CN114786181A - Joint optimization precoding anti-eavesdropping method based on non-orthogonal multiple access technology - Google Patents

Joint optimization precoding anti-eavesdropping method based on non-orthogonal multiple access technology Download PDF

Info

Publication number
CN114786181A
CN114786181A CN202210421700.2A CN202210421700A CN114786181A CN 114786181 A CN114786181 A CN 114786181A CN 202210421700 A CN202210421700 A CN 202210421700A CN 114786181 A CN114786181 A CN 114786181A
Authority
CN
China
Prior art keywords
user
eavesdropping
precoding
node
multiple access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210421700.2A
Other languages
Chinese (zh)
Inventor
杨柱天
朱伟强
杨蔚
李冬冬
王昀
杨佳敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
8511 Research Institute of CASIC
Original Assignee
Harbin Institute of Technology
8511 Research Institute of CASIC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology, 8511 Research Institute of CASIC filed Critical Harbin Institute of Technology
Priority to CN202210421700.2A priority Critical patent/CN114786181A/en
Publication of CN114786181A publication Critical patent/CN114786181A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0456Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Abstract

A joint optimization precoding anti-eavesdropping method based on a non-orthogonal multiple access technology relates to the technical field of communication, and aims at the problem that the security of a private node cannot be guaranteed in the prior art.

Description

Joint optimization precoding anti-eavesdropping method based on non-orthogonal multiple access technology
Technical Field
The invention relates to the technical field of communication, in particular to a joint optimization precoding anti-eavesdropping method based on a non-orthogonal multiple access technology.
Background
As wireless communication infrastructures and services continue to increase to meet the rapidly increasing communication demands, more and more wireless devices are being accessed to the network, but are limited by the massive and cluttered orthogonal resource allocation scheduling, which makes it difficult to achieve the expected future development indexes of communication technologies. Meanwhile, illegal cyber criminal activities, such as malicious hacker attacks, data eavesdropping, information theft and the like, also continuously ferment along with the access of more devices, and cause great safety problems. The non-orthogonal multiple access (NOMA) technology has the advantages of high transmission rate, high spectrum efficiency, high user density and the like, and becomes the development direction of a mobile network with limited resources in the future, and therefore, the wireless transmission security problem related to the non-orthogonal multiple access system is emphasized particularly so as to help ensure the confidentiality of the wireless communication system against malicious eavesdropping in the current and future massive user access scenes.
Disclosure of Invention
The purpose of the invention is: aiming at the problem that the security of private nodes cannot be guaranteed in the prior art, a joint optimization precoding anti-eavesdropping method based on a non-orthogonal multiple access technology is provided.
The technical scheme adopted by the invention for solving the technical problems is as follows:
the joint optimization precoding anti-eavesdropping method based on the non-orthogonal multiple access technology comprises a transmitting end and a receiving end, wherein the transmitting end executes the following steps:
the method comprises the following steps: precoding information of different nodes to obtain a precoding vector w, wherein the precoding vector w and a channel from a base station to a user need to conform to the following formula:
|hiw1|2≥|hiw2|2≥…|hiwK-1|2≥|hiwK|2
wherein h isiRayleigh fading channel of 1 × M, M is number of antennas, K is number of users, w1 w2 … wK-1 wKPrecoding vectors of user 1 to user K, respectively;
step two: optimizing the precoding vector w to obtain a transmitting signal, wherein the optimization specifically comprises:
when the eavesdropping channel at the base station is known, the optimization is expressed as:
Figure BDA0003608075650000021
s.t.|hiw1|2≥|hiw2|2≥…|hiwK|2,i=1,…,K,
Figure BDA0003608075650000022
Figure BDA0003608075650000023
Figure BDA0003608075650000024
wherein, PsIs the power of the transmitting end and,
Figure BDA0003608075650000025
the rate at which user i information is demodulated for user i +1,
Figure BDA0003608075650000026
for user KThe rate at which the user i information is demodulated,
Figure BDA0003608075650000027
and
Figure BDA0003608075650000028
the transmission rates of the user i and the user K are respectively;
Figure BDA0003608075650000029
is a safe rate, r, of user itSetting a threshold value for the transmission rate;
when the eavesdropper channel is unknown, whether the private node is the node farthest from the base station is judged, if yes, the optimization is represented as:
Figure BDA00036080756500000210
s.t.|hiw1|2≥|hiw2|2≥…|hiwK|2,i=1,…,K,
Figure BDA00036080756500000211
Figure BDA00036080756500000212
Figure BDA00036080756500000213
wherein, the first and the second end of the pipe are connected with each other,kthe kth user in the total users;
otherwise, the optimization is represented as:
Figure BDA00036080756500000214
s.t.|hiw2|2≥|hiw1|2≥|hiw3|2…≥|hiwK|2,i=1,…,K,
Figure BDA00036080756500000215
Figure BDA00036080756500000216
Figure BDA00036080756500000217
Figure BDA00036080756500000218
Figure BDA00036080756500000219
wherein, w3A precoding vector for user 3;
the transmitting end executes the following steps:
step three: the signal is received and demodulated.
Further, the demodulation in step three includes demodulation at the user and demodulation at the eavesdropping place.
Further, the user-side demodulation is represented as:
Figure BDA0003608075650000031
wherein, wjIs a precoding vector, x, of node jjThe information required for the node j is,
Figure BDA0003608075650000032
is connected to the node iReceive information, niIs the noise of node i.
Further, the eavesdropping demodulation is expressed as:
Figure BDA0003608075650000033
wherein, wjIs the pre-coding vector for the node j,
Figure BDA0003608075650000034
for eavesdropping rate, heFor eavesdropping on the channel, σ2Is the noise power.
Further, the number M of antennas is 3.
Further, the power P of the transmitting terminalsIs 10-100 milliwatts.
The beneficial effects of the invention are:
the application is directed to a physical layer security scheme design for non-orthogonal multiple access techniques. Compared with the conventional orthogonal multiple access system, the non-orthogonal multiple access network superimposes signals of a plurality of nodes in a power domain and reasonably utilizes a channel gain difference between the nodes and a transmitting end. At the transmitting end of the non-orthogonal multiple access system, signals required by different nodes are superposed, and then the generated signals are transmitted through the same time-frequency resource; at the receiving end of the non-orthogonal multiple access network, a multi-user demodulation algorithm of serial interference cancellation is used for decoding the required signals in sequence. The method and the device make up for the defect that a weaker channel node is always allocated with larger transmitting power in order to realize serial interference deletion in the non-orthogonal multiple access network, so that the node is more vulnerable to eavesdropping attack. The combined precoding technology is applied properly and flexibly, a comprehensive safety scheme is established based on the idea of physical layer optimization, and the confidential transmission requirements of different private nodes under different conditions are met.
As a new scheme for safe transmission in a non-orthogonal multiple access system, in order to solve the eavesdropping risk in a downlink non-orthogonal multiple access network, the method and the device ensure the safety of private nodes by using joint precoding optimization provided by a transmitting terminal and flexible serial interference elimination after the receiving terminal is improved. When the intercepted channel information is available at a transmitting end, the precoding vectors are jointly optimized to maximize the total secret rate, and the problem is converted into convex optimization for processing through second-order cone planning and corresponding conversion, so that suboptimal solution of an original problem can be effectively calculated, and the total secret rate of a network is effectively improved; for the condition that the intercepted channel information is unavailable, the design scheme of the application firstly considers that a private node is not a node which is relatively farthest from a transmitting end, and maximizes the transmitting power of the node which is closer to the transmitting end through joint precoding optimization to ensure the safety of the private node, and then when the node which is farthest from the transmitting end needs private transmission, the serial interference demodulation sequence provided by the invention is different from the traditional non-orthogonal multiple access network.
Drawings
FIG. 1 is a schematic diagram of a non-orthogonal multiple access network;
FIG. 2 is a schematic diagram of two user cases of a successive interference cancellation procedure at a legitimate node;
FIG. 3 is a graphical illustration of the change in total secret transmission rate as the algorithm iterates;
FIG. 4 is a graph comparing non-orthogonal multiple access networks with orthogonal multiple access with different Ps and M;
FIG. 5 shows the difference between Ps, M and deNext, a graph of the change in the total privacy rate;
FIG. 6 shows the relationship between the values of different Ps and rtNext, a confidential transmission rate analysis map of the node UE-2;
FIG. 7 shows the relationship between the values of different Ps and rtNext, the diagram of the secret transmission rate analysis of the farthest node UE-1.
Detailed Description
It should be noted that, in the present invention, the embodiments disclosed in the present application may be combined with each other without conflict.
The first embodiment is as follows: specifically, referring to fig. 1, the embodiment is described, and the joint optimization precoding anti-eavesdropping method based on the non-orthogonal multiple access technology in the embodiment includes the following steps:
step 1, establishing a multi-node model of a non-orthogonal multiple access system, wherein a potential eavesdropper exists;
and 2, the step is a precoding process of the multi-antenna base station with M antennas, namely, information of different nodes is provided with corresponding precoding vectors before being transmitted. Due to the particularity of the non-orthogonal multiple access network and its demodulation, the precoding w and the base station to user channel need to conform to the following equation:
|hiw1|2≥|hiw2|2≥…|hiwK-1|2≥|hiwK|2
based on this, in order to maximize the overall security performance of the non-orthogonal multiple access network, the optimization problems under different conditions proposed by the present invention are:
2.1) when the eavesdropping channel at the base station is known, all nodes of the non-orthogonal multiple access system can carry out secret transmission according to the algorithm provided by the invention, and the physical layer security design scheme for maximizing the total secret rate is as follows:
Figure BDA0003608075650000051
where the total power threshold at the network transmission is PS,rtIs the rate threshold value of single node transmission, and other parameters are detailed in step 3;
2.2) when the eavesdropper channel is unknown, the invention adopts a reasonable scheme to improve the eavesdropping prevention performance of one or more private nodes: specifically, when the private node is not considered as the node which is farthest away from the base station in the network, the transmission power of the nodes which are at a distance from the base station and are more than that of the private node is maximized, and the design scheme is as follows:
Figure BDA0003608075650000052
s.t.|hiw1|2≥|hiw2|2≥…|hiwK|2,i=1,…,K,
Figure BDA0003608075650000053
Figure BDA0003608075650000054
Figure BDA0003608075650000055
therefore, the private information can be hidden in the larger power information of the nodes, so that the safety of the nodes is enhanced;
2.3) when the node farthest from the base station needs private transmission, due to the change of the private node, the serial interference demodulation sequence in the invention is flexibly modified into | hiw2|2≥|hiw1|2≥|hiw3|2…≥|hiwK|2I is 1,2, …, K, and at the same time, the node which can provide most of interference to the eavesdropper has also changed flexibly, and the design scheme is as follows:
Figure BDA0003608075650000061
s.t.|hiw2|2≥|hiw1|2≥|hiw3|2…≥|hiwK|2,i=1,…,K,
Figure BDA0003608075650000062
Figure BDA0003608075650000063
Figure BDA0003608075650000064
Figure BDA0003608075650000065
Figure BDA0003608075650000066
step 3, the step is a decoding stage at a receiving node and a potential eavesdropper;
5.1) information at non-orthogonal multiple Access node i is
Figure BDA0003608075650000067
Precoding w herejIs the signal of the corresponding node j, hiThe nodes are Rayleigh fading channels of 1 xM, and acquire self required information according to serial interference deletion;
5.2) for the eavesdropping end, the rate of demodulating the information of the node i by the eavesdropper is as follows:
Figure BDA0003608075650000068
it should be noted that this formula is for measuring the performance effect of the present invention, and does not need to participate in the design technique of the present invention.
And 4, the non-orthogonal multiple access transmitting terminal in the step sends information of the next moment, the step 2 is skipped to solve the solution of the joint precoding coding and send the information, and then the step 3 carries out the demodulation steps at different receiving terminals.
In order to concentrate on the problem of secure transmission of a non-orthogonal multiple access system, under the condition that an eavesdropper exists in the system, a related physical layer security scheme is designed and targeted measures are taken, and the security of a non-orthogonal multiple access network for wireless downlink transmission is improved. Specifically, the present application is based on a non-orthogonal multiple access network, and the primary objective is to maximize the total security rate of the physical layer security design scheme when all nodes in the non-orthogonal multiple access system need private transmission. And under the condition that the information of an eavesdropper channel is unknown, the anti-eavesdropping performance of one or more private nodes is improved by adopting a reasonable scheme: for example, when the private node is not considered to be the node farthest from the base station in the network, the scheme provided by the application maximizes the transmission power of the nodes which are farther from the base station than the private node. Therefore, the private information can be hidden in the larger power information of the nodes, so that the safety of the nodes is enhanced; and when the node farthest from the base station needs private transmission, the sequence of serial interference demodulation is flexibly modified due to the change of the private node, and the node which can provide most interference for an eavesdropper is also flexibly changed. The core idea of the application is that the modulation and demodulation advantages in a non-orthogonal multiple access system are utilized, the physical layer safety idea is flexibly designed and adopted, and the security requirements of different private nodes under different conditions are met.
In the face of a potential eavesdropping scene, the non-orthogonal multiple access system based on multiple nodes takes the joint pre-coding safety optimization as a core idea to ensure the safety performance of private nodes in the system under different scenes.
Example 1
Step 1, establishing a multi-node model of a non-orthogonal multiple access system, wherein 3 non-orthogonal multiple access nodes and a potential eavesdropper exist as shown in figure 1 (BS is a transmitting base station, UE-1 to UE-K are K nodes accessed into a network, and Eav is an eavesdropping end); it is assumed that an eavesdropper can act as a registered user in the network. Distances were 45 meters, 250 meters and 50 meters, respectively, and the channel noise was 10-11Milliwatts. At this point, the service communication between the eavesdropper and the transmitting end is not initiated, and there may occasionally be only a simple control communication between them, i.e. a potential control communicationThe eavesdropper is not included in the node with which the base station is communicating. Thus, the transmitting end only needs to ensure that the information of the node communicating at the time is leaked as little as possible by the precoding scheme of the present invention. Of course, the above is only one case assumed by this example, and in other cases, for example, in a scenario where an eavesdropper can serve as an external node that is not registered in the network but wishes to actively communicate with the base station, the scheme proposed by the present invention can similarly enhance the communication security of the node that is communicating at this time.
Step 2, the step is a pre-coding process of a multi-antenna base station with 3 antennas, namely, information of different nodes is provided with pre-coding vectors corresponding to the information before being transmitted, and the total security performance of the non-orthogonal multiple access network is improved to the maximum extent; when the eavesdropping channel at the base station is known, all nodes of the non-orthogonal multiple access system can carry out secret transmission according to the algorithm provided by the invention, and the precoding vector is designed and optimized by utilizing the physical layer security design scheme which maximizes the total secret rate. As shown in fig. 3, when the power threshold of the transmitting end is changed from 10 mw to 100 mw, the iterative algorithm proposed by the present invention converges quickly to obtain a corresponding solution. In fig. 4, it can be seen from a comparison between the non-orthogonal multiple access network and the orthogonal multiple access network with different Ps and M that the non-orthogonal multiple access network is much higher than the orthogonal multiple access network, which further verifies that the invention guarantees the superiority of the secure transmission while improving the spectrum efficiency. In FIG. 5, different Ps, M and d were investigatedeNext, the total secret rate varies, and even if the distance between the eavesdropper and the transmitting end is close, for example, 100 meters, the security measures proposed by the present invention can guarantee the secret transmission performance of multiple users in the non-orthogonal multiple access system.
Step 3, the step is a decoding stage at a receiving node and a potential eavesdropper; the legal node obtains the information required by itself according to the serial interference deletion, as shown in fig. 2 for example;
and 4, the non-orthogonal multiple access transmitting terminal in the step sends information of the next moment, the step 2 is skipped to solve the solution of the joint precoding coding and send the information, and then the step 3 carries out the demodulation steps at different receiving terminals.
Example 2
The joint optimization precoding anti-eavesdropping method of the non-orthogonal multiple access technology provided by the invention can also adopt a reasonable scheme to improve the anti-eavesdropping performance of private nodes under the condition that the channel information of an eavesdropper is unknown.
Specifically, in fig. 6, it is considered that the private node is not the node farthest from the base station in the network, and the solution proposed in the present invention maximizes the transmission power of the nodes that are farther from the base station than the private node. In this way, the private information can be hidden in the larger power information of the nodes, thereby enhancing the security of the nodes. And taking M as 3, deAt 100 m, different Ps and r were studiedtNext, the secret transmission rate of the node UE-2 is analyzed. As shown, the secret transmission rate of node UE-2 is close to the transmission threshold set by the node. The eavesdropping behavior is effectively impeded and the eavesdropping rate approaches 0 in case of a relatively large transmission power.
And when the node farthest from the base station needs private transmission, the sequence of serial interference demodulation is flexibly modified due to the change of the private node, and the node which can provide most interference for an eavesdropper is also flexibly changed. In order to more fully study the security guarantee brought by the proposed scheme for the non-orthogonal multiple access network, in fig. 7, M is taken as 3, deAt 100 m, different Ps and r were studiedtNext, the secret transmission rate of the farthest node UE-1 is analyzed. As shown, the secret transmission rate of the most remote node UE-1 may also be close to the transmission threshold set by the node. The eavesdropping rate may also approach 0 in case of a relatively large transmission power. The serial interference deleting sequence modified by the invention is realized and exerts the effect, thereby realizing higher safety performance.
It should be noted that the detailed description is only for explaining and explaining the technical solution of the present invention, and the scope of protection of the claims is not limited thereby. It is intended that all such modifications and variations that fall within the spirit and scope of the invention be limited only by the claims and the description.

Claims (6)

1. A joint optimization precoding anti-eavesdropping method based on a non-orthogonal multiple access technology comprises a transmitting end and a receiving end, and is characterized in that the transmitting end executes the following steps:
the method comprises the following steps: precoding information of different nodes to obtain a precoding vector w, wherein the precoding vector w and a channel from a base station to a user need to conform to the following formula:
|hiw1|2≥|hiw2|2≥…|hiwK-1|2≥|hiwK|2
wherein h isiRayleigh fading channel of 1 × M, M is number of antennas, K is number of users, w1 w2…wK-1wKPrecoding vectors of user 1 to user K respectively;
step two: optimizing the precoding vector w to obtain a transmitting signal, wherein the optimization specifically comprises:
when the eavesdropping channel at the base station is known, the optimization is expressed as:
Figure FDA0003608075640000011
s.t.|hiw1|2≥|hiw2|2≥…|hiwK|2,i=1,…,K,
Figure FDA0003608075640000012
Figure FDA0003608075640000013
Figure FDA0003608075640000014
wherein, PsIs the power of the transmitting end and is,
Figure FDA0003608075640000015
the rate at which user i information is demodulated for user i +1,
Figure FDA0003608075640000016
the rate at which user i information is demodulated for user K,
Figure FDA0003608075640000017
and
Figure FDA0003608075640000018
the transmission rates of the user i and the user K are respectively;
Figure FDA0003608075640000019
is a safe rate, r, of user itSetting a threshold value for the transmission rate;
when the eavesdropper channel is unknown, whether the private node is the node farthest from the base station is judged, if yes, the optimization is represented as:
Figure FDA00036080756400000110
s.t.|hiw1|2≥|hiw2|2≥…|hiwK|2,i=1,…,K,
Figure FDA00036080756400000111
Figure FDA00036080756400000112
Figure FDA00036080756400000113
wherein k is the kth user in the total users;
otherwise, the optimization is represented as:
Figure FDA0003608075640000021
s.t.|hiw2|2≥|hiw1|2≥|hiw3|2…≥|hiwK|2,i=1,…,K,
Figure FDA0003608075640000022
Figure FDA0003608075640000023
Figure FDA0003608075640000024
Figure FDA0003608075640000025
Figure FDA0003608075640000026
wherein w3A precoding vector for user 3;
the transmitting terminal executes the following steps:
step three: receiving a signal and demodulating the received signal.
2. A jointly optimized precoding anti-eavesdropping method based on non-orthogonal multiple access techniques as claimed in claim 1, characterized in that the demodulation in the third step comprises demodulation at user and demodulation at eavesdropping.
3. A jointly optimized precoding anti-eavesdropping method based on non-orthogonal multiple access techniques according to claim 2, characterized in that the at-user demodulation is expressed as:
Figure FDA0003608075640000027
wherein, wjIs the precoding vector of node j, xjThe information required for the node j is,
Figure FDA0003608075640000028
receive information for node i, niIs the noise of node i.
4. A jointly optimized precoding anti-eavesdropping method based on non-orthogonal multiple access techniques according to claim 2, characterized in that the eavesdropping demodulation is expressed as:
Figure FDA0003608075640000029
wherein, wjIs the precoding vector for node j,
Figure FDA00036080756400000210
for eavesdropping rate, heFor eavesdropping on the channel, σ2Is the noise power.
5. A jointly optimized precoding eavesdropping-resistant method based on non-orthogonal multiple access techniques as claimed in claim 1, characterized in that said number of antennas M is 3.
6. According to the rightThe method for jointly optimizing precoding to combat eavesdropping based on non-orthogonal multiple access technology as claimed in claim 1, wherein the power P of the transmitting end issIs 10 milliwatts to 100 milliwatts.
CN202210421700.2A 2022-04-21 2022-04-21 Joint optimization precoding anti-eavesdropping method based on non-orthogonal multiple access technology Pending CN114786181A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210421700.2A CN114786181A (en) 2022-04-21 2022-04-21 Joint optimization precoding anti-eavesdropping method based on non-orthogonal multiple access technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210421700.2A CN114786181A (en) 2022-04-21 2022-04-21 Joint optimization precoding anti-eavesdropping method based on non-orthogonal multiple access technology

Publications (1)

Publication Number Publication Date
CN114786181A true CN114786181A (en) 2022-07-22

Family

ID=82431473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210421700.2A Pending CN114786181A (en) 2022-04-21 2022-04-21 Joint optimization precoding anti-eavesdropping method based on non-orthogonal multiple access technology

Country Status (1)

Country Link
CN (1) CN114786181A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112672375A (en) * 2020-12-07 2021-04-16 大连理工大学 Intelligent reflector assisted secure communication method in non-orthogonal multiple access network
US20220076134A1 (en) * 2020-09-04 2022-03-10 Korea Advanced Institute Of Science And Technology Two-stage deep learning based secure precoder for information and artificial noise signal in non-orthogonal multiple access system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220076134A1 (en) * 2020-09-04 2022-03-10 Korea Advanced Institute Of Science And Technology Two-stage deep learning based secure precoder for information and artificial noise signal in non-orthogonal multiple access system
CN112672375A (en) * 2020-12-07 2021-04-16 大连理工大学 Intelligent reflector assisted secure communication method in non-orthogonal multiple access network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NAN ZHAO, DONGDONG LI等: "Secure Transmission via Joint Precoding Optimization for Downlink MISO NOMA", 《IEEE》 *
李冬冬: "NOMA无线网络安全传输优化与性能分析", 《CNKI中国硕士学位论文全文数据库信息科技辑》 *

Similar Documents

Publication Publication Date Title
Wu et al. Resource allocation for enhancing offloading security in NOMA-enabled MEC networks
CN111245498B (en) Relay-assisted non-orthogonal multiple access cooperative network secure communication method
Shah et al. A novel physical layer security scheme in OFDM-based cognitive radio networks
Chen et al. Fast power allocation for secure communication with full-duplex radio
Li et al. Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks
Feng et al. Non-orthogonal multiple access and artificial-noise aided secure transmission in FD relay networks
Forouzesh et al. Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden
CN109600222B (en) Key generation method based on channel characteristics
CN111510987A (en) Relay selection method based on safety cooperation NOMA network
Chen et al. Security enhancement using a novel two-slot cooperative NOMA scheme
Liu et al. Secrecy performance analysis in downlink NOMA systems with cooperative full-duplex relaying
CN112383380A (en) Covert vehicle communication method based on non-orthogonal multiple access technology
CN113193891B (en) Physical layer security authentication method for downlink non-orthogonal multiple access unmanned aerial vehicle system
Feng et al. Safeguarding non-orthogonal multiple access with physical layer techniques
Ma et al. Performance analysis and optimization in two-way cooperative NOMA under two-phase transmission protocol
KR101439756B1 (en) Secure transmission METHOD AND SYSTEM in downlink cellular network with a cooperative jammer
Zheng et al. Secure NOMA based full-duplex two-way relay networks with artificial noise against eavesdropping
Fang et al. Physical layer security: A WFRFT-basec cooperation approach
US20230082251A1 (en) Joint random subcarrier selection and channel-based artificial signal design aided pls
Gong et al. Cooperative interference and power allocation in a bidirectional untrusted relay network with channel estimation errors
Wang et al. Optimal joint beamforming and jamming design for secure and covert URLLC
Hu et al. To establish a secure channel from a full-duplex transmitter to a half-duplex receiver: An artificial-noise-aided scheme
CN114786181A (en) Joint optimization precoding anti-eavesdropping method based on non-orthogonal multiple access technology
MirhoseiniNejad et al. Phase jamming attack: A practical attack on physical layer-based key derivation
Xu et al. Secure massive MIMO downlink with low-resolution ADCs/DACs in the presence of active eavesdropping

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220722