user to UiThe eavesdropping rate of the nth user on the mth subcarrier,represents the m on the sub-carrierThe power of the individual user.
203. Calculating user pair U according to user reachable rate and eavesdropping rateiThe privacy rate of each user:
204. Calculating user pairs U according to the secret rate of each useriSecret capacity on mth subcarrier:
and step C03, determining the matched user pair of each subcarrier according to the secret capacity of the user pair on the subcarrier, the subcarrier matching set and the subcarrier matching capacity, and updating the subcarrier matching set, the subcarrier priority list and the unmatched user pair set.
In the invention, all unmatched user pairs can simultaneously send matching requests to respective optimal subcarriers, and if the subcarriers are not matched, only one request is received to be matched with the user pairAnd if a plurality of requests exist, selecting the user pair with the maximum secret capacity for matching, and if the subcarriers match the user pairs in the previous stage, comparing the requested user pairs with the matched user pairs, and selecting the user pair with the maximum secret capacity for matching. The successfully matched user pair is deleted from the { U _ un }, the user pair which is refused to request is still classified into the { U _ un }, the matching is continuously carried out until the complete matching is completed,
the specific operation of step C03 is as follows:
301. when m sub-carrier SCmMatched set of subcarriersWhen it is, it is considered to be SCmUnmatched from to SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiAs SCmIs matched with the user pair, is matched with the user pair UiAdd { SC _ m (m) }, add SCmDeleting the user pairs from the subcarrier priority lists of other unmatched user pairs and combining the user pairs UiDeleted from the set of unmatched user pairs { U _ un }.
302. When m sub-carrier SCmMatched set of subcarriersWhen it is, it is considered to be SCmAlready paired with user UjMatching, j ≠ 1, 2, …, M and j ≠ i, from SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiPair users to UiAt SCmSecurity capacity ofAnd SCmSub-carrier matching capacity ofBy comparison, whenThen, SCmRejecting user pairs UiIs requested to match the SCmFrom user to UiSubcarrier priority list PL _ SC (U)i) Deleting; when in useThen, select the user to UiAs SCmOf the matched user pair, SCmRejecting user pairs UjBy using the user pairs UiReplace user pair U in { SC _ m (m) }jTo connect SCmFrom user to UjSubcarrier priority list PL _ SC (U)j) Deleting and pairing the user with UjAnd adding the unmatched user pair set (U _ un).
Step C04, repeating the steps (2) and (3) according to the updated subcarrier matching set, the subcarrier priority list and the unmatched user pair set until the steps are finishedAnd establishing matching relation of all users to the sub-carriers.
And step C05, updating the data on each subcarrier according to the matched user pair, and completing the matching operation of the subcarriers and the user pairs. Set user to UiFor the m sub-carrier SCmThen the specific operation of step C05 is:
couple users to UiAnd the m sub-carrier SCmThe matching is carried out in a matching way,and according to the user pair UiUpdating subcarriers SC in sequencemMatched user pairs, subcarrier matching capacity and user power allocation of, wherein the subcarriers SC are updatedmThe operation of matching user pairs of (1) is as follows:
wherein,representing subcarriers SCmIs matched with the user pair, UC1,mDenotes the 1 st user on the m sub-carrier, UC2,mRepresenting the 2 nd user on the mth subcarrier.
The operation of updating the subcarrier matching capacity and the user power allocation is as follows: wherein,andrespectively represent the m-th sub-carrier SCmThe power allocation values of the 1 st and 2 nd users.
Step C06, updating the random number lambda according to the preset updating step length, judging whether the lambda is converged, and returning to the step C01 to perform iterative operation when the lambda is not converged; when λ converges, the iteration ends, according to the finalAnduser subcarrier matching and user power allocation are obtained that maximizes secret throughput.
In step C06, the formula for updating the random number λ according to the preset update step is as follows:
where θ is the update step.
To verify the effect of the method of the invention, the following comparative experiments are given:
the total transmission bandwidth B of the downlink multi-carrier NOMA system is 5MHz, and the channel noise variance on each subcarrier isWherein the noise power spectral density N0-70 dBm. At subcarrier SCmIn the above, the channel gain from the base station to the k-th user is defined asA is the path loss exponent of the path loss,is the gain of the rayleigh fading channel,is the distance between user k and the base station, and the channel gain from the base station to the eavesdropper is defined asdeIs the distance between the eavesdropper and the base station, by default
The comparison experiments are respectively carried out in the user setsThe total number K is 10, K is 20, the NOMA scheme and the OFDMA reference scheme of the invention are simulated, and the secret system throughput R in different schemes is discussed in comparisons With the base station transmitting power P, the minimum achievable rate RminAnd distance d of base station and eavesdroppereThe results of the specific guidelines of (1) are shown in FIGS. 4 to 6.
FIG. 4 shows two downlinks, NOMA and OFDMA, for different total number of usersSystem secret throughput R in multi-carrier resource allocation schemesRelation to base station transmission power P, wherein user minimum achievable rate R is setmin1Mbps, distance d from base station to eavesdroppere50 m. As can be seen from FIG. 4, the secret throughput RsIncreasing with increasing base station transmission power P, and as P continues to increase, the secret throughput RsThe increase speed of the network is gradually slowed and tends to be stable, because the larger the transmission power of the base station is, the larger the power of signals received by a user and an eavesdropper after path loss is, and the user privacy capacity is monotonically increased with respect to the power; in addition, subcarrier SCmUpper user UCn,mSecurity capacity ofIs the difference between two logarithmic functions for P, the derivative of which decreases with increasing P, approaching 0 but greater than 0, so that as P increases, the system secret throughput R increasessThe rate of increase of (b) becomes slow and tends to be stable. As is apparent from FIG. 4, in the user setUnder the condition that the total number K is 10 and the total number K is 20, the NOMA scheme is superior to the OFDMA scheme, because the information of one user is transmitted on one subcarrier of the OFDMA scheme, the spectrum efficiency is lower, while one subcarrier in the NOMA transmission provided by the invention transmits two users, the NOMA transmission has diversity advantage, and the NOMA transmission method combines user subcarrier matching and power distribution, and can improve the safety performance of multicarrier NOMA to the maximum extent under the limitation of user QoS.
FIG. 5 shows the system secret throughput R in the method of the invention for different total number of users and different maximum transmission powersMinimum achievable rate with user RminThe maximum base station transmitting power P is 10dBm and 30dBm, and the distance d between the base station and the eavesdroppere50 m. FIG. 5 illustrates QoS requirements versus system secret throughput RsWith the influence of RminIncrease of (A) RsIs reduced because RminIncrease in required transmitter utilizationThe external power is used to increase the data rate of users with poor channel conditions, so when R isminWhen it becomes very large, P cannot meet the QoS requirements of all users, the base station does not send messages to the users, R s0. It can also be seen from FIG. 5 that the same number of users, the larger P and RsThe later the drop is, because the larger P can provide higher QoS requirements for the users, and the later the drop is for the number of users, when the power is the same, because the limited power can meet the higher QoS requirements of these minority users.
FIG. 6 shows the system secret throughput R in the NOMA scheme and OFDMA scheme of the present invention at different total users and different maximum transmit powerssDistance d from base station to eavesdroppereIn which the user minimum achievable rate R is setminThe base station transmission power P is 20dBm and 30dBm at 1 Mbps. As can be seen in FIG. 6, with the distance d from the base station to the eavesdroppereIncrease of (2), secret throughput RsThe ramp-up is very fast because the farther the distance is, the greater the path loss from the base station to the eavesdropper, and the channel gain gmThe worse the eavesdropper receives, the smaller the power of the signal, the smaller the eavesdropping rate, the subcarrier SCmUpper user UCn,mSecurity capacity ofThe larger the system secret throughput RsThe larger, and at the same time, the secret throughput R of the NOMA scheme at different powerssAre higher than the OFDMA scheme, so the method of the present invention has higher security performance. In fig. 6, when P is 30dBm, system secrecy throughput R under NOMA and OFDMAsAt deStart to plateau at 1000m and R at 20dBmsAt deStarting to be stable at 500m, the smaller the total transmission power threshold is, the earlier the transmission power threshold can be kept stable, because the larger the power is, the larger the power received by the eavesdropper after the path loss is, the larger the eavesdropping rate is, the greater the risk of eavesdropping is, and the lower power condition is easier to reach the state that the eavesdropping risk tends to 0. It can also be seen from fig. 6 that in both NOMA and OFDMA schemes, when the base station is moving toDistance d of eavesdroppereSecret throughput R when continuously increasingsThe signal intercepted by the eavesdropper is subjected to large path loss and small power when the distance is far enough, the system continuously approaches a no-eavesdropper state, the rate of the eavesdropper tends to be 0, the privacy rate tends to be up, the privacy throughput tends to be throughput without the eavesdropper, and therefore, when the distance d from the base station to the eavesdropper is long enough, the distance d from the base station to the eavesdropper is short, the system is stableeWhen very large, the secret throughput of both the NOMA and OFDMA schemes will remain around the total throughput value without eavesdropping
Compared with the prior art, the method can obviously improve the safety performance of the system while ensuring that the service quality of all users is met.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.
Claims (10)
1. The method for allocating the resources of the downlink multi-carrier NOMA system based on bilateral matching is characterized by comprising the following steps:
under the constraints of user reachable rate and base station transmission power, taking the secret throughput of a downlink multi-carrier NOMA system as a target function to obtain the joint optimization problem of user subcarrier matching and user power distribution;
carrying out user pairing on users in a downlink multi-carrier NOMA system to obtain a user pair set, and obtaining a subcarrier priority list of each user pair in the user pair set;
and based on the joint optimization problem, performing resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
2. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 1, wherein the downlink multi-carrier NOMA system comprises a base station, K users and 1 eavesdropper, and the downlink multi-carrier NOMA system has M sub-carriers in total, where K is 2M.
3. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching according to claim 1, wherein the expression of the joint optimization problem of user sub-carrier matching and user power allocation is as follows:
pn,m≥0
wherein, { UCn,mDenotes user sub-carrier matching, UCn,mDenotes the nth user on the mth subcarrier, { pn,mDenotes user power allocation, pn,mIndicating user UCn,mThe power of the user is set to be,indicating user UCn,mSecurity capacity of Rn,mIndicating user UCn,mThe achievable rate of the speed of the motor,indicating user UCn,mEavesdropping rate of, RminRepresents the minimum value of the reachable rate in the downlink multi-carrier NOMA system, P represents the maximum total transmitting power of the base station in the downlink multi-carrier NOMA system,for the total user set of the downlink multi-carrier NOMA system,for the subcarrier set, UC, of downlink multicarrier NOMA systemsn′,m′And (3) representing the nth user on the mth sub-carrier, wherein M is 1, 2, …, and M is the total number of sub-carriers in the downlink multi-carrier NOMA system.
4. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching according to claim 1, wherein the method for obtaining the subcarrier priority list of each user pair in the user pair set and the user pair set comprises:
acquiring a total user set of channel descending order arrangement according to the channel of each user in a downlink multi-carrier NOMA systemK is the total number of users in the downlink multi-carrier NOMA system;
set total usersThe front K/2 users and the back K/2 users in the system are pairwise paired to obtain a user pairing setWherein, UiRepresents the ith user pair, UiI 1, 2, …, M K/2, where M is the neutron in the downlink multicarrier NOMA systemThe total number of carriers;
for user to UiAccording to the user to UiAll subcarriers in a downlink multicarrier NOMA system are subjected to descending order arrangement by channels on each subcarrier to obtain a user pair UiA subcarrier priority list.
5. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 1 or 4, wherein the method for obtaining user sub-carrier matching and user power allocation that maximizes the secret throughput comprises the following steps:
(1) initializing random number lambda to make unmatched user pair setSubcarrier matching setAnd subcarrier matching capacityWherein λ is a positive integer, M is 1, 2, …, M;
(2) when in useThen, all the user pairs in { U _ un } send matching requests to the subcarriers with the highest priority in the subcarrier priority lists of the user pairs at the same time, calculate the power of each unmatched user pair on each subcarrier, and obtain the secret capacity of each unmatched user pair on each subcarrier;
(3) matching judgment is carried out according to the secret capacity of the user on the subcarriers, the subcarrier matching set and the subcarrier matching capacity, a matching user pair of each subcarrier is determined, and the subcarrier matching set, the subcarrier priority list and the unmatched user pair set are updated;
(4) repeating according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair setStep (2) and step (3) until
(5) Updating data on each subcarrier according to the matched user pair to complete matching operation of the subcarriers and the user pair;
(6) and (3) updating the random number lambda according to a preset updating step length, judging whether the lambda is converged, returning to the step (1) when the lambda is not converged, and otherwise, ending iteration to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
6. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 5, wherein in step (2), the user pairs UiThe power on the mth subcarrier is calculated as follows:
p2,m=pm-p1,m
wherein p is1,mRepresents the user to UiThe power on the m-th sub-carrier of the 1 st user,Rminrepresents the minimum achievable rate in a downlink multi-carrier NOMA system, BscWhich represents the bandwidth of the sub-carriers, represents the channel coefficients from the base station to the nth user on the mth subcarrier, n ∈ {1, 2}, σ2Representing the channel noise variance, p, over the sub-carriersmDenotes the power of the m-th sub-carrier, p2,mRepresents the user to UiThe power on the m sub-carrier of the 2 nd user, gmrepresenting the channel coefficients from the base station to the eavesdropper,representing the minimum power of the mth subcarrier.
7. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 5, wherein in step (2), the user pairs UiThe method for calculating the secret capacity on the mth subcarrier comprises the following steps:
according to user pairs UiCalculating user pairs U in power on mth subcarrieriThe reachable rate and the eavesdropping rate of each user;
calculating user pair U according to user reachable rate and eavesdropping rateiThe privacy rate of each user:
wherein,represents the user to UiThe secret rate of the nth user on the mth sub-carrier, n is equal to {1, 2}, Rn,mRepresents the user to UiThe achievable rate of the nth user on the mth subcarrier,represents the user to UiThe interception rate of the nth user on the mth subcarrier;
calculating user pairs U according to the secret rate of each useriSecret capacity on mth subcarrier:
8. the method for allocating downlink multi-carrier NOMA system resources based on bilateral matching according to claim 5, wherein the specific operation of step (3) is as follows:
when m sub-carrier SCmMatched set of subcarriersWhen it is, it is considered to be SCmUnmatched from to SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiAs SCmIs matched with the user pair, is matched with the user pair UiAdd { SC _ m (m) }, add SCmDeleting the user pairs from the subcarrier priority lists of other unmatched user pairs and combining the user pairs UiDeleting from the set { U _ un } of unmatched user pairs;
when m sub-carrier SCmMatched set of subcarriersWhen it is, it is considered to be SCmAlready paired with user UjMatching, j ≠ 1, 2, …, M and j ≠ i, from SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiPair users to UiAt SCmSecurity capacity ofAnd SCmIs a sub-carrierWave matching capacityBy comparison, whenThen, SCmRejecting user pairs UiIs requested to match the SCmFrom user to UiSubcarrier priority list PL _ SC (U)i) Deleting; when in useThen, select the user to UiAs SCmOf the matched user pair, SCmRejecting user pairs UjBy using the user pairs UiReplace user pair U in { SC _ m (m) }jTo connect SCmFrom user to UjSubcarrier priority list PL _ SC (U)j) Deleting and pairing the user with UjAnd adding the unmatched user pair set (U _ un).
9. The method of claim 5 for resource allocation in downlink multi-carrier NOMA system based on bilateral matching, wherein the method comprises setting a user pair UiFor the m sub-carrier SCmIf the user pairs are matched, the specific operation of the step (5) is as follows:
couple users to UiAnd the m sub-carrier SCmThe matching is carried out in a matching way,and according to the user pair UiUpdating subcarriers SC in sequencemMatched user pair, subcarrier matching capacity and user power allocation, wherein the subcarriers SCmThe matching user pairs of (1) are as follows:
10. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 5, wherein in step (6), the formula for updating the random number λ according to the preset updating step is as follows:
wherein, θ is an updating step length, and P represents the maximum total transmitting power of the base station in the downlink multi-carrier NOMA system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110600160.XA CN113423141B (en) | 2021-05-31 | 2021-05-31 | Downlink multi-carrier NOMA system resource allocation method based on bilateral matching |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110600160.XA CN113423141B (en) | 2021-05-31 | 2021-05-31 | Downlink multi-carrier NOMA system resource allocation method based on bilateral matching |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113423141A true CN113423141A (en) | 2021-09-21 |
CN113423141B CN113423141B (en) | 2023-06-23 |
Family
ID=77713299
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110600160.XA Active CN113423141B (en) | 2021-05-31 | 2021-05-31 | Downlink multi-carrier NOMA system resource allocation method based on bilateral matching |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113423141B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110430613A (en) * | 2019-04-11 | 2019-11-08 | 重庆邮电大学 | Resource allocation methods of the multicarrier non-orthogonal multiple access system based on efficiency |
CN110856247A (en) * | 2019-11-21 | 2020-02-28 | 重庆邮电大学 | Downlink NOMA power distribution method and system based on service quality |
-
2021
- 2021-05-31 CN CN202110600160.XA patent/CN113423141B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110430613A (en) * | 2019-04-11 | 2019-11-08 | 重庆邮电大学 | Resource allocation methods of the multicarrier non-orthogonal multiple access system based on efficiency |
CN110856247A (en) * | 2019-11-21 | 2020-02-28 | 重庆邮电大学 | Downlink NOMA power distribution method and system based on service quality |
Non-Patent Citations (2)
Title |
---|
YANG Z, ETC.: "A general power allocation scheme to guarantee quality of service in downlink and uplink NOMAsystems", 《IEEE》, pages 7244 - 7257 * |
雒艳: "面向非正交多址接入的资源分配方法研究", 《软件》, vol. 42, no. 4, pages 135 - 137 * |
Also Published As
Publication number | Publication date |
---|---|
CN113423141B (en) | 2023-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | Energy-efficient SWIPT in IoT distributed antenna systems | |
Zhang et al. | Interference-aware graph based resource sharing for device-to-device communications underlaying cellular networks | |
CN108834112B (en) | NOMA-based relay-assisted D2D communication system power distribution method | |
CN108718445B (en) | QoS-driven D2D secure communication resource allocation method | |
CN109714817B (en) | Communication system power allocation method using NOMA and D2D groups | |
CN107995615B (en) | Heterogeneous network NOMA physical layer safety transmission method | |
CN106211302A (en) | Non-orthogonal multiple accesses isomery UNE resource allocation methods | |
Zuo et al. | Power allocation optimization for uplink non-orthogonal multiple access systems | |
CN105517134B (en) | Support the association of isomery converged network federated user and the power distribution method of safe information transmission | |
Dai et al. | Interference-aware resource allocation for D2D underlaid cellular network using SCMA: A hypergraph approach | |
CN106028456B (en) | The power distribution method of virtual subdistrict in a kind of 5G high density network | |
CN107172706B (en) | Joint wireless resource allocation and power control method based on D2D communication | |
Cheng et al. | Two-step user pairing for OFDM-based cooperative NOMA systems | |
CN106912059B (en) | Cognitive relay network joint relay selection and resource allocation method supporting mutual information accumulation | |
CN106028364A (en) | Virtual cell forming method for 5G high-density network | |
Ren et al. | Resource allocation based on clustering algorithm for hybrid device-to-device networks | |
CN106162855B (en) | It communicates in conjunction with more D2D of subcarrier distribution and power control to resource allocation methods | |
CN112469113A (en) | Resource allocation method and device of multi-carrier NOMA system | |
Yan et al. | An adaptive subcarrier, bit and power allocation algorithm for multicell OFDM systems | |
CN113423141A (en) | Bilateral matching-based downlink multi-carrier NOMA system resource allocation method | |
Wang et al. | Time-efficient uplink data collection for UAV-assisted NOMA networks | |
Khodeir et al. | Secrecy outage performance with EH and TAS for realistic underlay cognitive radio networks using MIMO systems | |
CN105681110B (en) | Safe transmission wirelessly takes joint network selection and the resource allocation methods of energy network | |
Zhao et al. | Joint time and power allocation algorithm in NOMA relaying network | |
ElHalawany et al. | Uplink IoT networks: Time-division priority-based non-orthogonal multiple access approach |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |