CN113423141B - Downlink multi-carrier NOMA system resource allocation method based on bilateral matching - Google Patents
Downlink multi-carrier NOMA system resource allocation method based on bilateral matching Download PDFInfo
- Publication number
- CN113423141B CN113423141B CN202110600160.XA CN202110600160A CN113423141B CN 113423141 B CN113423141 B CN 113423141B CN 202110600160 A CN202110600160 A CN 202110600160A CN 113423141 B CN113423141 B CN 113423141B
- Authority
- CN
- China
- Prior art keywords
- user
- subcarrier
- matching
- pair
- noma system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 206010042135 Stomatitis necrotising Diseases 0.000 title claims abstract description 88
- 201000008585 noma Diseases 0.000 title claims abstract description 88
- 238000000034 method Methods 0.000 title claims abstract description 35
- 230000002146 bilateral effect Effects 0.000 title claims abstract description 17
- 238000013468 resource allocation Methods 0.000 title claims abstract description 15
- 230000005540 biological transmission Effects 0.000 claims abstract description 11
- 238000005457 optimization Methods 0.000 claims description 11
- 239000000969 carrier Substances 0.000 claims description 9
- 238000006467 substitution reaction Methods 0.000 claims description 3
- 238000011160 research Methods 0.000 abstract description 4
- 238000010845 search algorithm Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 3
- 238000001228 spectrum Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0453—Resources in frequency domain, e.g. a carrier in FDMA
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0473—Wireless resource allocation based on the type of the allocated resource the resource being transmission power
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
- H04W72/542—Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
- H04W72/543—Allocation or scheduling criteria for wireless resources based on quality criteria based on requested quality, e.g. QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, and aims to solve the problem that the prior art lacks safety-oriented multi-carrier NOMA system resource allocation research. Unlike the single carrier NOMA system, which uses only one carrier for information transmission, the invention considers the downlink transmission of the multi-carrier NOMA system, and provides a user and subcarrier matching method based on a bilateral matching algorithm and a subcarrier power distribution method based on a binary search algorithm with the aim of maximizing the system secret throughput under the requirements of the user reachable rate and the limitation of the total power. The invention can obviously improve the system safety performance while ensuring that the service quality of all users is met.
Description
Technical Field
The invention relates to a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, and belongs to the technical field of wireless communication.
Background
The multi-carrier access system divides the multi-total frequency band bandwidth into sub-carriers and distributes the sub-carriers to users, so that the spectrum utilization rate can be optimized, in addition, various wireless terminal devices are increased in an explosion mode, the requirement on mass connectivity is urgent, and the research of the multi-carrier NOMA system is promoted to be focused more and more. For a multi-carrier NOMA system, to fully utilize the advantages of NOMA technology, it is critical how to optimally allocate power, sub-carriers and other resources to users, so as to maximize system performance. The throughput or energy efficiency of the existing research multi-purpose system for the NOMA system is used as an optimization target, and the optimization for the safety performance is considered less, but in the NOMA technology, a carrier wave transmits a superposition signal of a plurality of users, and an eavesdropper intercepts the signal and then affects all users in a cluster, so the safety of the NOMA system is worth considering.
In addition, the security discussion about the NOMA system is focused on the single-carrier NOMA system, and the problem of resource allocation of the multi-carrier NOMA system facing the security only discusses specific relay scenes, which is unfavorable for the development and application of the multi-carrier NOMA system.
Disclosure of Invention
Aiming at the problem that the prior art lacks of research on resource allocation of a multi-carrier NOMA system facing safety, the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which can maximize the secret throughput of the system under the requirements of the user reachable rate and the total power limit so as to improve the safety performance of the multi-carrier NOMA system.
In order to solve the technical problems, the invention adopts the following technical means:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which comprises the following steps:
under the constraint of the user reachable rate and the base station transmission power, the secret throughput of the downlink multi-carrier NOMA system is used as an objective function, and the joint optimization problem of user subcarrier matching and user power distribution is obtained;
user pairing is carried out on users in the downlink multi-carrier NOMA system, a user pair set is obtained, and a subcarrier priority list of each user pair in the user pair set is obtained;
and based on the joint optimization problem, carrying out resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list, and obtaining user subcarrier matching and user power distribution which maximize the secret throughput.
Further, the downlink multi-carrier NOMA system includes a base station, K users and 1 eavesdropper, and the downlink multi-carrier NOMA system has M subcarriers, where k=2m.
Further, the expression of the joint optimization problem of user subcarrier matching and user power allocation is as follows:
wherein { UC n,m The symbol UC indicates the subcarrier matching of the user n,m Represents the nth user on the mth subcarrier, { p n,m ' represent user power allocation, p n,m Indicating user UC n,m The power of the user is used to determine,indicating user UC n,m Is a secret capacity of R n,m Indicating user UC n,m Is (are) achievable rate,/->Indicating user UC n,m Is equal to the eavesdropping rate of R min Representing the minimum achievable rate in a downlink multi-carrier NOMA system, P representing the maximum total transmit power of the base station in the downlink multi-carrier NOMA system,/->For the total user set of the downstream multi-carrier NOMA system +.>UC is a subcarrier set of a downlink multicarrier NOMA system n′,m′ The nth user on the mth subcarrier is represented, m=1, 2, …, M is the total number of subcarriers in the downlink multicarrier NOMA system.
Further, the method for obtaining the user pair set and the subcarrier priority list of each user pair in the user pair set comprises the following steps:
acquiring a total user set of channel descending order according to the channel of each user in a downlink multi-carrier NOMA systemK is the total number of users in the downlink multi-carrier NOMA system;
to collect the total usersThe first K/2 users and the last K/2 users are paired in pairs to obtain a user pair setWherein U is i Represents the ith user pair, U i = { i, i+m }, i=1, 2, …, M, m=k/2, M being the total number of subcarriers in the downlink multicarrier NOMA system;
for user pair U i According to the user pair U i The channels on each subcarrier are used for descending order arrangement of all subcarriers in a downlink multi-carrier NOMA system, and the user pair U is obtained i Is included in the list of subcarrier priorities.
Further, the method for obtaining the subcarrier matching of the user and the power allocation of the user which maximize the secret throughput comprises the following steps:
(1) Initializing a random number lambda to make unmatched user pairs collectSubcarrier matching setAnd subcarrier matching capacity->Wherein λ is a positive integer, m=1, 2, …, M;
(2) When (when)When in use, all user pairs in { U_un } send matching requests to the subcarriers with highest priority in the priority list of the respective subcarriers simultaneously, and each unmatched user pair is calculated on each subcarrierAnd obtaining the secret capacity of each unmatched user pair on each subcarrier;
(3) According to the secret capacity, the subcarrier matching set and the subcarrier matching capacity of the user on the subcarriers, matching user pairs of each subcarrier are determined, and the subcarrier matching set, the subcarrier priority list and the unmatched user pair set are updated;
(4) Repeating (2) and (3) according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair set until
(5) Updating the data on each subcarrier according to the matched user pair, and completing the matching operation of the subcarrier and the user pair;
(6) And (3) updating the random number lambda according to a preset updating step length, judging whether lambda is converged, returning to the step (1) when lambda is not converged, otherwise, ending iteration, and obtaining user subcarrier matching and user power distribution which maximize the secret throughput.
Further, in step (2), the user performs a process on U i The power on the m-th subcarrier is calculated as follows:
p 2,m =p m -p 1,m (3)
wherein p is 1,m Representing the user pair U i The power of the 1 st user on the m-th subcarrier,R min representing the minimum achievable rate in a downstream multi-carrier NOMA system, B sc Representing subcarriersIs used for the transmission of the bandwidth of (a), representing the channel coefficients of the base station to the nth user on the mth subcarrier, n E {1,2}, sigma 2 Representing channel noise variance over subcarriers, p m Represents the power of the mth subcarrier, p 2,m Representing the user pair U i Power of the 2 nd user on the m th subcarrier,/and> g m representing the channel coefficient of the base station to the eavesdropper, +.>Representing the minimum power of the mth subcarrier.
Further, in step (2), the user performs a process on U i The method for calculating the secret capacity on the m-th subcarrier is as follows:
according to the user pair U i Power calculation user pair U on mth subcarrier i The reachable rate and the eavesdropping rate of each user;
calculating user pair U according to user's reachable rate and eavesdropping rate i Privacy rate for each user:
wherein,,representing the user pair U i The secret rate of the nth user on the mth subcarrier, n epsilon {1,2}, R n,m Representing the user pair U i The nth user in (a) is at the mthAchievable rate on subcarrier, +.>Representing the user pair U i The eavesdropping rate of the nth user on the mth subcarrier;
calculating user pair U according to privacy rate of each user i Secret capacity on the m-th subcarrier:
further, the specific operation of step (3) is as follows:
when the mth subcarrier SC m Subcarrier matching set of (2)When considering SC m Is not matched from SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i As SC (SC) m Matching user pairs of (a), pair U i Add { SC_m (m) }, SC m Deleting from the subcarrier priority list of other unmatched user pairs, and adding the user pairs U i Deleting from the unmatched user pair set { U_un };
when the mth subcarrier SC m Subcarrier matching set of (2)When considering SC m Has been matched with the user to U j Matching, j=1, 2, …, M and j+.i, from SC to SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i To U by user i At SC m Security capacity->And SC (SC) m Subcarrier matching capacity +.>Comparison, when->When SC is m Rejecting user pair U i Match request of (C) to SC m From user to U i Subcarrier priority list pl_sc (U i ) Delete in the middle; when->When selecting user pair U i As SC (SC) m Matched user pair, SC m Rejecting user pair U j By user to U i Substitution of user pairs U in { SC_m (m) } for j SC is put into m From user to U j Subcarrier priority list pl_sc (U j ) Delete and pair U by user j Add to the unmatched user pair set U _ un.
Further, set user pair U i For the m th subcarrier SC m The specific operation of step (5) is:
couple the user to U i And the m-th subcarrier SC m The matching is performed so that the matching is performed,and according to the user pair U i Sequentially updating subcarriers SC m Matching user pairs, subcarrier matching capacity and user power allocation, wherein subcarriers SC m The matching user pairs of (a) are as follows:
wherein,,representing subcarriers SC m Matching user pairs, UC 1,m Indicating the 1 st user on the m-th subcarrier, UC 2,m Representing the 2 nd user on the m-th subcarrier.
Further, in step (6), the formula for updating the random number λ according to the preset updating step is as follows:
wherein θ is an update step length, and P represents a maximum total transmit power of a base station in the downlink multi-carrier NOMA system.
The following advantages can be obtained by adopting the technical means:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which is different from a single-carrier NOMA system which uses only one carrier for information transmission. The method can obviously improve the system safety performance while ensuring that the service quality of all users is met.
Drawings
Fig. 1 is a flow chart of steps of a resource allocation method of a downlink multi-carrier NOMA system based on bilateral matching in the present invention;
fig. 2 is a schematic diagram of a downlink multi-carrier NOMA system according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating steps of user subcarrier matching and user power allocation in an embodiment of the present invention;
fig. 4 is a schematic diagram of the variation of the secret throughput with respect to P under different multiple access modes and total number of users according to an embodiment of the present invention;
FIG. 5 shows the secure throughput versus R for different transmit powers and total number of users in an embodiment of the invention min Schematic of the variation of (2);
FIG. 6 shows the secure throughput versus d for different multiple access modes and transmit powers in an embodiment of the invention e Is a variation of the schematic diagram.
Detailed Description
The technical scheme of the invention is further described below with reference to the accompanying drawings:
the invention provides a downlink multi-carrier NOMA system resource allocation method based on bilateral matching, which is shown in figure 1 and comprises the following steps:
under the constraint of the user reachable rate and the base station transmission power, the secret throughput of a downlink multi-carrier NOMA system is taken as an objective function, and the joint optimization problem of user subcarrier matching and user power distribution is obtained;
step B, user pairing is carried out on users in the downlink multi-carrier NOMA system, a user pair set is obtained, and a subcarrier priority list of each user pair in the user pair set is obtained;
and C, carrying out resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list based on the joint optimization problem, and obtaining user subcarrier matching and user power distribution which maximize the secret throughput.
The scenario considered by the method of the invention is shown in figure 2, and a downlink multi-carrier NOMA system comprises a base station, K users and 1 eavesdropper, and the total user set of the system The channels are arranged in descending order from user 1 to user K. There are M subcarriers in the downlink multicarrier NOMA system, where k=2m. The total spectrum bandwidth of the downlink multi-carrier NOMA system in the embodiment of the invention is B, and is divided into M sub-carriers, and the bandwidth of each sub-carrier is B sc The set of these sub-carriers is +.>For the process according to the inventionSC m Representing the mth subcarrier.
In the method of the present invention, assuming that each user occupies only one subcarrier, and 2 users are on each subcarrier, k=2m, UC is used 1,m And UC (UC) 2,m Respectively represent subcarriers SC m Two users, SC m The user pair on the table may be represented as UC m ={UC 1,m ,UC 2,m },n.epsilon. {1,2}, and +.>Representing base station to SC m Channel coefficient of the 1 st user, +.>Representing base station to SC m Channel coefficient of last user 2, UC 1,m And UC (UC) 2,m The powers are p respectively 1,m And p 2,m . The maximum total transmitting power of the base station of the downlink multi-carrier NOMA system is P, and the sum of transmitting power of all users cannot be larger than P, namely the sum of transmitting power of all users needs to meet +.>At the receiving end, taking the conservative eavesdropping condition into consideration, the eavesdropper can also successfully perform SIC to decode the user information.
In step a, based on the downlink multi-carrier NOMA system, the expression of the joint optimization problem of user subcarrier matching and user power allocation is as follows:
wherein { UC n,m The symbol UC indicates the subcarrier matching of the user n,m Represents the nth user on the mth subcarrier, { p n,m ' represent user power allocation, p n,m Indicating user UC n,m The power of the user is used to determine,indicating user UC n,m Is a secret capacity of R n,m Indicating user UC n,m Is (are) achievable rate,/->Indicating user UC n,m Is equal to the eavesdropping rate of R min Representing the minimum achievable rate in a downstream multi-carrier NOMA system,/for>For the total user set of the downstream multi-carrier NOMA system +.>UC is a subcarrier set of a downlink multicarrier NOMA system n′,m′ The nth user on the mth subcarrier is represented, m=1, 2, …, M is the total number of subcarriers in the downlink multicarrier NOMA system.
In the embodiment of the present invention, the specific operation of step B is as follows:
step B01, obtaining a total user set of channel descending order according to the channel of each user in the downlink multi-carrier NOMA systemWherein K is the total number of users in the downlink multi-carrier NOMA system.
Step B02, collecting the total usersThe first K/2 users and the last K/2 users are paired in pairs to obtain a user pair setWherein U is i Represents the ith user pair, U i ={i,i+M},i=1,2,…,M,M=K/2。
Step B03, aiming at the user pair U i According to the user pair U i At each ofThe channels on the subcarriers are used for descending order arrangement of all subcarriers in a downlink multi-carrier NOMA system to obtain a user pair U i Subcarrier priority list pl_sc (U i )。
In the embodiment of the present invention, as shown in fig. 3, the specific operation of step C is as follows:
step C01, initializing a random number lambda to enable unmatched user pairs to be gatheredSubcarrier matching setAnd subcarrier matching capacity->Wherein λ is a positive integer.
Step C02, whenAnd simultaneously sending a matching request to the subcarrier with the highest priority in the priority list of the respective subcarriers by all the user pairs in the { U_un }, calculating the power of each unmatched user pair on each subcarrier, and obtaining the confidentiality capacity of each unmatched user pair on each subcarrier.
201. Unmatched user pair U i The power on the m-th subcarrier is calculated as follows:
p 2,m =p m -p 1,m (11)
wherein p is 1,m Representing the user pair U i The power of the 1 st user on the m-th subcarrier,representing the channel coefficients of the base station to the nth user on the mth subcarrier, n E {1,2}, sigma 2 Representing channel noise variance over subcarriers, p m Represents the power of the mth subcarrier, p 2,m Representing the user pair U i The power of the 2 nd user on the m-th subcarrier, g m representing the channel coefficient of the base station to the eavesdropper, +.>Representing the minimum power of the mth subcarrier.
202. According to the user pair U i Power on the mth subcarrier (p 1,m And p 2,m ) Computing user pairs U i The specific calculation formula of the reachable rate and the eavesdropping rate of each user is as follows:
wherein R is n,m Representing the user pair U i The achievable rate of the nth user on the mth subcarrier,representing the user pair U i The eavesdropping rate of the nth user on the mth subcarrier,/>Representing on the mth subcarrierFirst->Power of individual users.
203. Calculating user pair U according to user's reachable rate and eavesdropping rate i Privacy rate for each user:
204. Calculating user pair U according to privacy rate of each user i Secret capacity on the m-th subcarrier:
and C03, according to the secret capacity of the user on the subcarrier, the subcarrier matching set and the subcarrier matching capacity, carrying out matching judgment, determining the matching user pair of each subcarrier, and updating the subcarrier matching set, the subcarrier priority list and the unmatched user pair set.
In the invention, all unmatched user pairs send matching requests to the respective optimal sub-carriers at the same time, if the sub-carriers are not matched, only one request is received to be matched with the user pair, if a plurality of requests are provided, the user pair with the largest confidentiality capacity is selected to be matched, if the sub-carriers are matched with the user pair in the previous stage, the requested user pair needs to be compared with the matched user pair, and the user pair with the largest confidentiality capacity is selected to be matched. The successfully matched user pairs are deleted from the { U_un } and the user pairs that are rejected for the request remain in the { U_un }, the matching is continued until the full matching is completed,
the specific operation of step C03 is as follows:
301. when the mth subcarrier SC m Subcarrier matching set of (2)When considering SC m Is not matched from SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i As SC (SC) m Matching user pairs of (a), pair U i Add { SC_m (m) }, SC m Deleting from the subcarrier priority list of other unmatched user pairs, and adding the user pairs U i Deleted from the unmatched user pair set U _ un.
302. When the mth subcarrier SC m Subcarrier matching set of (2)When considering SC m Has been matched with the user to U j Matching, j=1, 2, …, M and j+.i, from SC to SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i To U by user i At SC m Security capacity->And SC (SC) m Subcarrier matching capacity +.>When comparingWhen SC is m Rejecting user pair U i Match request of (C) to SC m From user to U i Subcarrier priority list pl_sc (U i ) Delete in the middle; when->When selecting user pair U i As SC (SC) m Matched user pair, SC m Rejecting user pair U j By user to U i Substitution of user pairs U in { SC_m (m) } for j SC is put into m From user to U j Subcarrier priority list pl_sc (U j ) Delete and pair U by user j Add to the unmatched user pair set U _ un.
Step C04, repeating the steps (2) and (3) according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair set untilAnd establishing a matching relation between all users and the subcarriers.
And step C05, updating the data on each subcarrier according to the matched user pair, and completing the matching operation of the subcarrier and the user pair. Set user pair U i For the m th subcarrier SC m The specific operation of step C05 is:
couple the user to U i And the m-th subcarrier SC m The matching is performed so that the matching is performed,and according to the user pair U i Sequentially updating subcarriers SC m Matching user pairs, subcarrier matching capacity and user power allocation, wherein the subcarrier SC is updated m The operation of the matching user pair is as follows:
wherein,,representing subcarriers SC m Matching user pairs, UC 1,m Indicating the 1 st user on the m-th subcarrier, UC 2,m Representing the 2 nd user on the m-th subcarrier.
The operations of updating subcarrier matching capacity and user power allocation are: wherein (1)>And->Respectively represent the mth sub-carrier SC m The power allocation values for the 1 st and 2 nd users are above.
Step C06, updating the random number lambda according to a preset updating step length, judging whether lambda is converged, and returning to the step C01 to perform iterative operation when lambda is not converged; when lambda converges, the iteration is ended, according to the finalAnd->User subcarrier matching and user power allocation that maximizes the secure throughput are obtained.
In step C06, the formula for updating the random number λ according to the preset updating step is as follows:
where θ is the update step size.
In order to verify the effect of the method of the invention, the following comparative experiments are given:
the total transmission bandwidth B of the downlink multi-carrier NOMA system is 5MHz, and the channel noise variance on each subcarrier isWherein the noise power spectral density N 0 = -70dBm. At subcarrier SC m From the base station to the kthThe channel gain of the user is defined as +.>Alpha is the path loss index, < >>Is the rayleigh fading channel gain,/->Is the distance between user k and the base station, the base station to eavesdropper channel gain is defined as +.>d e Is the distance between the eavesdropper and the base station, default +.>
The comparison experiments are respectively carried out on user setsThe NOMA scheme and OFDMA reference scheme of the present invention were simulated at total numbers k=10, k=20, in contrast to discussing the system privacy throughput R in different schemes s />With base station transmit power P, minimum achievable rate R min And distance d of base station from eavesdropper e The specific guideline results are shown in fig. 4 to 6.
FIG. 4 shows the system secret throughput R in two downlink multi-carrier resource allocation schemes of NOMA and OFDMA under different total user numbers s A relation with the base station transmission power P, wherein the minimum achievable rate R of the user is set min Distance d of base station to eavesdropper =1 Mbps e =50m. As can be seen from fig. 4, the secure throughput R s As the base station transmit power P increases, and as P continues to increase, the secure throughput R s Gradually and gradually become flatThe reason for this is that the higher the base station's transmit power, the higher the power of the signal received by the user and eavesdropper after the path loss, and the user's secret capacity increases monotonically with respect to power; in addition, subcarrier SC m Upper user UC n,m Is of (1)Regarding the difference between two logarithmic functions of P, the derivative thereof decreases as P increases, approaching 0 but being greater than 0, so that when P increases, the system privacy throughput R s The growth rate of (c) will slow and tend to stabilize. As is apparent from fig. 4, in the user set +.>The NOMA scheme of the invention is superior to the OFDMA scheme under the total numbers of K=10 and K=20, because the OFDMA scheme transmits information of one user on one subcarrier, the frequency spectrum efficiency is lower, and one subcarrier in the NOMA transmission set by the invention transmits two users, thereby having diversity advantage, and the invention combines subcarrier matching and power distribution of the users, thereby improving the security performance of the multi-carrier NOMA to the maximum extent under the limit of QoS of the users.
FIG. 5 shows the system privacy throughput R in the method of the present invention at different total number of users and different maximum transmit power s Minimum achievable rate with user R min The relation between them, wherein the maximum base station transmission power P takes 10dBm, 30dBm, the distance d of the base station to the eavesdropper e =50m. Fig. 5 illustrates QoS requirements versus system privacy throughput R s With R min Is increased by R s Reduced because of R min The increase in (2) requires the transmitter to utilize additional power to increase the data rate of users with poor channel conditions, and thus, when R min When the size becomes very large, at this time P can not meet the QoS requirements of all users, the base station does not send messages to the users, R s =0. It can also be seen from FIG. 5 that when the number of users is the same, P is larger R s The later the drop, because the larger P can provide higher user QoS requirements, and the smaller the number of users drops when the power is the sameThe later, the more limited power can meet the QoS requirements of these few people because of the fewer users.
FIG. 6 shows the system privacy throughput R in the NOMA scheme and OFDMA scheme of the present invention at different total number of users and different maximum transmit powers s Distance d from base station to eavesdropper e A relation between them, in which the user minimum achievable rate R is set min Base station transmit power P takes 20dBm, 30dBm =1 Mbps. As can be seen in fig. 6, with the distance d of the base station from the eavesdropper e Increased privacy throughput R s The rise is very rapid because the farther the distance is, the greater the path loss from the base station to the eavesdropper, the channel gain g m The worse, the smaller the signal power received by the eavesdropper, the smaller the eavesdropping rate, the subcarrier SC m Upper user UC n,m Is of (1)The larger the system privacy throughput R s The larger the secret throughput R of the NOMA scheme at the same time at different powers s Are higher than the OFDMA scheme, and thus the method of the present invention has higher security performance. In fig. 6, at p=30 dBm, NOMA and system privacy throughput R under OFDMA s At d e Start to plateau at=1000m, and R at p=20dbm s At d e Starting to stabilize at 500m, the total transmit power threshold can be kept stable earlier, because the larger the power, the larger the eavesdropper receives after the path loss, the larger the eavesdropping rate, the larger the eavesdropping risk, and the lower the power case is, the more easily the eavesdropping risk is towards 0. It can also be seen from fig. 6 that in both NOMA and OFDMA schemes, when the base station is at a distance d from the eavesdropper e With constant increase, the secure throughput R s Eventually, the system will remain stable because the signal intercepted by the eavesdropper will have a larger path loss and less power when the distance is far enough, the system will be approaching an eavesdroppless state, resulting in an eavesdropper rate of 0, a privacy rate of up to a reachable rate, and a privacy throughput of up to no eavesdropper throughput, so when the base station arrivesDistance d of eavesdropper e When very large, the secure throughput of both NOMA and OFDMA schemes will remain around the total throughput value without eavesdropping
Compared with the prior art, the method can obviously improve the system safety performance while ensuring that the service quality of all users is met.
The foregoing is merely a preferred embodiment of the present invention, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present invention, and such modifications and variations should also be regarded as being within the scope of the invention.
Claims (7)
1. The downlink multi-carrier NOMA system resource allocation method based on bilateral matching is characterized by comprising the following steps:
under the constraint of the user reachable rate and the base station transmission power, the secret throughput of the downlink multi-carrier NOMA system is used as an objective function, and the joint optimization problem of user subcarrier matching and user power distribution is obtained;
user pairing is carried out on users in the downlink multi-carrier NOMA system, a user pair set is obtained, and a subcarrier priority list of each user pair in the user pair set is obtained;
based on the joint optimization problem, carrying out resource matching on each unmatched user pair in the user pair set according to the subcarrier priority list to obtain user subcarrier matching and user power distribution which maximize the secret throughput;
the expression of the joint optimization problem of user subcarrier matching and user power allocation is as follows:
p n,m ≥0
wherein { UC n,m The symbol UC indicates the subcarrier matching of the user n,m Represents the nth user on the mth subcarrier, { p n,m ' represent user power allocation, p n,m Indicating user UC n,m The power of the user is used to determine,indicating user UC n,m Is a secret capacity of R n,m Indicating user UC n,m Is (are) achievable rate,/->Indicating user UC n,m Is equal to the eavesdropping rate of R min Representing the minimum achievable rate in a downlink multi-carrier NOMA system, P representing the maximum total transmit power of the base station in the downlink multi-carrier NOMA system,/->For the total user set of the downstream multi-carrier NOMA system +.>UC is a subcarrier set of a downlink multicarrier NOMA system n′,m′ Representing the nth user on the mth subcarrier, m=1, 2, …, M being the total number of subcarriers in the downlink multicarrier NOMA system;
the method for obtaining the user pair set and the subcarrier priority list of each user pair in the user pair set comprises the following steps:
acquiring a total user set of channel descending order according to the channel of each user in a downlink multi-carrier NOMA systemK is the total number of users in the downlink multi-carrier NOMA system;
to collect the total usersThe first K/2 users and the last K/2 users are paired in pairs to obtain a user pair setWherein U is i Represents the ith user pair, U i = { i, i+m }, i=1, 2, …, M, m=k/2, M being the total number of subcarriers in the downlink multicarrier NOMA system;
for user pair U i According to the user pair U i The channels on each subcarrier are used for descending order arrangement of all subcarriers in a downlink multi-carrier NOMA system, and the user pair U is obtained i Is a subcarrier priority list of (2);
the method for obtaining the user subcarrier matching and the user power allocation which maximize the secret throughput comprises the following steps:
(1) Initializing a random number lambda to make unmatched user pairs collectSubcarrier matching setAnd subcarrier matching capacity->Wherein λ is a positive integer, m=1, 2, …, M;
(2) When (when)In the method, all user pairs in the U_un send matching requests to the subcarriers with highest priorities in the priority lists of the subcarriers simultaneously, power of each unmatched user pair on each subcarrier is calculated, and secret capacity of each unmatched user pair on each subcarrier is obtained;
(3) According to the secret capacity, the subcarrier matching set and the subcarrier matching capacity of the user on the subcarriers, matching user pairs of each subcarrier are determined, and the subcarrier matching set, the subcarrier priority list and the unmatched user pair set are updated;
(4) Repeating (2) and (3) according to the updated subcarrier matching set, subcarrier priority list and unmatched user pair set until
(5) Updating the data on each subcarrier according to the matched user pair, and completing the matching operation of the subcarrier and the user pair;
(6) And (3) updating the random number lambda according to a preset updating step length, judging whether lambda is converged, returning to the step (1) when lambda is not converged, otherwise, ending iteration, and obtaining user subcarrier matching and user power distribution which maximize the secret throughput.
2. The resource allocation method of a downlink multi-carrier NOMA system based on bilateral matching according to claim 1, wherein the downlink multi-carrier NOMA system includes a base station, K users and 1 eavesdropper, and there are M subcarriers in the downlink multi-carrier NOMA system, where k=2m.
3. The method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as in claim 1, wherein in step (2), the user pairs U i The power on the m-th subcarrier is calculated as follows:
p 2,m =p m -p 1,m
wherein p is 1,m Representing the user pair U i The power of the 1 st user on the m-th subcarrier,R min representing the minimum achievable rate in a downstream multi-carrier NOMA system, B sc Representing the bandwidth of the sub-carriers, representing the channel coefficients of the base station to the nth user on the mth subcarrier, n E {1,2}, sigma 2 Representing channel noise variance over subcarriers, p m Represents the power of the mth subcarrier, p 2,m Representing the user pair U i Power of the 2 nd user on the m th subcarrier,/and> g m representing the channel coefficient of the base station to the eavesdropper, +.>Representing the minimum power of the mth subcarrier.
4. The method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as in claim 1, wherein in step (2), the user pairs U i The method for calculating the secret capacity on the m-th subcarrier is as follows:
according to the user pair U i Power calculation user pair U on mth subcarrier i The reachable rate and the eavesdropping rate of each user;
calculating user pair U according to user's reachable rate and eavesdropping rate i Privacy rate for each user:
wherein,,representing the user pair U i The secret rate of the nth user on the mth subcarrier, n epsilon {1,2}, R n,m Representing the user pair U i The achievable rate of the nth user on the mth subcarrier,/for>Representing the user pair U i The eavesdropping rate of the nth user on the mth subcarrier;
calculating user pair U according to privacy rate of each user i Secret capacity on the m-th subcarrier:
5. the method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as claimed in claim 1, wherein the specific operation of step (3) is as follows:
when the mth subcarrier SC m Subcarrier matching set of (2)When considering SC m Is not matched from SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i As SC (SC) m Matching user pairs of (a), pair U i Add { SC_m (m) }, SC m Deleting from the subcarrier priority list of other unmatched user pairs, and adding the user pairs U i Deleting from the unmatched user pair set { U_un };
when the mth subcarrier SC m Subcarrier matching set of (2)When considering SC m Has been matched with the user to U j Matching, j=1, 2, …, M and j+.i, from SC to SC m User pair U with maximum security capacity is selected among all user pairs sending matching request i To U by user i At SC m Security capacity->And SC (SC) m Subcarrier matching capacity +.>Comparison, when->When SC is m Rejecting user pair U i Match request of (C) to SC m From user to U i Subcarrier priority list pl_sc (U i ) Delete in the middle; when (when)When selecting user pair U i As SC (SC) m Matched user pair, SC m Rejecting user pair U j By user to U i Substitution of user pairs U in { SC_m (m) } for j SC is put into m From the use ofUser pair U j Subcarrier priority list pl_sc (U j ) Delete and pair U by user j Add to the unmatched user pair set U _ un.
6. The method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as in claim 1, wherein the user pair U is set to i For the m th subcarrier SC m The specific operation of step (5) is:
couple the user to U i And the m-th subcarrier SC m The matching is performed so that the matching is performed,and according to the user pair U i Sequentially updating subcarriers SC m Matching user pairs, subcarrier matching capacity and user power allocation, wherein subcarriers SC m The matching user pairs of (a) are as follows:
7. The method for allocating resources of a downlink multi-carrier NOMA system based on bilateral matching as claimed in claim 1, wherein in the step (6), the formula for updating the random number λ according to a preset update step is as follows:
wherein θ is an update step length, and P represents a maximum total transmit power of a base station in the downlink multi-carrier NOMA system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110600160.XA CN113423141B (en) | 2021-05-31 | 2021-05-31 | Downlink multi-carrier NOMA system resource allocation method based on bilateral matching |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110600160.XA CN113423141B (en) | 2021-05-31 | 2021-05-31 | Downlink multi-carrier NOMA system resource allocation method based on bilateral matching |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113423141A CN113423141A (en) | 2021-09-21 |
CN113423141B true CN113423141B (en) | 2023-06-23 |
Family
ID=77713299
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110600160.XA Active CN113423141B (en) | 2021-05-31 | 2021-05-31 | Downlink multi-carrier NOMA system resource allocation method based on bilateral matching |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113423141B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110430613A (en) * | 2019-04-11 | 2019-11-08 | 重庆邮电大学 | Resource allocation methods of the multicarrier non-orthogonal multiple access system based on efficiency |
CN110856247A (en) * | 2019-11-21 | 2020-02-28 | 重庆邮电大学 | Downlink NOMA power distribution method and system based on service quality |
-
2021
- 2021-05-31 CN CN202110600160.XA patent/CN113423141B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110430613A (en) * | 2019-04-11 | 2019-11-08 | 重庆邮电大学 | Resource allocation methods of the multicarrier non-orthogonal multiple access system based on efficiency |
CN110856247A (en) * | 2019-11-21 | 2020-02-28 | 重庆邮电大学 | Downlink NOMA power distribution method and system based on service quality |
Non-Patent Citations (2)
Title |
---|
A general power allocation scheme to guarantee quality of service in downlink and uplink NOMAsystems;Yang Z, etc.;《IEEE》;第7244-7257页 * |
面向非正交多址接入的资源分配方法研究;雒艳;《软件》;第42卷(第4期);第135-137页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113423141A (en) | 2021-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108462950B (en) | NOMA-based D2D communication combined sub-channel and power distribution method | |
CN106961322B (en) | OFDM relay network resource allocation method based on information and energy simultaneous wireless transmission | |
US8452317B2 (en) | Methods and apparatus related to power control and/or interference management in a mixed wireless communications system supporting WAN signaling and peer to peer signaling | |
EP1408710A1 (en) | Apparatus and method for allocating resources of a virtual cell in an OFDM mobile communication system | |
CN110418360B (en) | Multi-user subcarrier bit joint distribution method for wireless energy-carrying network | |
WO2004068758A1 (en) | Multi-carrier transmission device, multi-carrier reception device, and multi-carrier radio communication method | |
CN113079577B (en) | Resource allocation method based on coexistence scene of EMBB and URLLC | |
Bakhtiari et al. | A new joint power and subcarrier allocation scheme for multiuser OFDM systems | |
CN113923767A (en) | Energy efficiency maximization method for multi-carrier cooperation non-orthogonal multiple access system | |
Doan et al. | Optimal power allocation in cache-aided non-orthogonal multiple access systems | |
WO2010096946A1 (en) | Resource scheduling method, scheduler and base station | |
KR100532062B1 (en) | An apparatus for adaptive resource allocation for multi-channel communication system, and a method thereof | |
Mounchili et al. | Efficient pairing distance for better radio capacity in noma systems | |
CN102164413B (en) | Method for transmitting multi-user access single relay based on orthogonal frequency division multiple access | |
CN112469113B (en) | Resource allocation method and device of multi-carrier NOMA system | |
CN113423141B (en) | Downlink multi-carrier NOMA system resource allocation method based on bilateral matching | |
CN106912059B (en) | Cognitive relay network joint relay selection and resource allocation method supporting mutual information accumulation | |
CN111867103A (en) | Joint user pairing method, device, equipment and storage medium | |
CN107148078B (en) | User access control method and device for hybrid full-duplex and half-duplex network | |
CN108271266B (en) | Downlink user resource allocation method for NOMA-D2D hybrid system | |
CN116600387A (en) | Multidimensional resource allocation method | |
CN109474413B (en) | Allocation method for multiple downlink user multiple carriers of OFDMA system | |
CN109286480B (en) | Subcarrier distribution method for orthogonal frequency division multiple access system based on candidate channel matching method | |
CN110381589B (en) | Cooperative wireless network sub-channel power distribution method based on wireless energy collection | |
CN108989012B (en) | Fairness-based power distribution method for non-orthogonal multiple access technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |