CN113423141A - Bilateral matching-based downlink multi-carrier NOMA system resource allocation method - Google Patents

Bilateral matching-based downlink multi-carrier NOMA system resource allocation method Download PDF

Info

Publication number
CN113423141A
CN113423141A CN202110600160.XA CN202110600160A CN113423141A CN 113423141 A CN113423141 A CN 113423141A CN 202110600160 A CN202110600160 A CN 202110600160A CN 113423141 A CN113423141 A CN 113423141A
Authority
CN
China
Prior art keywords
user
subcarrier
carrier
matching
pair
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110600160.XA
Other languages
Chinese (zh)
Other versions
CN113423141B (en
Inventor
徐鼎
黎家慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Posts and Telecommunications filed Critical Nanjing University of Posts and Telecommunications
Priority to CN202110600160.XA priority Critical patent/CN113423141B/en
Publication of CN113423141A publication Critical patent/CN113423141A/en
Application granted granted Critical
Publication of CN113423141B publication Critical patent/CN113423141B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/542Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/543Allocation or scheduling criteria for wireless resources based on quality criteria based on requested quality, e.g. QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, and aims to solve the problem that safety-oriented multi-carrier NOMA system resource allocation research is lacked in the prior art. The invention is different from a single carrier NOMA system which only uses one carrier to carry out information transmission, considers the downlink transmission of the multi-carrier NOMA system, and provides a user and sub-carrier matching method based on a bilateral matching algorithm and a sub-carrier power distribution method based on a binary search algorithm under the requirements of the user reachable rate and the total power limit and with the aim of maximizing the system secret throughput. The invention can obviously improve the safety performance of the system while ensuring that the service quality of all users is met.

Description

Bilateral matching-based downlink multi-carrier NOMA system resource allocation method
Technical Field
The invention relates to a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, belonging to the technical field of wireless communication.
Background
In addition, various wireless terminal devices are increased explosively, and the requirement for mass connectivity is increasingly urgent, which all cause the research of the multi-carrier NOMA system to be more and more concerned. For a multi-carrier NOMA system, the key point is how to optimally allocate resources such as power, subcarriers and the like to users to maximize the system performance by fully utilizing the NOMA technical advantages. The throughput or energy efficiency of a multipurpose system is researched by the existing NOMA system as an optimization target, and the optimization consideration for the security performance is less, but in the NOMA technology, a superposed signal of a plurality of users is transmitted on one carrier, and an eavesdropper influences all the users in a cluster after intercepting the signal, so that the security of the NOMA system is worth considering.
In addition, at present, the security discussion about the NOMA system focuses on the single carrier NOMA system, and the problem of resource allocation of the multi-carrier NOMA system facing the security is only discussed for a specific relay scenario, which is not beneficial to the development and application of the multi-carrier NOMA system.
Disclosure of Invention
Aiming at the problem that safety-oriented multi-carrier NOMA system resource allocation research is lacked in the prior art, the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which can maximize the confidential throughput of a system under the user reachable rate requirement and total power limitation so as to improve the safety performance of a multi-carrier NOMA system.
In order to solve the technical problems, the invention adopts the following technical means:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which comprises the following steps:
under the constraints of user reachable rate and base station transmission power, taking the secret throughput of a downlink multi-carrier NOMA system as a target function to obtain the joint optimization problem of user subcarrier matching and user power distribution;
carrying out user pairing on users in a downlink multi-carrier NOMA system to obtain a user pair set, and obtaining a subcarrier priority list of each user pair in the user pair set;
and based on the joint optimization problem, performing resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
Further, the downlink multi-carrier NOMA system includes a base station, K users and 1 eavesdropper, wherein the downlink multi-carrier NOMA system has M subcarriers, and K is 2M.
Further, the expression of the joint optimization problem of the user subcarrier matching and the user power allocation is as follows:
Figure BDA0003092454760000021
Figure BDA0003092454760000031
Figure BDA0003092454760000032
wherein, { UCn,mDenotes user sub-carrier matching, UCn,mDenotes the nth user on the mth subcarrier, { pn,mDenotes user power allocation, pn,mIndicating user UCn,mThe power of the user is set to be,
Figure BDA0003092454760000033
indicating user UCn,mSecurity capacity of Rn,mIndicating user UCn,mThe achievable rate of the speed of the motor,
Figure BDA0003092454760000034
indicating user UCn,mEavesdropping rate of, RminRepresents the minimum value of the reachable rate in the downlink multi-carrier NOMA system, P represents the maximum total transmitting power of the base station in the downlink multi-carrier NOMA system,
Figure BDA0003092454760000035
for the total user set of the downlink multi-carrier NOMA system,
Figure BDA0003092454760000036
for the subcarrier set, UC, of downlink multicarrier NOMA systemsn′,m′And (3) representing the nth user on the mth sub-carrier, wherein M is 1, 2, …, and M is the total number of sub-carriers in the downlink multi-carrier NOMA system.
Further, the method for obtaining the subcarrier priority list of each user pair in the user pair set and the user pair set comprises the following steps:
acquiring a total user set of channel descending order arrangement according to the channel of each user in a downlink multi-carrier NOMA system
Figure BDA0003092454760000037
K is the total number of users in the downlink multi-carrier NOMA system;
set total users
Figure BDA0003092454760000039
The front K/2 users and the back K/2 users in the system are pairwise paired to obtain a user pairing set
Figure BDA0003092454760000038
Wherein, UiRepresents the ith user pair, U i1, 2, …, M is K/2, and M is the total number of subcarriers in the downlink multicarrier NOMA system;
for user to UiAccording to the user to UiAll subcarriers in a downlink multicarrier NOMA system are subjected to descending order arrangement by channels on each subcarrier to obtain a user pair UiA subcarrier priority list.
Further, the method for obtaining user subcarrier matching and user power allocation that maximizes secret throughput includes the steps of:
(1) initializing random number lambda to make unmatched user pair set
Figure BDA0003092454760000041
Subcarrier matching set
Figure BDA0003092454760000042
And subcarrier matching capacity
Figure BDA0003092454760000043
Wherein λ is a positive integer, M is 1, 2, …, M;
(2) when in use
Figure BDA0003092454760000044
Then, all the user pairs in { U _ un } send matching requests to the subcarriers with the highest priority in the subcarrier priority lists of the user pairs at the same time, calculate the power of each unmatched user pair on each subcarrier, and obtain the secret capacity of each unmatched user pair on each subcarrier;
(3) matching judgment is carried out according to the secret capacity of the user on the subcarriers, the subcarrier matching set and the subcarrier matching capacity, a matching user pair of each subcarrier is determined, and the subcarrier matching set, the subcarrier priority list and the unmatched user pair set are updated;
(4) repeating the steps (2) and (3) according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair set until the time is up to
Figure BDA0003092454760000045
(5) Updating data on each subcarrier according to the matched user pair to complete matching operation of the subcarriers and the user pair;
(6) and (3) updating the random number lambda according to a preset updating step length, judging whether the lambda is converged, returning to the step (1) when the lambda is not converged, and otherwise, ending iteration to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
Further, in the step (2), the user pairs UiThe power on the mth subcarrier is calculated as follows:
Figure BDA0003092454760000051
p2,m=pm-p1,m (3)
Figure BDA0003092454760000052
wherein p is1,mRepresents the user to UiThe power on the m-th sub-carrier of the 1 st user,
Figure BDA0003092454760000053
Rminrepresents the minimum achievable rate in a downlink multi-carrier NOMA system, BscWhich represents the bandwidth of the sub-carriers,
Figure BDA0003092454760000054
Figure BDA0003092454760000055
represents the channel coefficients from the base station to the nth user on the mth subcarrier, n ∈ {1, 2}, σ2Representing the channel noise variance, p, over the sub-carriersmDenotes the power of the m-th sub-carrier, p2,mRepresents the user to UiThe power on the m sub-carrier of the 2 nd user,
Figure BDA0003092454760000056
Figure BDA0003092454760000057
gmrepresenting the channel coefficients from the base station to the eavesdropper,
Figure BDA0003092454760000058
representing the minimum power of the mth subcarrier.
Further, in the step (2), the user pairs UiThe method for calculating the secret capacity on the mth subcarrier comprises the following steps:
according to user pairs UiCalculating user pairs U in power on mth subcarrieriThe reachable rate and the eavesdropping rate of each user;
calculating user pair U according to user reachable rate and eavesdropping rateiIn the privacy of each userRate:
Figure BDA0003092454760000059
wherein,
Figure BDA00030924547600000510
represents the user to UiThe secret rate of the nth user on the mth sub-carrier, n is equal to {1, 2}, Rn,mRepresents the user to UiThe achievable rate of the nth user on the mth subcarrier,
Figure BDA0003092454760000061
represents the user to UiThe interception rate of the nth user on the mth subcarrier;
calculating user pairs U according to the secret rate of each useriSecret capacity on mth subcarrier:
Figure BDA0003092454760000062
further, the specific operation of step (3) is as follows:
when m sub-carrier SCmMatched set of subcarriers
Figure BDA0003092454760000063
When it is, it is considered to be SCmUnmatched from to SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiAs SCmIs matched with the user pair, is matched with the user pair UiAdd { SC _ m (m) }, add SCmDeleting the user pairs from the subcarrier priority lists of other unmatched user pairs and combining the user pairs UiDeleting from the set { U _ un } of unmatched user pairs;
when m sub-carrier SCmMatched set of subcarriers
Figure BDA0003092454760000064
When it is, consider thatSCmAlready paired with user UjMatch, j =1, 2, …, M and j ≠ i, from SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiPair users to UiAt SCmSecurity capacity of
Figure BDA0003092454760000065
And SCmSub-carrier matching capacity of
Figure BDA0003092454760000066
By comparison, when
Figure BDA0003092454760000067
Then, SCmRejecting user pairs UiIs requested to match the SCmFrom user to UiSubcarrier priority list PL _ SC (U)i) Deleting; when in use
Figure BDA0003092454760000068
Then, select the user to UiAs SCmOf the matched user pair, SCmRejecting user pairs UjBy using the user pairs UiReplace user pair U in { SC _ m (m) }jTo connect SCmFrom user to UjSubcarrier priority list PL _ SC (U)j) Deleting and pairing the user with UjAnd adding the unmatched user pair set (U _ un).
Further, let the user pair UiFor the m sub-carrier SCmIf the user pairs are matched, the specific operation of the step (5) is as follows:
couple users to UiAnd the m sub-carrier SCmThe matching is carried out in a matching way,
Figure BDA0003092454760000069
and according to the user pair UiUpdating subcarriers SC in sequencemMatched user pair, subcarrier matching capacity and user power allocation, wherein the subcarriers SCmThe matching user pairs of (1) are as follows:
Figure BDA0003092454760000071
wherein,
Figure BDA0003092454760000072
representing subcarriers SCmIs matched with the user pair, UC1,mDenotes the 1 st user on the m sub-carrier, UC2,mRepresenting the 2 nd user on the mth subcarrier.
Further, in step (6), the formula for updating the random number λ according to the preset updating step is as follows:
Figure BDA0003092454760000073
wherein, θ is an updating step length, and P represents the maximum total transmitting power of the base station in the downlink multi-carrier NOMA system.
The following advantages can be obtained by adopting the technical means:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which is different from a single-carrier NOMA system which only uses one carrier for information transmission, fully considers the downlink transmission of the multi-carrier NOMA system, takes the user reachable rate requirement and the total power as constraints in the multi-carrier transmission scene, and performs the joint optimization of sub-carrier matching and power allocation by taking the maximized system secret throughput as a target. The method of the invention can obviously improve the safety performance of the system while ensuring the service quality of all users.
Drawings
Fig. 1 is a flowchart of the steps of the downlink multi-carrier NOMA system resource allocation method based on bilateral matching according to the present invention;
fig. 2 is a schematic model diagram of a downlink multi-carrier NOMA system according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating the steps of sub-carrier matching and user power allocation for users in an embodiment of the present invention;
FIG. 4 is a diagram illustrating the variation of the security throughput with respect to P for different multiple access modes and total number of users in an embodiment of the present invention;
FIG. 5 is a graph of secret throughput versus R for different transmit powers and total number of users in an embodiment of the present inventionminSchematic diagram of variations of (a);
FIG. 6 shows secret throughput versus d for different multiple access modes and transmission powers in an embodiment of the present inventioneSchematic diagram of the variation of (1).
Detailed Description
The technical scheme of the invention is further explained by combining the accompanying drawings as follows:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, as shown in figure 1, comprising the following steps:
step A, under the constraint of user reachable rate and base station transmission power, taking the secret throughput of a downlink multi-carrier NOMA system as a target function to obtain a joint optimization problem of user subcarrier matching and user power distribution;
b, carrying out user pairing on users in the downlink multi-carrier NOMA system to obtain a user pair set, and obtaining a subcarrier priority list of each user pair in the user pair set;
and C, performing resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list based on a joint optimization problem to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
The scenario considered by the method of the present invention is shown in fig. 2, where a downlink multi-carrier NOMA system includes a base station, K users and 1 eavesdropper, and the total user set of the system
Figure BDA0003092454760000081
Figure BDA0003092454760000091
In descending order from user 1 to user K channels. The downlink multi-carrier NOMA system has M sub-carriers, and K is 2M. The total frequency spectrum bandwidth of the downlink multi-carrier NOMA system in the embodiment of the invention is B, which is divided into M sub-carriers, and the bandwidth of each sub-carrier is BscSet of these subcarriers is B/M
Figure BDA0003092454760000092
SC for the method of the inventionmRepresenting the mth subcarrier.
In the method of the present invention, it is assumed that each user only occupies one subcarrier, and each subcarrier has 2 users, then K is 2M, and UC is used1,mAnd UC2,mRespectively representing sub-carriers SCmTwo users of, SCmThe user pair of (1) can be expressed as UCm={UC1,m,UC2,m},
Figure BDA0003092454760000093
n ∈ {1, 2}, and
Figure BDA0003092454760000094
representing base stations to SCmThe channel coefficients of the last 1 st user,
Figure BDA0003092454760000095
representing base stations to SCmChannel coefficient of last 2 nd user, UC1,mAnd UC2,mPower is p respectively1,mAnd p2,m. The maximum total transmitting power of a downlink multi-carrier NOMA system base station is P, the sum of the transmitting power of all users cannot be larger than P, namely the requirement of meeting
Figure BDA0003092454760000096
At the receiving end, considering the conservative eavesdropping condition, the eavesdropper can also successfully perform SIC to decode the user information.
In step a, based on the downlink multi-carrier NOMA system, the expression of the joint optimization problem of the user subcarrier matching and the user power allocation is as follows:
Figure BDA0003092454760000097
wherein, { UCn,mDenotes user sub-carrier matching, UCn,mDenotes the nth user on the mth subcarrier, { pn,mDenotes user power allocation, pn,mIndicating user UCn,mThe power of the user is set to be,
Figure BDA0003092454760000101
indicating user UCn,mSecurity capacity of Rn,mIndicating user UCn,mThe achievable rate of the speed of the motor,
Figure BDA0003092454760000102
indicating user UCn,mEavesdropping rate of, RminRepresents the minimum achievable rate in a downlink multi-carrier NOMA system,
Figure BDA0003092454760000103
for the total user set of the downlink multi-carrier NOMA system,
Figure BDA0003092454760000104
for the subcarrier set, UC, of downlink multicarrier NOMA systemsn′,m′And (3) representing the nth user on the mth sub-carrier, wherein M is 1, 2, …, and M is the total number of sub-carriers in the downlink multi-carrier NOMA system.
In the embodiment of the present invention, the specific operation of step B is as follows:
step B01, according to the channel of each user in the downlink multi-carrier NOMA system, obtaining the total user set of the channel descending sequence arrangement
Figure BDA0003092454760000105
And K is the total number of users in the downlink multi-carrier NOMA system.
Step B02, total user set
Figure BDA00030924547600001011
The front K/2 users and the back K/2 users in the system are pairwise paired to obtain a user pairing set
Figure BDA0003092454760000106
Wherein, UiRepresents the ith user pair, Ui={i,i+M},i=1,2,…,M,M=K/2。
Step B03, aiming at user pair UiAccording to the user to UiAll subcarriers in a downlink multicarrier NOMA system are subjected to descending order arrangement by channels on each subcarrier to obtain a user pair UiSubcarrier priority list PL _ SC (U)i)。
In the embodiment of the present invention, as shown in fig. 3, the specific operation of step C is as follows:
step C01, initializing random number lambda, making unmatched user pair set
Figure BDA0003092454760000107
Subcarrier matching set
Figure BDA0003092454760000108
And subcarrier matching capacity
Figure BDA0003092454760000109
Wherein λ is a positive integer.
Step C02, when
Figure BDA00030924547600001010
And then, all the user pairs in the { U _ un } simultaneously send matching requests to the subcarriers with the highest priority in the priority lists of the respective subcarriers, calculate the power of each unmatched user pair on each subcarrier, and obtain the secret capacity of each unmatched user pair on each subcarrier.
201. Unmatched user pairs UiThe power on the mth subcarrier is calculated as follows:
Figure BDA0003092454760000111
p2,m=pm-p1,m (11)
Figure BDA0003092454760000112
wherein p is1,mRepresents the user to UiThe power on the m-th sub-carrier of the 1 st user,
Figure BDA0003092454760000113
represents the channel coefficients from the base station to the nth user on the mth subcarrier, n ∈ {1, 2}, σ2Representing the channel noise variance, p, over the sub-carriersmDenotes the power of the m-th sub-carrier, p2,mRepresents the user to UiThe power on the m sub-carrier of the 2 nd user,
Figure BDA0003092454760000114
Figure BDA0003092454760000115
gmrepresenting the channel coefficients from the base station to the eavesdropper,
Figure BDA0003092454760000116
representing the minimum power of the mth subcarrier.
202. According to user pairs UiPower (p) on the m-th subcarrier1,mAnd p2,m) Computing user pairs UiThe reachable rate and the interception rate of each user are calculated by the following specific calculation formula:
Figure BDA0003092454760000117
Figure BDA0003092454760000118
wherein R isn,mRepresents the user to UiThe achievable rate of the nth user on the mth subcarrier,
Figure BDA0003092454760000121
represents the user to UiThe eavesdropping rate of the nth user on the mth subcarrier,
Figure BDA0003092454760000122
represents the m on the sub-carrier
Figure BDA0003092454760000123
The power of the individual user.
203. Calculating user pair U according to user reachable rate and eavesdropping rateiThe privacy rate of each user:
Figure BDA0003092454760000124
wherein,
Figure BDA0003092454760000125
represents the user to UiThe secret rate of the nth user on the mth sub-carrier.
204. Calculating user pairs U according to the secret rate of each useriSecret capacity on mth subcarrier:
Figure BDA0003092454760000126
and step C03, determining the matched user pair of each subcarrier according to the secret capacity of the user pair on the subcarrier, the subcarrier matching set and the subcarrier matching capacity, and updating the subcarrier matching set, the subcarrier priority list and the unmatched user pair set.
In the invention, all unmatched user pairs can simultaneously send matching requests to respective optimal subcarriers, and if the subcarriers are not matched, only one request is received to be matched with the user pairAnd if a plurality of requests exist, selecting the user pair with the maximum secret capacity for matching, and if the subcarriers match the user pairs in the previous stage, comparing the requested user pairs with the matched user pairs, and selecting the user pair with the maximum secret capacity for matching. The successfully matched user pair is deleted from the { U _ un }, the user pair which is refused to request is still classified into the { U _ un }, the matching is continuously carried out until the complete matching is completed,
Figure BDA0003092454760000127
the specific operation of step C03 is as follows:
301. when m sub-carrier SCmMatched set of subcarriers
Figure BDA0003092454760000128
When it is, it is considered to be SCmUnmatched from to SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiAs SCmIs matched with the user pair, is matched with the user pair UiAdd { SC _ m (m) }, add SCmDeleting the user pairs from the subcarrier priority lists of other unmatched user pairs and combining the user pairs UiDeleted from the set of unmatched user pairs { U _ un }.
302. When m sub-carrier SCmMatched set of subcarriers
Figure BDA0003092454760000131
When it is, it is considered to be SCmAlready paired with user UjMatching, j ≠ 1, 2, …, M and j ≠ i, from SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiPair users to UiAt SCmSecurity capacity of
Figure BDA0003092454760000132
And SCmSub-carrier matching capacity of
Figure BDA0003092454760000133
By comparison, when
Figure BDA0003092454760000134
Then, SCmRejecting user pairs UiIs requested to match the SCmFrom user to UiSubcarrier priority list PL _ SC (U)i) Deleting; when in use
Figure BDA0003092454760000135
Then, select the user to UiAs SCmOf the matched user pair, SCmRejecting user pairs UjBy using the user pairs UiReplace user pair U in { SC _ m (m) }jTo connect SCmFrom user to UjSubcarrier priority list PL _ SC (U)j) Deleting and pairing the user with UjAnd adding the unmatched user pair set (U _ un).
Step C04, repeating the steps (2) and (3) according to the updated subcarrier matching set, the subcarrier priority list and the unmatched user pair set until the steps are finished
Figure BDA0003092454760000136
And establishing matching relation of all users to the sub-carriers.
And step C05, updating the data on each subcarrier according to the matched user pair, and completing the matching operation of the subcarriers and the user pairs. Set user to UiFor the m sub-carrier SCmThen the specific operation of step C05 is:
couple users to UiAnd the m sub-carrier SCmThe matching is carried out in a matching way,
Figure BDA0003092454760000137
and according to the user pair UiUpdating subcarriers SC in sequencemMatched user pairs, subcarrier matching capacity and user power allocation of, wherein the subcarriers SC are updatedmThe operation of matching user pairs of (1) is as follows:
Figure BDA0003092454760000141
wherein,
Figure BDA0003092454760000142
representing subcarriers SCmIs matched with the user pair, UC1,mDenotes the 1 st user on the m sub-carrier, UC2,mRepresenting the 2 nd user on the mth subcarrier.
The operation of updating the subcarrier matching capacity and the user power allocation is as follows:
Figure BDA0003092454760000143
Figure BDA0003092454760000144
wherein,
Figure BDA0003092454760000145
and
Figure BDA0003092454760000146
respectively represent the m-th sub-carrier SCmThe power allocation values of the 1 st and 2 nd users.
Step C06, updating the random number lambda according to the preset updating step length, judging whether the lambda is converged, and returning to the step C01 to perform iterative operation when the lambda is not converged; when λ converges, the iteration ends, according to the final
Figure BDA0003092454760000147
And
Figure BDA0003092454760000148
user subcarrier matching and user power allocation are obtained that maximizes secret throughput.
In step C06, the formula for updating the random number λ according to the preset update step is as follows:
Figure BDA0003092454760000149
where θ is the update step.
To verify the effect of the method of the invention, the following comparative experiments are given:
the total transmission bandwidth B of the downlink multi-carrier NOMA system is 5MHz, and the channel noise variance on each subcarrier is
Figure BDA00030924547600001410
Wherein the noise power spectral density N0-70 dBm. At subcarrier SCmIn the above, the channel gain from the base station to the k-th user is defined as
Figure BDA00030924547600001411
A is the path loss exponent of the path loss,
Figure BDA00030924547600001412
is the gain of the rayleigh fading channel,
Figure BDA00030924547600001413
is the distance between user k and the base station, and the channel gain from the base station to the eavesdropper is defined as
Figure BDA00030924547600001414
deIs the distance between the eavesdropper and the base station, by default
Figure BDA00030924547600001415
The comparison experiments are respectively carried out in the user sets
Figure BDA00030924547600001416
The total number K is 10, K is 20, the NOMA scheme and the OFDMA reference scheme of the invention are simulated, and the secret system throughput R in different schemes is discussed in comparisons
Figure BDA0003092454760000151
With the base station transmitting power P, the minimum achievable rate RminAnd distance d of base station and eavesdroppereThe results of the specific guidelines of (1) are shown in FIGS. 4 to 6.
FIG. 4 shows two downlinks, NOMA and OFDMA, for different total number of usersSystem secret throughput R in multi-carrier resource allocation schemesRelation to base station transmission power P, wherein user minimum achievable rate R is setmin1Mbps, distance d from base station to eavesdroppere50 m. As can be seen from FIG. 4, the secret throughput RsIncreasing with increasing base station transmission power P, and as P continues to increase, the secret throughput RsThe increase speed of the network is gradually slowed and tends to be stable, because the larger the transmission power of the base station is, the larger the power of signals received by a user and an eavesdropper after path loss is, and the user privacy capacity is monotonically increased with respect to the power; in addition, subcarrier SCmUpper user UCn,mSecurity capacity of
Figure BDA0003092454760000152
Is the difference between two logarithmic functions for P, the derivative of which decreases with increasing P, approaching 0 but greater than 0, so that as P increases, the system secret throughput R increasessThe rate of increase of (b) becomes slow and tends to be stable. As is apparent from FIG. 4, in the user set
Figure BDA0003092454760000153
Under the condition that the total number K is 10 and the total number K is 20, the NOMA scheme is superior to the OFDMA scheme, because the information of one user is transmitted on one subcarrier of the OFDMA scheme, the spectrum efficiency is lower, while one subcarrier in the NOMA transmission provided by the invention transmits two users, the NOMA transmission has diversity advantage, and the NOMA transmission method combines user subcarrier matching and power distribution, and can improve the safety performance of multicarrier NOMA to the maximum extent under the limitation of user QoS.
FIG. 5 shows the system secret throughput R in the method of the invention for different total number of users and different maximum transmission powersMinimum achievable rate with user RminThe maximum base station transmitting power P is 10dBm and 30dBm, and the distance d between the base station and the eavesdroppere50 m. FIG. 5 illustrates QoS requirements versus system secret throughput RsWith the influence of RminIncrease of (A) RsIs reduced because RminIncrease in required transmitter utilizationThe external power is used to increase the data rate of users with poor channel conditions, so when R isminWhen it becomes very large, P cannot meet the QoS requirements of all users, the base station does not send messages to the users, R s0. It can also be seen from FIG. 5 that the same number of users, the larger P and RsThe later the drop is, because the larger P can provide higher QoS requirements for the users, and the later the drop is for the number of users, when the power is the same, because the limited power can meet the higher QoS requirements of these minority users.
FIG. 6 shows the system secret throughput R in the NOMA scheme and OFDMA scheme of the present invention at different total users and different maximum transmit powerssDistance d from base station to eavesdroppereIn which the user minimum achievable rate R is setminThe base station transmission power P is 20dBm and 30dBm at 1 Mbps. As can be seen in FIG. 6, with the distance d from the base station to the eavesdroppereIncrease of (2), secret throughput RsThe ramp-up is very fast because the farther the distance is, the greater the path loss from the base station to the eavesdropper, and the channel gain gmThe worse the eavesdropper receives, the smaller the power of the signal, the smaller the eavesdropping rate, the subcarrier SCmUpper user UCn,mSecurity capacity of
Figure BDA0003092454760000161
The larger the system secret throughput RsThe larger, and at the same time, the secret throughput R of the NOMA scheme at different powerssAre higher than the OFDMA scheme, so the method of the present invention has higher security performance. In fig. 6, when P is 30dBm, system secrecy throughput R under NOMA and OFDMAsAt deStart to plateau at 1000m and R at 20dBmsAt deStarting to be stable at 500m, the smaller the total transmission power threshold is, the earlier the transmission power threshold can be kept stable, because the larger the power is, the larger the power received by the eavesdropper after the path loss is, the larger the eavesdropping rate is, the greater the risk of eavesdropping is, and the lower power condition is easier to reach the state that the eavesdropping risk tends to 0. It can also be seen from fig. 6 that in both NOMA and OFDMA schemes, when the base station is moving toDistance d of eavesdroppereSecret throughput R when continuously increasingsThe signal intercepted by the eavesdropper is subjected to large path loss and small power when the distance is far enough, the system continuously approaches a no-eavesdropper state, the rate of the eavesdropper tends to be 0, the privacy rate tends to be up, the privacy throughput tends to be throughput without the eavesdropper, and therefore, when the distance d from the base station to the eavesdropper is long enough, the distance d from the base station to the eavesdropper is short, the system is stableeWhen very large, the secret throughput of both the NOMA and OFDMA schemes will remain around the total throughput value without eavesdropping
Compared with the prior art, the method can obviously improve the safety performance of the system while ensuring that the service quality of all users is met.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (10)

1. The method for allocating the resources of the downlink multi-carrier NOMA system based on bilateral matching is characterized by comprising the following steps:
under the constraints of user reachable rate and base station transmission power, taking the secret throughput of a downlink multi-carrier NOMA system as a target function to obtain the joint optimization problem of user subcarrier matching and user power distribution;
carrying out user pairing on users in a downlink multi-carrier NOMA system to obtain a user pair set, and obtaining a subcarrier priority list of each user pair in the user pair set;
and based on the joint optimization problem, performing resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
2. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 1, wherein the downlink multi-carrier NOMA system comprises a base station, K users and 1 eavesdropper, and the downlink multi-carrier NOMA system has M sub-carriers in total, where K is 2M.
3. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching according to claim 1, wherein the expression of the joint optimization problem of user sub-carrier matching and user power allocation is as follows:
Figure FDA0003092454750000011
Figure FDA0003092454750000012
Figure FDA0003092454750000013
pn,m≥0
Figure FDA0003092454750000021
Figure FDA0003092454750000022
wherein, { UCn,mDenotes user sub-carrier matching, UCn,mDenotes the nth user on the mth subcarrier, { pn,mDenotes user power allocation, pn,mIndicating user UCn,mThe power of the user is set to be,
Figure FDA0003092454750000023
indicating user UCn,mSecurity capacity of Rn,mIndicating user UCn,mThe achievable rate of the speed of the motor,
Figure FDA0003092454750000024
indicating user UCn,mEavesdropping rate of, RminRepresents the minimum value of the reachable rate in the downlink multi-carrier NOMA system, P represents the maximum total transmitting power of the base station in the downlink multi-carrier NOMA system,
Figure FDA0003092454750000025
for the total user set of the downlink multi-carrier NOMA system,
Figure FDA0003092454750000026
for the subcarrier set, UC, of downlink multicarrier NOMA systemsn′,m′And (3) representing the nth user on the mth sub-carrier, wherein M is 1, 2, …, and M is the total number of sub-carriers in the downlink multi-carrier NOMA system.
4. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching according to claim 1, wherein the method for obtaining the subcarrier priority list of each user pair in the user pair set and the user pair set comprises:
acquiring a total user set of channel descending order arrangement according to the channel of each user in a downlink multi-carrier NOMA system
Figure FDA0003092454750000027
K is the total number of users in the downlink multi-carrier NOMA system;
set total users
Figure FDA0003092454750000028
The front K/2 users and the back K/2 users in the system are pairwise paired to obtain a user pairing set
Figure FDA0003092454750000029
Wherein, UiRepresents the ith user pair, UiI 1, 2, …, M K/2, where M is the neutron in the downlink multicarrier NOMA systemThe total number of carriers;
for user to UiAccording to the user to UiAll subcarriers in a downlink multicarrier NOMA system are subjected to descending order arrangement by channels on each subcarrier to obtain a user pair UiA subcarrier priority list.
5. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 1 or 4, wherein the method for obtaining user sub-carrier matching and user power allocation that maximizes the secret throughput comprises the following steps:
(1) initializing random number lambda to make unmatched user pair set
Figure FDA0003092454750000031
Subcarrier matching set
Figure FDA0003092454750000032
And subcarrier matching capacity
Figure FDA0003092454750000033
Wherein λ is a positive integer, M is 1, 2, …, M;
(2) when in use
Figure FDA0003092454750000034
Then, all the user pairs in { U _ un } send matching requests to the subcarriers with the highest priority in the subcarrier priority lists of the user pairs at the same time, calculate the power of each unmatched user pair on each subcarrier, and obtain the secret capacity of each unmatched user pair on each subcarrier;
(3) matching judgment is carried out according to the secret capacity of the user on the subcarriers, the subcarrier matching set and the subcarrier matching capacity, a matching user pair of each subcarrier is determined, and the subcarrier matching set, the subcarrier priority list and the unmatched user pair set are updated;
(4) repeating according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair setStep (2) and step (3) until
Figure FDA0003092454750000035
(5) Updating data on each subcarrier according to the matched user pair to complete matching operation of the subcarriers and the user pair;
(6) and (3) updating the random number lambda according to a preset updating step length, judging whether the lambda is converged, returning to the step (1) when the lambda is not converged, and otherwise, ending iteration to obtain user subcarrier matching and user power distribution which enable the secret throughput to be maximized.
6. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 5, wherein in step (2), the user pairs UiThe power on the mth subcarrier is calculated as follows:
Figure FDA0003092454750000041
p2,m=pm-p1,m
Figure FDA0003092454750000042
wherein p is1,mRepresents the user to UiThe power on the m-th sub-carrier of the 1 st user,
Figure FDA0003092454750000043
Rminrepresents the minimum achievable rate in a downlink multi-carrier NOMA system, BscWhich represents the bandwidth of the sub-carriers,
Figure FDA0003092454750000044
Figure FDA0003092454750000045
represents the channel coefficients from the base station to the nth user on the mth subcarrier, n ∈ {1, 2}, σ2Representing the channel noise variance, p, over the sub-carriersmDenotes the power of the m-th sub-carrier, p2,mRepresents the user to UiThe power on the m sub-carrier of the 2 nd user,
Figure FDA0003092454750000046
Figure FDA0003092454750000047
gmrepresenting the channel coefficients from the base station to the eavesdropper,
Figure FDA0003092454750000048
representing the minimum power of the mth subcarrier.
7. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 5, wherein in step (2), the user pairs UiThe method for calculating the secret capacity on the mth subcarrier comprises the following steps:
according to user pairs UiCalculating user pairs U in power on mth subcarrieriThe reachable rate and the eavesdropping rate of each user;
calculating user pair U according to user reachable rate and eavesdropping rateiThe privacy rate of each user:
Figure FDA0003092454750000051
wherein,
Figure FDA0003092454750000052
represents the user to UiThe secret rate of the nth user on the mth sub-carrier, n is equal to {1, 2}, Rn,mRepresents the user to UiThe achievable rate of the nth user on the mth subcarrier,
Figure FDA0003092454750000053
represents the user to UiThe interception rate of the nth user on the mth subcarrier;
calculating user pairs U according to the secret rate of each useriSecret capacity on mth subcarrier:
Figure FDA0003092454750000054
8. the method for allocating downlink multi-carrier NOMA system resources based on bilateral matching according to claim 5, wherein the specific operation of step (3) is as follows:
when m sub-carrier SCmMatched set of subcarriers
Figure FDA0003092454750000055
When it is, it is considered to be SCmUnmatched from to SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiAs SCmIs matched with the user pair, is matched with the user pair UiAdd { SC _ m (m) }, add SCmDeleting the user pairs from the subcarrier priority lists of other unmatched user pairs and combining the user pairs UiDeleting from the set { U _ un } of unmatched user pairs;
when m sub-carrier SCmMatched set of subcarriers
Figure FDA0003092454750000056
When it is, it is considered to be SCmAlready paired with user UjMatching, j ≠ 1, 2, …, M and j ≠ i, from SCmSelecting the user pair U with the maximum security capacity from all the user pairs sending the matching requestiPair users to UiAt SCmSecurity capacity of
Figure FDA0003092454750000057
And SCmIs a sub-carrierWave matching capacity
Figure FDA0003092454750000058
By comparison, when
Figure FDA0003092454750000059
Then, SCmRejecting user pairs UiIs requested to match the SCmFrom user to UiSubcarrier priority list PL _ SC (U)i) Deleting; when in use
Figure FDA00030924547500000510
Then, select the user to UiAs SCmOf the matched user pair, SCmRejecting user pairs UjBy using the user pairs UiReplace user pair U in { SC _ m (m) }jTo connect SCmFrom user to UjSubcarrier priority list PL _ SC (U)j) Deleting and pairing the user with UjAnd adding the unmatched user pair set (U _ un).
9. The method of claim 5 for resource allocation in downlink multi-carrier NOMA system based on bilateral matching, wherein the method comprises setting a user pair UiFor the m sub-carrier SCmIf the user pairs are matched, the specific operation of the step (5) is as follows:
couple users to UiAnd the m sub-carrier SCmThe matching is carried out in a matching way,
Figure FDA0003092454750000061
and according to the user pair UiUpdating subcarriers SC in sequencemMatched user pair, subcarrier matching capacity and user power allocation, wherein the subcarriers SCmThe matching user pairs of (1) are as follows:
Figure FDA0003092454750000062
wherein,
Figure FDA0003092454750000063
representing subcarriers SCmIs matched with the user pair, UC1,mDenotes the 1 st user on the m sub-carrier, UC2,mRepresenting the 2 nd user on the mth subcarrier.
10. The method for allocating downlink multi-carrier NOMA system resources based on bilateral matching as claimed in claim 5, wherein in step (6), the formula for updating the random number λ according to the preset updating step is as follows:
Figure FDA0003092454750000064
wherein, θ is an updating step length, and P represents the maximum total transmitting power of the base station in the downlink multi-carrier NOMA system.
CN202110600160.XA 2021-05-31 2021-05-31 Downlink multi-carrier NOMA system resource allocation method based on bilateral matching Active CN113423141B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110600160.XA CN113423141B (en) 2021-05-31 2021-05-31 Downlink multi-carrier NOMA system resource allocation method based on bilateral matching

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110600160.XA CN113423141B (en) 2021-05-31 2021-05-31 Downlink multi-carrier NOMA system resource allocation method based on bilateral matching

Publications (2)

Publication Number Publication Date
CN113423141A true CN113423141A (en) 2021-09-21
CN113423141B CN113423141B (en) 2023-06-23

Family

ID=77713299

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110600160.XA Active CN113423141B (en) 2021-05-31 2021-05-31 Downlink multi-carrier NOMA system resource allocation method based on bilateral matching

Country Status (1)

Country Link
CN (1) CN113423141B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110430613A (en) * 2019-04-11 2019-11-08 重庆邮电大学 Resource allocation methods of the multicarrier non-orthogonal multiple access system based on efficiency
CN110856247A (en) * 2019-11-21 2020-02-28 重庆邮电大学 Downlink NOMA power distribution method and system based on service quality

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110430613A (en) * 2019-04-11 2019-11-08 重庆邮电大学 Resource allocation methods of the multicarrier non-orthogonal multiple access system based on efficiency
CN110856247A (en) * 2019-11-21 2020-02-28 重庆邮电大学 Downlink NOMA power distribution method and system based on service quality

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YANG Z, ETC.: "A general power allocation scheme to guarantee quality of service in downlink and uplink NOMAsystems", 《IEEE》, pages 7244 - 7257 *
雒艳: "面向非正交多址接入的资源分配方法研究", 《软件》, vol. 42, no. 4, pages 135 - 137 *

Also Published As

Publication number Publication date
CN113423141B (en) 2023-06-23

Similar Documents

Publication Publication Date Title
Huang et al. Energy-efficient SWIPT in IoT distributed antenna systems
Zhang et al. Interference-aware graph based resource sharing for device-to-device communications underlaying cellular networks
CN108834112B (en) NOMA-based relay-assisted D2D communication system power distribution method
CN108718445B (en) QoS-driven D2D secure communication resource allocation method
CN109714817B (en) Communication system power allocation method using NOMA and D2D groups
CN107995615B (en) Heterogeneous network NOMA physical layer safety transmission method
CN106211302A (en) Non-orthogonal multiple accesses isomery UNE resource allocation methods
Zuo et al. Power allocation optimization for uplink non-orthogonal multiple access systems
CN105517134B (en) Support the association of isomery converged network federated user and the power distribution method of safe information transmission
Dai et al. Interference-aware resource allocation for D2D underlaid cellular network using SCMA: A hypergraph approach
CN106028456B (en) The power distribution method of virtual subdistrict in a kind of 5G high density network
CN107172706B (en) Joint wireless resource allocation and power control method based on D2D communication
Cheng et al. Two-step user pairing for OFDM-based cooperative NOMA systems
CN106912059B (en) Cognitive relay network joint relay selection and resource allocation method supporting mutual information accumulation
CN106028364A (en) Virtual cell forming method for 5G high-density network
Ren et al. Resource allocation based on clustering algorithm for hybrid device-to-device networks
CN106162855B (en) It communicates in conjunction with more D2D of subcarrier distribution and power control to resource allocation methods
CN112469113A (en) Resource allocation method and device of multi-carrier NOMA system
Yan et al. An adaptive subcarrier, bit and power allocation algorithm for multicell OFDM systems
CN113423141A (en) Bilateral matching-based downlink multi-carrier NOMA system resource allocation method
Wang et al. Time-efficient uplink data collection for UAV-assisted NOMA networks
Khodeir et al. Secrecy outage performance with EH and TAS for realistic underlay cognitive radio networks using MIMO systems
CN105681110B (en) Safe transmission wirelessly takes joint network selection and the resource allocation methods of energy network
Zhao et al. Joint time and power allocation algorithm in NOMA relaying network
ElHalawany et al. Uplink IoT networks: Time-division priority-based non-orthogonal multiple access approach

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant