CN113423141B - Downlink multi-carrier NOMA system resource allocation method based on bilateral matching - Google Patents

Downlink multi-carrier NOMA system resource allocation method based on bilateral matching Download PDF

Info

Publication number
CN113423141B
CN113423141B CN202110600160.XA CN202110600160A CN113423141B CN 113423141 B CN113423141 B CN 113423141B CN 202110600160 A CN202110600160 A CN 202110600160A CN 113423141 B CN113423141 B CN 113423141B
Authority
CN
China
Prior art keywords
user
subcarrier
matching
pair
noma system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110600160.XA
Other languages
Chinese (zh)
Other versions
CN113423141A (en
Inventor
徐鼎
黎家慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Posts and Telecommunications filed Critical Nanjing University of Posts and Telecommunications
Priority to CN202110600160.XA priority Critical patent/CN113423141B/en
Publication of CN113423141A publication Critical patent/CN113423141A/en
Application granted granted Critical
Publication of CN113423141B publication Critical patent/CN113423141B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0473Wireless resource allocation based on the type of the allocated resource the resource being transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/542Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/543Allocation or scheduling criteria for wireless resources based on quality criteria based on requested quality, e.g. QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, and aims to solve the problem that the prior art lacks safety-oriented multi-carrier NOMA system resource allocation research. Unlike the single carrier NOMA system, which uses only one carrier for information transmission, the invention considers the downlink transmission of the multi-carrier NOMA system, and provides a user and subcarrier matching method based on a bilateral matching algorithm and a subcarrier power distribution method based on a binary search algorithm with the aim of maximizing the system secret throughput under the requirements of the user reachable rate and the limitation of the total power. The invention can obviously improve the system safety performance while ensuring that the service quality of all users is met.

Description

Downlink multi-carrier NOMA system resource allocation method based on bilateral matching
Technical Field
The invention relates to a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, and belongs to the technical field of wireless communication.
Background
The multi-carrier access system divides the multi-total frequency band bandwidth into sub-carriers and distributes the sub-carriers to users, so that the spectrum utilization rate can be optimized, in addition, various wireless terminal devices are increased in an explosion mode, the requirement on mass connectivity is urgent, and the research of the multi-carrier NOMA system is promoted to be focused more and more. For a multi-carrier NOMA system, to fully utilize the advantages of NOMA technology, it is critical how to optimally allocate power, sub-carriers and other resources to users, so as to maximize system performance. The throughput or energy efficiency of the existing research multi-purpose system for the NOMA system is used as an optimization target, and the optimization for the safety performance is considered less, but in the NOMA technology, a carrier wave transmits a superposition signal of a plurality of users, and an eavesdropper intercepts the signal and then affects all users in a cluster, so the safety of the NOMA system is worth considering.
In addition, the security discussion about the NOMA system is focused on the single-carrier NOMA system, and the problem of resource allocation of the multi-carrier NOMA system facing the security only discusses specific relay scenes, which is unfavorable for the development and application of the multi-carrier NOMA system.
Disclosure of Invention
Aiming at the problem that the prior art lacks of research on resource allocation of a multi-carrier NOMA system facing safety, the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which can maximize the secret throughput of the system under the requirements of the user reachable rate and the total power limit so as to improve the safety performance of the multi-carrier NOMA system.
In order to solve the technical problems, the invention adopts the following technical means:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which comprises the following steps:
under the constraint of the user reachable rate and the base station transmission power, the secret throughput of the downlink multi-carrier NOMA system is used as an objective function, and the joint optimization problem of user subcarrier matching and user power distribution is obtained;
user pairing is carried out on users in the downlink multi-carrier NOMA system, a user pair set is obtained, and a subcarrier priority list of each user pair in the user pair set is obtained;
and based on the joint optimization problem, carrying out resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list, and obtaining user subcarrier matching and user power distribution which maximize the secret throughput.
Further, the downlink multi-carrier NOMA system includes a base station, K users and 1 eavesdropper, and the downlink multi-carrier NOMA system has M subcarriers, where k=2m.
Further, the expression of the joint optimization problem of user subcarrier matching and user power allocation is as follows:
Figure BDA0003092454760000021
Figure BDA0003092454760000031
Figure BDA0003092454760000032
wherein { UC n,m The symbol UC indicates the subcarrier matching of the user n,m Represents the nth user on the mth subcarrier, { p n,m ' represent user power allocation, p n,m Indicating user UC n,m The power of the user is used to determine,
Figure BDA0003092454760000033
indicating user UC n,m Is a secret capacity of R n,m Indicating user UC n,m Is (are) achievable rate,/->
Figure BDA0003092454760000034
Indicating user UC n,m Is equal to the eavesdropping rate of R min Representing the minimum achievable rate in a downlink multi-carrier NOMA system, P representing the maximum total transmit power of the base station in the downlink multi-carrier NOMA system,/->
Figure BDA0003092454760000035
For the total user set of the downstream multi-carrier NOMA system +.>
Figure BDA0003092454760000036
UC is a subcarrier set of a downlink multicarrier NOMA system n′,m′ The nth user on the mth subcarrier is represented, m=1, 2, …, M is the total number of subcarriers in the downlink multicarrier NOMA system.
Further, the method for obtaining the user pair set and the subcarrier priority list of each user pair in the user pair set comprises the following steps:
acquiring a total user set of channel descending order according to the channel of each user in a downlink multi-carrier NOMA system
Figure BDA0003092454760000037
K is the total number of users in the downlink multi-carrier NOMA system;
to collect the total users
Figure BDA0003092454760000039
The first K/2 users and the last K/2 users are paired in pairs to obtain a user pair set
Figure BDA0003092454760000038
Wherein U is i Represents the ith user pair, U i = { i, i+m }, i=1, 2, …, M, m=k/2, M being the total number of subcarriers in the downlink multicarrier NOMA system;
for user pair U i According to the user pair U i The channels on each subcarrier are used for descending order arrangement of all subcarriers in a downlink multi-carrier NOMA system, and the user pair U is obtained i Is included in the list of subcarrier priorities.
Further, the method for obtaining the subcarrier matching of the user and the power allocation of the user which maximize the secret throughput comprises the following steps:
(1) Initializing a random number lambda to make unmatched user pairs collect
Figure BDA0003092454760000041
Subcarrier matching set
Figure BDA0003092454760000042
And subcarrier matching capacity->
Figure BDA0003092454760000043
Wherein λ is a positive integer, m=1, 2, …, M;
(2) When (when)
Figure BDA0003092454760000044
When in use, all user pairs in { U_un } send matching requests to the subcarriers with highest priority in the priority list of the respective subcarriers simultaneously, and each unmatched user pair is calculated on each subcarrierAnd obtaining the secret capacity of each unmatched user pair on each subcarrier;
(3) According to the secret capacity, the subcarrier matching set and the subcarrier matching capacity of the user on the subcarriers, matching user pairs of each subcarrier are determined, and the subcarrier matching set, the subcarrier priority list and the unmatched user pair set are updated;
(4) Repeating (2) and (3) according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair set until
Figure BDA0003092454760000045
(5) Updating the data on each subcarrier according to the matched user pair, and completing the matching operation of the subcarrier and the user pair;
(6) And (3) updating the random number lambda according to a preset updating step length, judging whether lambda is converged, returning to the step (1) when lambda is not converged, otherwise, ending iteration, and obtaining user subcarrier matching and user power distribution which maximize the secret throughput.
Further, in step (2), the user performs a process on U i The power on the m-th subcarrier is calculated as follows:
Figure BDA0003092454760000051
p 2,m =p m -p 1,m (3)
Figure BDA0003092454760000052
wherein p is 1,m Representing the user pair U i The power of the 1 st user on the m-th subcarrier,
Figure BDA0003092454760000053
R min representing the minimum achievable rate in a downstream multi-carrier NOMA system, B sc Representing subcarriersIs used for the transmission of the bandwidth of (a),
Figure BDA0003092454760000054
Figure BDA0003092454760000055
representing the channel coefficients of the base station to the nth user on the mth subcarrier, n E {1,2}, sigma 2 Representing channel noise variance over subcarriers, p m Represents the power of the mth subcarrier, p 2,m Representing the user pair U i Power of the 2 nd user on the m th subcarrier,/and>
Figure BDA0003092454760000056
Figure BDA0003092454760000057
g m representing the channel coefficient of the base station to the eavesdropper, +.>
Figure BDA0003092454760000058
Representing the minimum power of the mth subcarrier.
Further, in step (2), the user performs a process on U i The method for calculating the secret capacity on the m-th subcarrier is as follows:
according to the user pair U i Power calculation user pair U on mth subcarrier i The reachable rate and the eavesdropping rate of each user;
calculating user pair U according to user's reachable rate and eavesdropping rate i Privacy rate for each user:
Figure BDA0003092454760000059
wherein,,
Figure BDA00030924547600000510
representing the user pair U i The secret rate of the nth user on the mth subcarrier, n epsilon {1,2}, R n,m Representing the user pair U i The nth user in (a) is at the mthAchievable rate on subcarrier, +.>
Figure BDA0003092454760000061
Representing the user pair U i The eavesdropping rate of the nth user on the mth subcarrier;
calculating user pair U according to privacy rate of each user i Secret capacity on the m-th subcarrier:
Figure BDA0003092454760000062
further, the specific operation of step (3) is as follows:
when the mth subcarrier SC m Subcarrier matching set of (2)
Figure BDA0003092454760000063
When considering SC m Is not matched from SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i As SC (SC) m Matching user pairs of (a), pair U i Add { SC_m (m) }, SC m Deleting from the subcarrier priority list of other unmatched user pairs, and adding the user pairs U i Deleting from the unmatched user pair set { U_un };
when the mth subcarrier SC m Subcarrier matching set of (2)
Figure BDA0003092454760000064
When considering SC m Has been matched with the user to U j Matching, j=1, 2, …, M and j+.i, from SC to SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i To U by user i At SC m Security capacity->
Figure BDA0003092454760000065
And SC (SC) m Subcarrier matching capacity +.>
Figure BDA0003092454760000066
Comparison, when->
Figure BDA0003092454760000067
When SC is m Rejecting user pair U i Match request of (C) to SC m From user to U i Subcarrier priority list pl_sc (U i ) Delete in the middle; when->
Figure BDA0003092454760000068
When selecting user pair U i As SC (SC) m Matched user pair, SC m Rejecting user pair U j By user to U i Substitution of user pairs U in { SC_m (m) } for j SC is put into m From user to U j Subcarrier priority list pl_sc (U j ) Delete and pair U by user j Add to the unmatched user pair set U _ un.
Further, set user pair U i For the m th subcarrier SC m The specific operation of step (5) is:
couple the user to U i And the m-th subcarrier SC m The matching is performed so that the matching is performed,
Figure BDA0003092454760000069
and according to the user pair U i Sequentially updating subcarriers SC m Matching user pairs, subcarrier matching capacity and user power allocation, wherein subcarriers SC m The matching user pairs of (a) are as follows:
Figure BDA0003092454760000071
wherein,,
Figure BDA0003092454760000072
representing subcarriers SC m Matching user pairs, UC 1,m Indicating the 1 st user on the m-th subcarrier, UC 2,m Representing the 2 nd user on the m-th subcarrier.
Further, in step (6), the formula for updating the random number λ according to the preset updating step is as follows:
Figure BDA0003092454760000073
wherein θ is an update step length, and P represents a maximum total transmit power of a base station in the downlink multi-carrier NOMA system.
The following advantages can be obtained by adopting the technical means:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which is different from a single-carrier NOMA system which uses only one carrier for information transmission. The method can obviously improve the system safety performance while ensuring that the service quality of all users is met.
Drawings
Fig. 1 is a flow chart of steps of a resource allocation method of a downlink multi-carrier NOMA system based on bilateral matching in the present invention;
fig. 2 is a schematic diagram of a downlink multi-carrier NOMA system according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating steps of user subcarrier matching and user power allocation in an embodiment of the present invention;
fig. 4 is a schematic diagram of the variation of the secret throughput with respect to P under different multiple access modes and total number of users according to an embodiment of the present invention;
FIG. 5 shows the secure throughput versus R for different transmit powers and total number of users in an embodiment of the invention min Schematic of the variation of (2);
FIG. 6 shows the secure throughput versus d for different multiple access modes and transmit powers in an embodiment of the invention e Is a variation of the schematic diagram.
Detailed Description
The technical scheme of the invention is further described below with reference to the accompanying drawings:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which is shown in figure 1 and comprises the following steps:
under the constraint of the user reachable rate and the base station transmission power, the secret throughput of a downlink multi-carrier NOMA system is taken as an objective function, and the joint optimization problem of user subcarrier matching and user power distribution is obtained;
step B, user pairing is carried out on users in the downlink multi-carrier NOMA system, a user pair set is obtained, and a subcarrier priority list of each user pair in the user pair set is obtained;
and C, carrying out resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list based on the joint optimization problem, and obtaining user subcarrier matching and user power distribution which maximize the secret throughput.
The scenario considered by the method of the invention is shown in figure 2, and a downlink multi-carrier NOMA system comprises a base station, K users and 1 eavesdropper, and the total user set of the system
Figure BDA0003092454760000081
Figure BDA0003092454760000091
The channels are arranged in descending order from user 1 to user K. There are M subcarriers in the downlink multicarrier NOMA system, where k=2m. The total spectrum bandwidth of the downlink multi-carrier NOMA system in the embodiment of the invention is B, and is divided into M sub-carriers, and the bandwidth of each sub-carrier is B sc The set of these sub-carriers is +.>
Figure BDA0003092454760000092
For the process according to the inventionSC m Representing the mth subcarrier.
In the method of the present invention, assuming that each user occupies only one subcarrier, and 2 users are on each subcarrier, k=2m, UC is used 1,m And UC (UC) 2,m Respectively represent subcarriers SC m Two users, SC m The user pair on the table may be represented as UC m ={UC 1,m ,UC 2,m },
Figure BDA0003092454760000093
n.epsilon. {1,2}, and +.>
Figure BDA0003092454760000094
Representing base station to SC m Channel coefficient of the 1 st user, +.>
Figure BDA0003092454760000095
Representing base station to SC m Channel coefficient of last user 2, UC 1,m And UC (UC) 2,m The powers are p respectively 1,m And p 2,m . The maximum total transmitting power of the base station of the downlink multi-carrier NOMA system is P, and the sum of transmitting power of all users cannot be larger than P, namely the sum of transmitting power of all users needs to meet +.>
Figure BDA0003092454760000096
At the receiving end, taking the conservative eavesdropping condition into consideration, the eavesdropper can also successfully perform SIC to decode the user information.
In step a, based on the downlink multi-carrier NOMA system, the expression of the joint optimization problem of user subcarrier matching and user power allocation is as follows:
Figure BDA0003092454760000097
wherein { UC n,m The symbol UC indicates the subcarrier matching of the user n,m Represents the nth user on the mth subcarrier, { p n,m ' represent user power allocation, p n,m Indicating user UC n,m The power of the user is used to determine,
Figure BDA0003092454760000101
indicating user UC n,m Is a secret capacity of R n,m Indicating user UC n,m Is (are) achievable rate,/->
Figure BDA0003092454760000102
Indicating user UC n,m Is equal to the eavesdropping rate of R min Representing the minimum achievable rate in a downstream multi-carrier NOMA system,/for>
Figure BDA0003092454760000103
For the total user set of the downstream multi-carrier NOMA system +.>
Figure BDA0003092454760000104
UC is a subcarrier set of a downlink multicarrier NOMA system n′,m′ The nth user on the mth subcarrier is represented, m=1, 2, …, M is the total number of subcarriers in the downlink multicarrier NOMA system.
In the embodiment of the present invention, the specific operation of step B is as follows:
step B01, obtaining a total user set of channel descending order according to the channel of each user in the downlink multi-carrier NOMA system
Figure BDA0003092454760000105
Wherein K is the total number of users in the downlink multi-carrier NOMA system.
Step B02, collecting the total users
Figure BDA00030924547600001011
The first K/2 users and the last K/2 users are paired in pairs to obtain a user pair set
Figure BDA0003092454760000106
Wherein U is i Represents the ith user pair, U i ={i,i+M},i=1,2,…,M,M=K/2。
Step B03, aiming at the user pair U i According to the user pair U i At each ofThe channels on the subcarriers are used for descending order arrangement of all subcarriers in a downlink multi-carrier NOMA system to obtain a user pair U i Subcarrier priority list pl_sc (U i )。
In the embodiment of the present invention, as shown in fig. 3, the specific operation of step C is as follows:
step C01, initializing a random number lambda to enable unmatched user pairs to be gathered
Figure BDA0003092454760000107
Subcarrier matching set
Figure BDA0003092454760000108
And subcarrier matching capacity->
Figure BDA0003092454760000109
Wherein λ is a positive integer.
Step C02, when
Figure BDA00030924547600001010
And simultaneously sending a matching request to the subcarrier with the highest priority in the priority list of the respective subcarriers by all the user pairs in the { U_un }, calculating the power of each unmatched user pair on each subcarrier, and obtaining the confidentiality capacity of each unmatched user pair on each subcarrier.
201. Unmatched user pair U i The power on the m-th subcarrier is calculated as follows:
Figure BDA0003092454760000111
p 2,m =p m -p 1,m (11)
Figure BDA0003092454760000112
wherein p is 1,m Representing the user pair U i The power of the 1 st user on the m-th subcarrier,
Figure BDA0003092454760000113
representing the channel coefficients of the base station to the nth user on the mth subcarrier, n E {1,2}, sigma 2 Representing channel noise variance over subcarriers, p m Represents the power of the mth subcarrier, p 2,m Representing the user pair U i The power of the 2 nd user on the m-th subcarrier,
Figure BDA0003092454760000114
Figure BDA0003092454760000115
g m representing the channel coefficient of the base station to the eavesdropper, +.>
Figure BDA0003092454760000116
Representing the minimum power of the mth subcarrier.
202. According to the user pair U i Power on the mth subcarrier (p 1,m And p 2,m ) Computing user pairs U i The specific calculation formula of the reachable rate and the eavesdropping rate of each user is as follows:
Figure BDA0003092454760000117
Figure BDA0003092454760000118
wherein R is n,m Representing the user pair U i The achievable rate of the nth user on the mth subcarrier,
Figure BDA0003092454760000121
representing the user pair U i The eavesdropping rate of the nth user on the mth subcarrier,/>
Figure BDA0003092454760000122
Representing on the mth subcarrierFirst->
Figure BDA0003092454760000123
Power of individual users.
203. Calculating user pair U according to user's reachable rate and eavesdropping rate i Privacy rate for each user:
Figure BDA0003092454760000124
wherein,,
Figure BDA0003092454760000125
representing the user pair U i The secret rate of the nth user on the mth subcarrier.
204. Calculating user pair U according to privacy rate of each user i Secret capacity on the m-th subcarrier:
Figure BDA0003092454760000126
and C03, according to the secret capacity of the user on the subcarrier, the subcarrier matching set and the subcarrier matching capacity, carrying out matching judgment, determining the matching user pair of each subcarrier, and updating the subcarrier matching set, the subcarrier priority list and the unmatched user pair set.
In the invention, all unmatched user pairs send matching requests to the respective optimal sub-carriers at the same time, if the sub-carriers are not matched, only one request is received to be matched with the user pair, if a plurality of requests are provided, the user pair with the largest confidentiality capacity is selected to be matched, if the sub-carriers are matched with the user pair in the previous stage, the requested user pair needs to be compared with the matched user pair, and the user pair with the largest confidentiality capacity is selected to be matched. The successfully matched user pairs are deleted from the { U_un } and the user pairs that are rejected for the request remain in the { U_un }, the matching is continued until the full matching is completed,
Figure BDA0003092454760000127
the specific operation of step C03 is as follows:
301. when the mth subcarrier SC m Subcarrier matching set of (2)
Figure BDA0003092454760000128
When considering SC m Is not matched from SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i As SC (SC) m Matching user pairs of (a), pair U i Add { SC_m (m) }, SC m Deleting from the subcarrier priority list of other unmatched user pairs, and adding the user pairs U i Deleted from the unmatched user pair set U _ un.
302. When the mth subcarrier SC m Subcarrier matching set of (2)
Figure BDA0003092454760000131
When considering SC m Has been matched with the user to U j Matching, j=1, 2, …, M and j+.i, from SC to SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i To U by user i At SC m Security capacity->
Figure BDA0003092454760000132
And SC (SC) m Subcarrier matching capacity +.>
Figure BDA0003092454760000133
When comparing
Figure BDA0003092454760000134
When SC is m Rejecting user pair U i Match request of (C) to SC m From user to U i Subcarrier priority list pl_sc (U i ) Delete in the middle; when->
Figure BDA0003092454760000135
When selecting user pair U i As SC (SC) m Matched user pair, SC m Rejecting user pair U j By user to U i Substitution of user pairs U in { SC_m (m) } for j SC is put into m From user to U j Subcarrier priority list pl_sc (U j ) Delete and pair U by user j Add to the unmatched user pair set U _ un.
Step C04, repeating the steps (2) and (3) according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair set until
Figure BDA0003092454760000136
And establishing a matching relation between all users and the subcarriers.
And step C05, updating the data on each subcarrier according to the matched user pair, and completing the matching operation of the subcarrier and the user pair. Set user pair U i For the m th subcarrier SC m The specific operation of step C05 is:
couple the user to U i And the m-th subcarrier SC m The matching is performed so that the matching is performed,
Figure BDA0003092454760000137
and according to the user pair U i Sequentially updating subcarriers SC m Matching user pairs, subcarrier matching capacity and user power allocation, wherein the subcarrier SC is updated m The operation of the matching user pair is as follows:
Figure BDA0003092454760000141
wherein,,
Figure BDA0003092454760000142
representing subcarriers SC m Matching user pairs, UC 1,m Indicating the 1 st user on the m-th subcarrier, UC 2,m Representing the 2 nd user on the m-th subcarrier.
The operations of updating subcarrier matching capacity and user power allocation are:
Figure BDA0003092454760000143
Figure BDA0003092454760000144
wherein (1)>
Figure BDA0003092454760000145
And->
Figure BDA0003092454760000146
Respectively represent the mth sub-carrier SC m The power allocation values for the 1 st and 2 nd users are above.
Step C06, updating the random number lambda according to a preset updating step length, judging whether lambda is converged, and returning to the step C01 to perform iterative operation when lambda is not converged; when lambda converges, the iteration is ended, according to the final
Figure BDA0003092454760000147
And->
Figure BDA0003092454760000148
User subcarrier matching and user power allocation that maximizes the secure throughput are obtained.
In step C06, the formula for updating the random number λ according to the preset updating step is as follows:
Figure BDA0003092454760000149
where θ is the update step size.
In order to verify the effect of the method of the invention, the following comparative experiments are given:
the total transmission bandwidth B of the downlink multi-carrier NOMA system is 5MHz, and the channel noise variance on each subcarrier is
Figure BDA00030924547600001410
Wherein the noise power spectral density N 0 = -70dBm. At subcarrier SC m From the base station to the kthThe channel gain of the user is defined as +.>
Figure BDA00030924547600001411
Alpha is the path loss index, < >>
Figure BDA00030924547600001412
Is the rayleigh fading channel gain,/->
Figure BDA00030924547600001413
Is the distance between user k and the base station, the base station to eavesdropper channel gain is defined as +.>
Figure BDA00030924547600001414
d e Is the distance between the eavesdropper and the base station, default +.>
Figure BDA00030924547600001415
The comparison experiments are respectively carried out on user sets
Figure BDA00030924547600001416
The NOMA scheme and OFDMA reference scheme of the present invention were simulated at total numbers k=10, k=20, in contrast to discussing the system privacy throughput R in different schemes s />
Figure BDA0003092454760000151
With base station transmit power P, minimum achievable rate R min And distance d of base station from eavesdropper e The specific guideline results are shown in fig. 4 to 6.
FIG. 4 shows the system secret throughput R in two downlink multi-carrier resource allocation schemes of NOMA and OFDMA under different total user numbers s A relation with the base station transmission power P, wherein the minimum achievable rate R of the user is set min Distance d of base station to eavesdropper =1 Mbps e =50m. As can be seen from fig. 4, the secure throughput R s As the base station transmit power P increases, and as P continues to increase, the secure throughput R s Gradually and gradually become flatThe reason for this is that the higher the base station's transmit power, the higher the power of the signal received by the user and eavesdropper after the path loss, and the user's secret capacity increases monotonically with respect to power; in addition, subcarrier SC m Upper user UC n,m Is of (1)
Figure BDA0003092454760000152
Regarding the difference between two logarithmic functions of P, the derivative thereof decreases as P increases, approaching 0 but being greater than 0, so that when P increases, the system privacy throughput R s The growth rate of (c) will slow and tend to stabilize. As is apparent from fig. 4, in the user set +.>
Figure BDA0003092454760000153
The NOMA scheme of the invention is superior to the OFDMA scheme under the total numbers of K=10 and K=20, because the OFDMA scheme transmits information of one user on one subcarrier, the frequency spectrum efficiency is lower, and one subcarrier in the NOMA transmission set by the invention transmits two users, thereby having diversity advantage, and the invention combines subcarrier matching and power distribution of the users, thereby improving the security performance of the multi-carrier NOMA to the maximum extent under the limit of QoS of the users.
FIG. 5 shows the system privacy throughput R in the method of the present invention at different total number of users and different maximum transmit power s Minimum achievable rate with user R min The relation between them, wherein the maximum base station transmission power P takes 10dBm, 30dBm, the distance d of the base station to the eavesdropper e =50m. Fig. 5 illustrates QoS requirements versus system privacy throughput R s With R min Is increased by R s Reduced because of R min The increase in (2) requires the transmitter to utilize additional power to increase the data rate of users with poor channel conditions, and thus, when R min When the size becomes very large, at this time P can not meet the QoS requirements of all users, the base station does not send messages to the users, R s =0. It can also be seen from FIG. 5 that when the number of users is the same, P is larger R s The later the drop, because the larger P can provide higher user QoS requirements, and the smaller the number of users drops when the power is the sameThe later, the more limited power can meet the QoS requirements of these few people because of the fewer users.
FIG. 6 shows the system privacy throughput R in the NOMA scheme and OFDMA scheme of the present invention at different total number of users and different maximum transmit powers s Distance d from base station to eavesdropper e A relation between them, in which the user minimum achievable rate R is set min Base station transmit power P takes 20dBm, 30dBm =1 Mbps. As can be seen in fig. 6, with the distance d of the base station from the eavesdropper e Increased privacy throughput R s The rise is very rapid because the farther the distance is, the greater the path loss from the base station to the eavesdropper, the channel gain g m The worse, the smaller the signal power received by the eavesdropper, the smaller the eavesdropping rate, the subcarrier SC m Upper user UC n,m Is of (1)
Figure BDA0003092454760000161
The larger the system privacy throughput R s The larger the secret throughput R of the NOMA scheme at the same time at different powers s Are higher than the OFDMA scheme, and thus the method of the present invention has higher security performance. In fig. 6, at p=30 dBm, NOMA and system privacy throughput R under OFDMA s At d e Start to plateau at=1000m, and R at p=20dbm s At d e Starting to stabilize at 500m, the total transmit power threshold can be kept stable earlier, because the larger the power, the larger the eavesdropper receives after the path loss, the larger the eavesdropping rate, the larger the eavesdropping risk, and the lower the power case is, the more easily the eavesdropping risk is towards 0. It can also be seen from fig. 6 that in both NOMA and OFDMA schemes, when the base station is at a distance d from the eavesdropper e With constant increase, the secure throughput R s Eventually, the system will remain stable because the signal intercepted by the eavesdropper will have a larger path loss and less power when the distance is far enough, the system will be approaching an eavesdroppless state, resulting in an eavesdropper rate of 0, a privacy rate of up to a reachable rate, and a privacy throughput of up to no eavesdropper throughput, so when the base station arrivesDistance d of eavesdropper e When very large, the secure throughput of both NOMA and OFDMA schemes will remain around the total throughput value without eavesdropping
Compared with the prior art, the method can obviously improve the system safety performance while ensuring that the service quality of all users is met.
The foregoing is merely a preferred embodiment of the present invention, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present invention, and such modifications and variations should also be regarded as being within the scope of the invention.

Claims (7)

1. The downlink multi-carrier NOMA system resource allocation method based on bilateral matching is characterized by comprising the following steps:
under the constraint of the user reachable rate and the base station transmission power, the secret throughput of the downlink multi-carrier NOMA system is used as an objective function, and the joint optimization problem of user subcarrier matching and user power distribution is obtained;
user pairing is carried out on users in the downlink multi-carrier NOMA system, a user pair set is obtained, and a subcarrier priority list of each user pair in the user pair set is obtained;
based on the joint optimization problem, carrying out resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list to obtain user subcarrier matching and user power distribution which maximize the secret throughput;
the expression of the joint optimization problem of user subcarrier matching and user power allocation is as follows:
Figure FDA0004219962490000011
Figure FDA0004219962490000012
Figure FDA0004219962490000013
p n,m ≥0
Figure FDA0004219962490000014
Figure FDA0004219962490000015
wherein { UC n,m The symbol UC indicates the subcarrier matching of the user n,m Represents the nth user on the mth subcarrier, { p n,m ' represent user power allocation, p n,m Indicating user UC n,m The power of the user is used to determine,
Figure FDA0004219962490000016
indicating user UC n,m Is a secret capacity of R n,m Indicating user UC n,m Is (are) achievable rate,/->
Figure FDA0004219962490000021
Indicating user UC n,m Is equal to the eavesdropping rate of R min Representing the minimum achievable rate in a downlink multi-carrier NOMA system, P representing the maximum total transmit power of the base station in the downlink multi-carrier NOMA system,/->
Figure FDA0004219962490000022
For the total user set of the downstream multi-carrier NOMA system +.>
Figure FDA0004219962490000023
UC is a subcarrier set of a downlink multicarrier NOMA system n′,m′ Representing the nth user on the mth subcarrier, m=1, 2, …, M being the total number of subcarriers in the downlink multicarrier NOMA system;
the method for obtaining the user pair set and the subcarrier priority list of each user pair in the user pair set comprises the following steps:
acquiring a total user set of channel descending order according to the channel of each user in a downlink multi-carrier NOMA system
Figure FDA0004219962490000024
K is the total number of users in the downlink multi-carrier NOMA system;
to collect the total users
Figure FDA0004219962490000029
The first K/2 users and the last K/2 users are paired in pairs to obtain a user pair set
Figure FDA0004219962490000025
Wherein U is i Represents the ith user pair, U i = { i, i+m }, i=1, 2, …, M, m=k/2, M being the total number of subcarriers in the downlink multicarrier NOMA system;
for user pair U i According to the user pair U i The channels on each subcarrier are used for descending order arrangement of all subcarriers in a downlink multi-carrier NOMA system, and the user pair U is obtained i Is a subcarrier priority list of (2);
the method for obtaining the user subcarrier matching and the user power allocation which maximize the secret throughput comprises the following steps:
(1) Initializing a random number lambda to make unmatched user pairs collect
Figure FDA0004219962490000026
Subcarrier matching set
Figure FDA0004219962490000027
And subcarrier matching capacity->
Figure FDA0004219962490000028
Wherein λ is a positive integer, m=1, 2, …, M;
(2) When (when)
Figure FDA0004219962490000031
In the method, all user pairs in the U_un send matching requests to the subcarriers with highest priorities in the priority lists of the subcarriers simultaneously, power of each unmatched user pair on each subcarrier is calculated, and secret capacity of each unmatched user pair on each subcarrier is obtained;
(3) According to the secret capacity, the subcarrier matching set and the subcarrier matching capacity of the user on the subcarriers, matching user pairs of each subcarrier are determined, and the subcarrier matching set, the subcarrier priority list and the unmatched user pair set are updated;
(4) Repeating (2) and (3) according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair set until
Figure FDA0004219962490000032
(5) Updating the data on each subcarrier according to the matched user pair, and completing the matching operation of the subcarrier and the user pair;
(6) And (3) updating the random number lambda according to a preset updating step length, judging whether lambda is converged, returning to the step (1) when lambda is not converged, otherwise, ending iteration, and obtaining user subcarrier matching and user power distribution which maximize the secret throughput.
2. The resource allocation method of a downlink multi-carrier NOMA system based on bilateral matching according to claim 1, wherein the downlink multi-carrier NOMA system includes a base station, K users and 1 eavesdropper, and there are M subcarriers in the downlink multi-carrier NOMA system, where k=2m.
3. The method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as in claim 1, wherein in step (2), the user pairs U i The power on the m-th subcarrier is calculated as follows:
Figure FDA0004219962490000033
p 2,m =p m -p 1,m
Figure FDA0004219962490000041
wherein p is 1,m Representing the user pair U i The power of the 1 st user on the m-th subcarrier,
Figure FDA0004219962490000042
R min representing the minimum achievable rate in a downstream multi-carrier NOMA system, B sc Representing the bandwidth of the sub-carriers,
Figure FDA0004219962490000043
Figure FDA0004219962490000044
representing the channel coefficients of the base station to the nth user on the mth subcarrier, n E {1,2}, sigma 2 Representing channel noise variance over subcarriers, p m Represents the power of the mth subcarrier, p 2,m Representing the user pair U i Power of the 2 nd user on the m th subcarrier,/and>
Figure FDA0004219962490000045
Figure FDA0004219962490000046
g m representing the channel coefficient of the base station to the eavesdropper, +.>
Figure FDA0004219962490000047
Representing the minimum power of the mth subcarrier.
4. The method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as in claim 1, wherein in step (2), the user pairs U i The method for calculating the secret capacity on the m-th subcarrier is as follows:
according to the user pair U i Power calculation user pair U on mth subcarrier i The reachable rate and the eavesdropping rate of each user;
calculating user pair U according to user's reachable rate and eavesdropping rate i Privacy rate for each user:
Figure FDA0004219962490000048
wherein,,
Figure FDA0004219962490000049
representing the user pair U i The secret rate of the nth user on the mth subcarrier, n epsilon {1,2}, R n,m Representing the user pair U i The achievable rate of the nth user on the mth subcarrier,/for>
Figure FDA0004219962490000051
Representing the user pair U i The eavesdropping rate of the nth user on the mth subcarrier;
calculating user pair U according to privacy rate of each user i Secret capacity on the m-th subcarrier:
Figure FDA0004219962490000052
5. the method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as claimed in claim 1, wherein the specific operation of step (3) is as follows:
when the mth subcarrier SC m Subcarrier matching set of (2)
Figure FDA0004219962490000053
When considering SC m Is not matched from SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i As SC (SC) m Matching user pairs of (a), pair U i Add { SC_m (m) }, SC m Deleting from the subcarrier priority list of other unmatched user pairs, and adding the user pairs U i Deleting from the unmatched user pair set { U_un };
when the mth subcarrier SC m Subcarrier matching set of (2)
Figure FDA0004219962490000054
When considering SC m Has been matched with the user to U j Matching, j=1, 2, …, M and j+.i, from SC to SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i To U by user i At SC m Security capacity->
Figure FDA0004219962490000055
And SC (SC) m Subcarrier matching capacity +.>
Figure FDA0004219962490000056
Comparison, when->
Figure FDA0004219962490000057
When SC is m Rejecting user pair U i Match request of (C) to SC m From user to U i Subcarrier priority list pl_sc (U i ) Delete in the middle; when (when)
Figure FDA0004219962490000058
When selecting user pair U i As SC (SC) m Matched user pair, SC m Rejecting user pair U j By user to U i Substitution of user pairs U in { SC_m (m) } for j SC is put into m From the use ofUser pair U j Subcarrier priority list pl_sc (U j ) Delete and pair U by user j Add to the unmatched user pair set U _ un.
6. The method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as in claim 1, wherein the user pair U is set to i For the m th subcarrier SC m The specific operation of step (5) is:
couple the user to U i And the m-th subcarrier SC m The matching is performed so that the matching is performed,
Figure FDA0004219962490000059
and according to the user pair U i Sequentially updating subcarriers SC m Matching user pairs, subcarrier matching capacity and user power allocation, wherein subcarriers SC m The matching user pairs of (a) are as follows:
Figure FDA0004219962490000061
wherein,,
Figure FDA0004219962490000062
representing subcarriers SC m Matching user pairs, UC 1,m Indicating the 1 st user on the m-th subcarrier, UC 2,m Representing the 2 nd user on the m-th subcarrier.
7. The method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as claimed in claim 1, wherein in the step (6), the formula for updating the random number λ according to a preset update step is as follows:
Figure FDA0004219962490000063
wherein θ is an update step length, and P represents a maximum total transmit power of a base station in the downlink multi-carrier NOMA system.
CN202110600160.XA 2021-05-31 2021-05-31 Downlink multi-carrier NOMA system resource allocation method based on bilateral matching Active CN113423141B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110600160.XA CN113423141B (en) 2021-05-31 2021-05-31 Downlink multi-carrier NOMA system resource allocation method based on bilateral matching

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110600160.XA CN113423141B (en) 2021-05-31 2021-05-31 Downlink multi-carrier NOMA system resource allocation method based on bilateral matching

Publications (2)

Publication Number Publication Date
CN113423141A CN113423141A (en) 2021-09-21
CN113423141B true CN113423141B (en) 2023-06-23

Family

ID=77713299

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110600160.XA Active CN113423141B (en) 2021-05-31 2021-05-31 Downlink multi-carrier NOMA system resource allocation method based on bilateral matching

Country Status (1)

Country Link
CN (1) CN113423141B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110430613A (en) * 2019-04-11 2019-11-08 重庆邮电大学 Resource allocation methods of the multicarrier non-orthogonal multiple access system based on efficiency
CN110856247A (en) * 2019-11-21 2020-02-28 重庆邮电大学 Downlink NOMA power distribution method and system based on service quality

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110430613A (en) * 2019-04-11 2019-11-08 重庆邮电大学 Resource allocation methods of the multicarrier non-orthogonal multiple access system based on efficiency
CN110856247A (en) * 2019-11-21 2020-02-28 重庆邮电大学 Downlink NOMA power distribution method and system based on service quality

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A general power allocation scheme to guarantee quality of service in downlink and uplink NOMAsystems;Yang Z, etc.;《IEEE》;第7244-7257页 *
面向非正交多址接入的资源分配方法研究;雒艳;《软件》;第42卷(第4期);第135-137页 *

Also Published As

Publication number Publication date
CN113423141A (en) 2021-09-21

Similar Documents

Publication Publication Date Title
CN108462950B (en) NOMA-based D2D communication combined sub-channel and power distribution method
CN106961322B (en) OFDM relay network resource allocation method based on information and energy simultaneous wireless transmission
US8452317B2 (en) Methods and apparatus related to power control and/or interference management in a mixed wireless communications system supporting WAN signaling and peer to peer signaling
EP1408710A1 (en) Apparatus and method for allocating resources of a virtual cell in an OFDM mobile communication system
CN110418360B (en) Multi-user subcarrier bit joint distribution method for wireless energy-carrying network
WO2004068758A1 (en) Multi-carrier transmission device, multi-carrier reception device, and multi-carrier radio communication method
CN113079577B (en) Resource allocation method based on coexistence scene of EMBB and URLLC
Bakhtiari et al. A new joint power and subcarrier allocation scheme for multiuser OFDM systems
CN113923767A (en) Energy efficiency maximization method for multi-carrier cooperation non-orthogonal multiple access system
Doan et al. Optimal power allocation in cache-aided non-orthogonal multiple access systems
WO2010096946A1 (en) Resource scheduling method, scheduler and base station
KR100532062B1 (en) An apparatus for adaptive resource allocation for multi-channel communication system, and a method thereof
Mounchili et al. Efficient pairing distance for better radio capacity in noma systems
CN102164413B (en) Method for transmitting multi-user access single relay based on orthogonal frequency division multiple access
CN112469113B (en) Resource allocation method and device of multi-carrier NOMA system
CN113423141B (en) Downlink multi-carrier NOMA system resource allocation method based on bilateral matching
CN106912059B (en) Cognitive relay network joint relay selection and resource allocation method supporting mutual information accumulation
CN111867103A (en) Joint user pairing method, device, equipment and storage medium
CN107148078B (en) User access control method and device for hybrid full-duplex and half-duplex network
CN108271266B (en) Downlink user resource allocation method for NOMA-D2D hybrid system
CN116600387A (en) Multidimensional resource allocation method
CN109474413B (en) Allocation method for multiple downlink user multiple carriers of OFDMA system
CN109286480B (en) Subcarrier distribution method for orthogonal frequency division multiple access system based on candidate channel matching method
CN110381589B (en) Cooperative wireless network sub-channel power distribution method based on wireless energy collection
CN108989012B (en) Fairness-based power distribution method for non-orthogonal multiple access technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant