WO2022031245A1 - A communication system with multiple-input single-output non-orthogonal multiple access (miso-noma) system and its communication method - Google Patents
A communication system with multiple-input single-output non-orthogonal multiple access (miso-noma) system and its communication method Download PDFInfo
- Publication number
- WO2022031245A1 WO2022031245A1 PCT/TR2021/050485 TR2021050485W WO2022031245A1 WO 2022031245 A1 WO2022031245 A1 WO 2022031245A1 TR 2021050485 W TR2021050485 W TR 2021050485W WO 2022031245 A1 WO2022031245 A1 WO 2022031245A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- noma
- channel
- users
- antenna
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000004891 communication Methods 0.000 title claims abstract description 38
- 206010042135 Stomatitis necrotising Diseases 0.000 title description 38
- 201000008585 noma Diseases 0.000 title description 38
- 238000012545 processing Methods 0.000 claims description 8
- 239000013598 vector Substances 0.000 claims description 7
- 230000001419 dependent effect Effects 0.000 claims description 3
- 239000000203 mixture Substances 0.000 claims description 3
- 238000005562 fading Methods 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 description 30
- 238000013461 design Methods 0.000 description 14
- 230000004044 response Effects 0.000 description 8
- 239000002131 composite material Substances 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 5
- 230000002708 enhancing effect Effects 0.000 description 4
- 230000015556 catabolic process Effects 0.000 description 3
- 238000006731 degradation reaction Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 239000011159 matrix material Substances 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004088 simulation Methods 0.000 description 3
- 230000003595 spectral effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000001149 cognitive effect Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- URWAJWIAIPFPJE-YFMIWBNJSA-N sisomycin Chemical compound O1C[C@@](O)(C)[C@H](NC)[C@@H](O)[C@H]1O[C@@H]1[C@@H](O)[C@H](O[C@@H]2[C@@H](CC=C(CN)O2)N)[C@@H](N)C[C@H]1N URWAJWIAIPFPJE-YFMIWBNJSA-N 0.000 description 2
- 101100001678 Emericella variicolor andM gene Proteins 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000006866 deterioration Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03891—Spatial equalizers
- H04L25/03898—Spatial equalizers codebook-based design
- H04L25/0391—Spatial equalizers codebook-based design construction details of matrices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0452—Multi-user MIMO systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/10—Secret communication by using two signals transmitted simultaneously or successively
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
- H04K3/825—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
- H04L27/2601—Multicarrier modulation systems
- H04L27/2626—Arrangements specific to the transmitter only
- H04L27/2627—Modulators
- H04L27/2634—Inverse fast Fourier transform [IFFT] or inverse discrete Fourier transform [IDFT] modulators in combination with other circuits for modulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/30—Jamming or countermeasure characterized by the infrastructure components
- H04K2203/34—Jamming or countermeasure characterized by the infrastructure components involving multiple cooperating jammers
Definitions
- the invention is a communication system and its method presenting a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems.
- PLS physical layer security
- the secrecy loss probability is considered as the secrecy matrix.
- secrecy loss and QoS are formulated.
- a closed-form solution to this issue was developed.
- the issue of enhancing the secrecy rate among users to maximum was also studied, subject to the limitations of certain secrecy loss and transmit power, where an iterative algorithm was proposed to eliminate this drawback.
- TAS transmit antenna selection
- the adopted technique is preferable to be independent of the spatial differences between channels due to high correlation.
- the authors introduced a new PLS technique.
- the original user s information signals are converted into the signals to be transmitted using a specially designed angle conversion method, where the fundamentals of these variations are different for different users.
- a suitable system is also designed with fullduplex technology to ensure that users can learn their fundamentals safely.
- This technique helps provide a regular operation of SIC by allowing each user to gather the transmitted signals from other users.
- the original signals are challenging to determine from transmitted signals and can be obtained only by the corresponding authorized users.
- a modern, non-orthogonal relaying technique is proposed to optimize the secrecy rate.
- the source and relay nodes are permitted to simultaneously transmit signals over non-orthogonal channels (which induces co-channel interference), and SIC is usually applied to the destination node to decode the corresponding signal.
- the authors also proposed two antenna selection scheme for transmitting the signals to further enhance the secrecy.
- NOMA is combined with non-orthogonal channel estimation (NOCE) to enhance the quality of signal only for the authorized user to establish secure communication.
- NOCE non-orthogonal channel estimation
- the inter-user interference is harnessed without exploiting artificial noise, which helps confuse the eavesdroppers.
- PLS physical layer security
- MISO-NOMA multiple-input single-output non- orthogonal multiple access
- the conventional power domain PD-NOMA was previously adopted under the name of multi-user superposition transmission (MUST) in release 13 of 3GPP but recently excluded from 3GPP-release 17 due to its performance degradation from the SIC at the receiver, which raises the chance of eavesdropping.
- MUST multi-user superposition transmission
- Our novel algorithm combines the benefit of pre-coder matrices with simultaneous transmission using antenna diversity to provide simple, reliable, and secure communication without complex processing at the receivers in downlink scenarios.
- the effectiveness of the proposed algorithm is verified and proven by extensive analysis and numerical simulations.
- Figure 1 Basic block diagram of proposed new NOMA with signal precoding using spatial diversity-based system (i.e., simultaneous transmission from two antennas enabled by MISO)
- the transmitter in our proposed system comprises a two-user two-antenna multicarrier down-link authorized transmitter (Tx) that aims to communicate with two single antenna authorized users in the presence of a passive single antenna eavesdropper as can be seen in Fig. 1 .
- Tx down-link authorized transmitter
- Our MISO system employs spatial diversity enabled by transmitting the same composite signal (i.e., two user signals) simultaneously from two antennas. Furthermore, it is considered that the transmitter has no information regarding the channel of a passive eavesdropper.
- the channel between transmitter (Tx) and any random user -slowly varies multi-path Rayleigh fading with the exponentially decaying function that we presume is known at the transmitter. Also, channel reciprocity property is adopted, where channel sounding techniques have the potential to be implemented to estimate the channel from the transmitter (Tx) to the receiver using the channel from the receiver to transmitter in time division duplexing (TDD) method.
- TDD time division duplexing
- the communication system employs a simultaneous transmission of two user signals from two antennas.
- the authorized transmitter is responsible for the security of communication within the users so that the external eavesdropper cannot receive the user’s signal information, nor the users get each other’s data.
- the receiver consists of user-1 , user-2, and external eavesdropper. Both the users decode their authorized precoded data, which helps in keeping the data entirely secret. While eavesdropper trying to intercept and access the data from user- 1 and user-2 receives the degraded version of signals.
- the algorithm is designed to meet the need for secure, low latency, and low computational power at the receiver.
- we superimpose the data sequence of two users along side pre-coder matrices and transmit them simultaneously from two antennas. However, it should ensure that this simultaneous transmission occurs in different channels and not on the same channel. It allows us to devise a set of intelligent pre-coder that can prevent external eavesdropping and internal eavesdropping.
- the pre-coders used in the invention are a function of multiple authorized user channels.
- pre-coder is a function of single user channel only.
- the simultaneous transmission role facilitates authorized users' ability to decode the intended information while making it more difficult for unauthorized users to decipher the signal being transmitted.
- NOMA inspired pre-coded superposition coding, together with cross-layer principles of simultaneous transmission with antenna diversity, is implemented. It made communication more secure and reliable for downlink scenarios without requiring any additional computational processing at the receiver.
- each user consists of one antenna, i.e. , a total of two antennas at the transmitter, as shown in Fig. 1.
- the total number of carriers in one OFDM block for each user at the receiver is N f.
- ykm2c [N f 1] ,Hkm2c [N f N f ] andzkm2c [N f 1 ' present the received signal, the channel's frequency response, and AWGN that is experienced between kth user and mth antenna of transmitter.
- U2 Ml bXl + M2bX2 (2) where data vectors for user-1 and user-2 are xiand X2in the frequency domain, the overall power is equal between the two users, whereas the pre-coder matrices are Mia, M2a, M and M2b.
- These pre-coders will ensure that users 1 and user 2 will receive reliable signals that are also secure against eavesdropping by internal and external hackers. We will briefly explain how the signal at user-1 , user-2, and eavesdropper is affected. Afterward, the pre-coding matrices will be explained in depth.
- the transmitted signal via antenna-2 to user-1 is:
- H ⁇ and zi2 are the channels' frequency response and AWGN between user-1 and antenna-2.
- the first term is the desired term for user-1 and the second term is unwanted term for it.
- Pre-coder matrices ensure that both the unwanted term and the channel effects are removed from user-1 and canceled.
- the first term is the desired term for user-2 and the second term is unwanted.
- Pre-coder matrices ensure that both the unwanted term and the channel effects are removed from user-1 and canceled.
- the eavesdropper would like to receive user-1 and user-2 information. Therefore, both the first and second terms in (20) are the desired terms for it.
- the pre-coder matrices Mia, M , M2a and M2b are superimposed with the data to provide reliable and secure transmission against internal and external eavesdroppers.
- the pre-coder matrices are provided in equations (23), (24), (27) and (28).
- SINR signal to interference noise ratio
- the data sequence of two users is passed through a modulator and then converted from serial to parallel, so it becomes a column vector.
- the pre-coder matrices are devised where four different channel-dependent intelligent pre-coder matrices are superimposed with these data vectors.
- the mixture of the data vector and pre-coder matrices is transmitted simultaneously from two antennas to the receiver of both user 1 and user 2, easily decrypted at the authorized users.
- the simultaneous transmission of data from two antennas with superimposed pre-coder matrices helps in automatic interference cancellation. It eliminates the need for successive interference cancellation (SIC), which minimizes the computational complexity at the authorized receiver and increases the complexity for the eavesdropper.
- SIC successive interference cancellation
- the proposed scheme can provide security against external Eve because the pre-coders are dependent on the channels of the legitimate nodes.
- the proposed scheme can also provide security against internal Eve by ensuring that there will be no leakage of information among users.
- pre-coder matrices can be designed by simple computation.
- Bit Error Rate (BER) Analysis Figure 2 compares the bit error rate (BER) versus signal to noise ratio (SNR) plots for the invention. It is evident from figure 2 that the user-1 (Bob1 ) and user-2 (Bob2) performances are similar. However, there is a considerable difference between authorized users' BER performances and those of eavesdroppers.
- the labels E-Eve-1 and E-Eve-2 represents external eavesdropper, and similarly, l-Eve-1 and l-Eve-2 represents the internal eavesdropper attempting to eavesdrop the signal.
- the degraded performance shown by both the eavesdroppers proves the efficiency of our invention’s algorithm.
- the results of the BER analysis demonstrate that the proposed scheme provides efficient performance for the communications.
- Figure 3 represents the throughput plots for the basic of our invention, multiple input single output (MISO) system.
- MISO multiple input single output
- the individual throughput performances of user-1 (Bob-1 ) and user- 2 (Bob-2) employing our invention’s algorithm are similar to each other.
- the excellent throughput performance of the authorized user's signals and the deterioration of external and internal eavesdropper's signals proves our algorithm's robustness.
- QoS quality of service
- FIG. 4 depicts a comparison of the peak to average power ratio (PAPR) performances of the conventional OFDM and OFDM with our invention’s algorithm for user-1 (Bob-1) and user-2 (Bob-2). It can be observed in Fig. 4 that the proposed method's PAPR performance outperforms the conventional method at high SNR values.
- the developed scheme gets improved PAPR because the precoder matrices, when designed at the transmitter, change the signal's distribution from being gaussian to something less random than gaussian and close to uniform. Therefore, it resolves one of the significant challenges faced by OFDM systems by reducing the PAPR, which results in improved spectral and energy efficiency.
- the proposed invention can be a good solution for providing secure communication, especially for the low processing loT-based devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Discrete Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention is a communication system and its method presenting a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems.
Description
A COMMUNICATION SYSTEM WITH MULTIPLE-INPUT SINGLE-OUTPUT NON- ORTHOGONAL MULTIPLE ACCESS (MISO-NOMA) SYSTEM AND ITS COMMUNICATION METHOD
TECHNICAL FIELD
The invention is a communication system and its method presenting a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems.
BACKGROUND
In the literature, several studies have focused on applying PLS to NOMA- based systems to improve their confidentiality against eavesdropping or illegitimate access by unintended devices.
Xiang et al. (Z. Xiang, W. Yang, G. Pan, Y. Cai, and Y. Song, “Physical layer security in cognitive radio inspired noma network,” IEEE Journal of Selected Topics in Signal Processing, vol. 13, no. 3, pp. 700-714, 2019) proposed a NOMA network with multiple primary and secondary users. This work focuses on PLS design in cognitive radio. In this technique, firstly, the primary and secondary users are paired following their channel gain, and afterwards, the signal is transmitted using powerdomain NOMA. This research suggests that by pairing the primary users with the most excellent gains or by minimizing the number of secondary users, the secrecy of data can be improved. Furthermore, Lv et al. (L.Lv, Z. Ding, Q. Ni, and J. Chen, “Secure miso-noma transmission with artificial noise,” IEEE Transactions on Vehicular Technology, vol. 67, no. 7, pp. 6700-6705, 2018), proposed new secrecy beamforming (SBF) technique by using artificial noise to secure private data of the two users within a NOMA network. This model is designed for MISO-NOMA systems such that only the eavesdropper receives a degraded version of the signals. Nevertheless, the proposed powerdomain technique still suffers from SINR degradation.
In addition, §ahin et al. (M. M. §ahin and H. Arslan, “Waveform-domain NOMA: The future of multiple access,” arXiv preprint arXiv:2003.05548, 2020 - arxiv.org) proposed a waveform-domain NOMA. This proposed model presents the
idea for the utilization of multiple waveforms in the same resource element, where the most appropriate waveform is allocated to each user and then decoded at the receiver. Thus, this system suffers from the drawback that it requires additional processing at the receiver, resulting in high power consumption with enhanced complexity.
In “Z.Qin,Y. Liu, Z. Ding, Y. Gao, andM.EIkashlan, “Physicallayersecurityfor5gnon- orthogonal multiple access in large-scale networks,” 05 2016, pp. 1-6” authors analyzed the PLS efficiency of a downlink SISO-NOMA scenario for the first time in the literature. They developed a solution of devising the optimum power allocation strategy that enhances the secrecy sum-rate to the maximum against an external eavesdropper, given a particular constraint on each user’s QoS requirements in the network. It has been shown that the degree of confidentiality offered by NOMA is substantially higher than that provided by conventional OMA.
In “C. Zhong and Z. Zhang, “Non-orthogonal multiple access with cooperative full-duplex relaying,” IEEE Communications Letters, vol. PP, pp. 1-1 , 09 2016”, the authors proposed the secured transmission of a MISO-NOMA downlink case, where multiplexed users are divided into multiple categories, each consisting of a cellcentric, nearuser (NU) and a far-user (FU) cell-edge. The near user is considered an authorized user, while the far user is an internal eavesdropper. The authors analyzed the joint optimization of the beamforming system as well as the power allocation system, which enhances the near-user total sum secrecy rate to a certain level at the transmitter and target its rate requirements at the NU.
In “Y. Zhang, H. Wang, Q. Yang, and Z. Ding, “Secrecy sum rate maximization in non-orthogonal multiple access,” pp. 930-933, 05 2016”, the drawback in the secrecy sum-rate maximization was investigated for a downlink MIMO-NOMA network. This network consists of a base station, multiple authorized users, and an external eavesdropper. The scenario considered by authors in “O.Maraqa, A.Rajasekaran, S.AI-Ahmadi, and S.Sait, “Asurveyofrate-optimalpowerdomain noma with enabling technologies of future wireless networks,” 08 2020.” is similar to that adopted in “C. Zhong and Z. Zhang, “Non-orthogonal multiple access with cooperative full-duplex relaying,” IEEE Communications Letters, vol. PP, pp. 1-1 , 09 2016” for the case of (i.e., MIMO-NOMA) networks. The authors also addressed the problem of internal (FU) that is eavesdropping the communication of nearby celledge users.
According to the authors, this issue is solvable by designing an optimized, secure beamforming technique to enhance the secrecy rate subject to its maximum capacity for a certain transmit power level and target data rate. In “Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the physical layer security of non- orthogonal multiple access in large-scale networks,” 01 2017”, PLS performance of NOMA in large-scale communication systems was analyzed using stochastic geometry, where scenarios for both single-antenna and multiantenna base stations are considered. In the scenario of a single antenna-aided base station, the secure area available around the base station is adopted to assist the multiplexed users’ judicious channel ordering. For the scenario of a multi-antenna-equipped base station, artificial noise is produced at the base station to enhance the secrecy of data further.
In “Z. Ding, Z. Zhao, M. Peng, and H. V. Poor, “On the spectral efficiency and security enhancements of noma assisted multicast-unicast streaming,” 11 2016”, the authors examined NOMA’s application with cases of mixed multicasting and unicasting transmission to increase the spectral efficiency and capability of the system to provide secrecy. The proposed design of joint beamforming and power allocation ensures unicasting, enhanced efficiency while maintaining the multicasting reliability. The authors in “B. He, A. Liu, N. Yang, and V. Lau, “On the design of secure non-orthogonal multiple access systems,” 12 2016” introduced a novel design of a secure NOMA network to protect the transmitted data from external eavesdroppers. In this work, ideal designs of data rates, the order of decoding and the power assigned to every user is studied. The secrecy loss probability is considered as the secrecy matrix. Firstly, secrecy loss and QoS are formulated. Afterward, a closed-form solution to this issue was developed. In addition, the issue of enhancing the secrecy rate among users to maximum (inspired by the requirement of providing fairness among the users) was also studied, subject to the limitations of certain secrecy loss and transmit power, where an iterative algorithm was proposed to eliminate this drawback.
In “T.-N. Tran and M. Voznak, “On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on tas protocol,” 12 2020”, the authors studied the secrecy efficiency of a downlink NOMA system with two users, which considers both SISO and MISO scenarios with different transmit antenna selection (TAS) techniques. Exact closed-form formulas for
the probability of secrecy loss are obtained with suboptimal TAS and optimal TAS techniques and contrasted with the standard space-time transmission technique. A power allocation scheme is also proposed for all of the TAS techniques to achieve non-zero diversity order.
In “D. Xu, P. Ren, Q. Du, L. Sun, and Y. Wang, “Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission,” pp. 1-6, 05 2017”, the authors recommended the properties of good eavesdropping- resilient techniques in the NOMA network. Although the conventional PLS techniques can resist the eavesdropping, there is a high probability of an internal eavesdropper to appear between the users in a NOMA network. Therefore, the authors summarized these properties in three rules that each NOMA network must follow to secure itself from eavesdropping:
(1 ) operation of successive interference cancellation (SIC) without the need for any extra processing.
(2) users should not be able to obtain each other’s information.
(3) the adopted technique is preferable to be independent of the spatial differences between channels due to high correlation.
In consideration of these rules, the authors introduced a new PLS technique. In this proposed technique, the original user’s information signals are converted into the signals to be transmitted using a specially designed angle conversion method, where the fundamentals of these variations are different for different users. A suitable system is also designed with fullduplex technology to ensure that users can learn their fundamentals safely. This technique helps provide a regular operation of SIC by allowing each user to gather the transmitted signals from other users. However, the original signals are challenging to determine from transmitted signals and can be obtained only by the corresponding authorized users.
In “O. Abbasi and A. Ebrahimi, “Secrecy analysis of a NOMA system with full duplex and half duplex relay,” pp. 1-6, 05 2017”, the authors studied the PLS of NOMA using HDR and FDR, where along with two authorized users in a NOMA network, one eavesdropper is also present. It is presumed that a dedicated FDR or HDR assists the Far user. In “L. Lv, F. Zhou, J. Chen, and N. Al-Dhahir, “Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach,” pp. 1-1 , 04 2019”, the issue of safe transmission in unauthorized relay networks has been investigated. In contrast to conventional orthogonal relaying,
a modern, non-orthogonal relaying technique is proposed to optimize the secrecy rate. Specifically, the source and relay nodes are permitted to simultaneously transmit signals over non-orthogonal channels (which induces co-channel interference), and SIC is usually applied to the destination node to decode the corresponding signal. The authors also proposed two antenna selection scheme for transmitting the signals to further enhance the secrecy.
The authors proposed a novel PLS technique in “X. Chen, Z. Zhang, C. Zhong, D. W. K. Ng, and R. Jia, “Exploiting inter-user interference for secure massive non-orthogonal multiple access,” 02 2018”, for the 5G networks with huge connections, where several active eavesdroppers are present. NOMA is combined with non-orthogonal channel estimation (NOCE) to enhance the quality of signal only for the authorized user to establish secure communication. Moreover, the inter-user interference is harnessed without exploiting artificial noise, which helps confuse the eavesdroppers. The authors further suggest the boosting of transmit power during multiple access stage and channel estimation stage to control the inter-user interference for enhancing the secrecy of communication.
Therefore, the conventional solutions adopted by industry to provide secure communication in NOMA and other wireless technologies are based on cryptography, but they are not suitable for NOMA communication due to many reasons related to the extreme difficulties that would be encountered in key sharing, management and maintenance processes, especially for the scenarios that consists of massive number of loT devices. This would result in creating signaling overhead, delay and complexity, which are contrasting many of the loT requirements represented by simplicity, low complexity and power efficiency. These difficulties can be summarized in the following points:
• The key distribution and management processes for the legitimate parties are extremely difficult tasks, especially in large-scale, dense, and heterogeneous wireless networks, where a massive number of smart devices are simultaneously connected to the network, causing excessive complexity, high signaling overhead, and costly computational processes. Also, the management and control frames exchanged between communication entities are usually not very well protected.
• Longer key length results in more waste of resources, apart from the fact that implementing security methods with Shannon’s perfect secrecy is extremely
hard to be practically carried out with today’s huge data volume. Particularly, for each message to be transmitted in perfect secrecy, it is required to use a secret key of length equal to that of the message itself and this key must be updated (i.e. , use a different key) with each new message.
• The fast developments and advances in computing power devices reveal the fact that current secret key-based techniques can be cracked, no matter how much mathematically complex they are, especially when quantum computing becomes a reality.
• Cryptography-based security methods add extra delay and complexity to the loT-based tactile communication applications such as autonomous driving, remote surgery operation, controlling unmanned aerial vehicles (UAVs), etc. These future applications require utmost secure communication with minimal latency.
• Given the extremely wide range of loT-based wireless applications including industrial, medical, commercial, governmental, and military related ones, designing practical security techniques is becoming an indispensable need for future xG systems.
BRIEF DESCRIPTION OF THE INVENTION
The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this invention, we present a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non- orthogonal multiple access (MISO-NOMA) systems. This system can provide enhanced confidential communication and inter-user interference cancellation without using the successive interference cancellation (SIC) method.
The conventional power domain PD-NOMA was previously adopted under the name of multi-user superposition transmission (MUST) in release 13 of 3GPP but recently excluded from 3GPP-release 17 due to its performance degradation from the SIC at the receiver, which raises the chance of eavesdropping. After analyzing the drawbacks in conventional NOMA, we have invented a new kind of NOMA with more improved performance metrics.
Our novel algorithm combines the benefit of pre-coder matrices with simultaneous transmission using antenna diversity to provide simple, reliable, and
secure communication without complex processing at the receivers in downlink scenarios. The effectiveness of the proposed algorithm is verified and proven by extensive analysis and numerical simulations.
LIST OF FIGURES
Figure 1. Basic block diagram of proposed new NOMA with signal precoding using spatial diversity-based system (i.e., simultaneous transmission from two antennas enabled by MISO)
Figure2. Bit Error rate (BER) versus SNR performance for the proposed algorithm
Figure 3. Throughput versus SNR performance for the proposed algorithm
Figure 4. Comparison of peak to average power ratio (PAPR) performances of the conventional OFDM and proposed algorithm
DETAILED DESCRIPTION OF THE INVENTION
The system design of the sections that build up our invention are explained separately below.
THE TRANSMITTER DESIGN
The transmitter in our proposed system comprises a two-user two-antenna multicarrier down-link authorized transmitter (Tx) that aims to communicate with two single antenna authorized users in the presence of a passive single antenna eavesdropper as can be seen in Fig. 1 .
Our MISO system employs spatial diversity enabled by transmitting the same composite signal (i.e., two user signals) simultaneously from two antennas. Furthermore, it is considered that the transmitter has no information regarding the channel of a passive eavesdropper.
CHANNEL MODEL
The channel between transmitter (Tx) and any random user -slowly varies multi-path Rayleigh fading with the exponentially decaying function that we presume is known at the transmitter. Also, channel reciprocity property is adopted, where channel sounding techniques have the potential to be implemented to estimate the channel from the transmitter (Tx) to the receiver using the channel from the receiver
to transmitter in time division duplexing (TDD) method. The communication system employs a simultaneous transmission of two user signals from two antennas. The authorized transmitter is responsible for the security of communication within the users so that the external eavesdropper cannot receive the user’s signal information, nor the users get each other’s data.
THE RECEIVER DESIGN
The receiver consists of user-1 , user-2, and external eavesdropper. Both the users decode their authorized precoded data, which helps in keeping the data entirely secret. While eavesdropper trying to intercept and access the data from user- 1 and user-2 receives the degraded version of signals.
The algorithm is designed to meet the need for secure, low latency, and low computational power at the receiver. In our invention, we superimpose the data sequence of two users along side pre-coder matrices and transmit them simultaneously from two antennas. However, it should ensure that this simultaneous transmission occurs in different channels and not on the same channel. It allows us to devise a set of intelligent pre-coder that can prevent external eavesdropping and internal eavesdropping. Besides, compared to a single-user channel-based security algorithm, the transmission of two users signals from two antennas create more difficulty for the eavesdropper. Therefore, the pre-coders used in the invention are a function of multiple authorized user channels. However, in the case of single-user channels, pre-coder is a function of single user channel only. The simultaneous transmission role facilitates authorized users' ability to decode the intended information while making it more difficult for unauthorized users to decipher the signal being transmitted.
Besides, in conventional NOMA, there is only one transmission used with successive interference cancellation (SIC) at the authorized receiver. But in our proposed technique, SIC is not required. We transmit the signal simultaneously from two antennas, which results in an automatic interference cancellation because of the specially designed precoding matrices.
In our invention, we ensure reliability and security through joint PHY and MAC mechanisms. In particular, NOMA inspired pre-coded superposition coding, together with cross-layer principles of simultaneous transmission with antenna diversity, is
implemented. It made communication more secure and reliable for downlink scenarios without requiring any additional computational processing at the receiver.
We consider two users, and each user consists of one antenna, i.e. , a total of two antennas at the transmitter, as shown in Fig. 1. The total number of carriers in one OFDM block for each user at the receiver is Nf. In this way, the frequency response for the OFDM symbol for user-1 and user-2 can be represented asxi = [xo xi XNn] 2 C[Nf1] and X2 = [xo xi XNA ] 2 C[Nf1].Note thatykm2c[Nf1],Hkm2c[NfNf]andzkm2c[Nf1 'present the received signal, the channel's frequency response, and AWGN that is experienced between kth user and mth antenna of transmitter.
Transmitted Signal from Antenna-1 and Antenna-2
The design of pre-coded matrices for our invention’s algorithm is explained in extensive detail in the preceding discussion. The following equation indicates the superimposed pre-coded transmitted signal from antenna-1.: U1 = Ml aXl + M2aX2 (1 )
Similarly, the data, along with the precoding matrices, are superimposed and transmitted from antenna-2. The equation can be given as:
U2= Ml bXl + M2bX2 (2) where data vectors for user-1 and user-2 are xiand X2in the frequency domain, the overall power is equal between the two users, whereas the pre-coder matrices are Mia, M2a, M and M2b. These pre-coders will ensure that users 1 and user 2 will receive reliable signals that are also secure against eavesdropping by internal and external hackers. We will briefly explain how the signal at user-1 , user-2, and eavesdropper is affected. Afterward, the pre-coding matrices will be explained in depth.
Signal Received at User-1
The signal received from the transmission via antenna-1 in the frequency domain at user-1 can be written as: Yu = H11 U1 + Z11 (3) where Hu and zn are the channel's frequency response and AWGN between user-1 and antenna-1 .
Similarly, the transmitted signal via antenna-2 to user-1 is:
Y12 = H12U2+ Z12 (4)
where, H^ and zi2 are the channels' frequency response and AWGN between user-1 and antenna-2.
The composite signal received at user-1 from simultaneous transmission through antenna-1 and antenna-2 can be given as: yi = yn + yi2 (5) where, yn and yi2 are the signal received at user-1 from simultaneous transmission through antenna-1 and antenna-2. The combined signal can be shown as follows after placing the values of ynand yi2. yi = H11 U1 + zn + H12U2 + Z12 (6)
We substitute the ui and U2values from (1 ) and (2) and simplify them, yi = Hn (MlaXl + M2aX2) + Z11 + Hl2(Ml bXl + M2bX2) + Z12 (7) yi = (Hu Mla + Hl2Mlb)Xl + (Hn M2a+ Hl2M2b)X2 + Z11 + Z12 (8)
In (8), the first term is the desired term for user-1 and the second term is unwanted term for it. Pre-coder matrices ensure that both the unwanted term and the channel effects are removed from user-1 and canceled.
Signal Received at User-2
Similar to user-1 , the expression for the composite signal received at user-2 from the simultaneous transmission via antenna-1 and antenna-2 can be given as: y2= y2i + y22 (9)
The signal received from the transmission via antenna-1 in the frequency domain at user-2 can be given as: y2i = H21 U1 + Z21 (10) where H21 and Z21 are the channels' frequency response and AWGN between user-2 and antenna-1 .
Similarly, the signal that is received at user-2 from transmission using antenna-2 is given as: y22 = H22U2 + Z22 (11 ) where H22 and Z22 are the channels' frequency response and AWGN between user-2 and antenna-2.
After substituting y2i and y22, the composite signal is given as: y2 = H21 U1 + Z21 + H22U2 + Z22 (12)
Substituting the values of ui and U2from (1 ) and (2) and simplifying, we get: y2 = H2l (MlaXl + M2aX2) + Z21 + H22(Ml bXl + M2bX2) + Z22 (13)
y2 = (H2lMla + H22Mlb)Xl + (H2l M2a + H22M2b)X2 + Z21 + Z22 (14)
In (14), the first term is the desired term for user-2 and the second term is unwanted. Pre-coder matrices ensure that both the unwanted term and the channel effects are removed from user-1 and canceled.
Signal Received at Eavesdropper
The composite signal received by eavesdropper due to simultaneous transmission through antenna-1 and antenna-2 can be given as: ys = ysi + y32 (15)
The received signal in the frequency domain at the eavesdropper from transmission through antenna-1 can be given as: ysi = H31U1 + Z31 (16) where H31 and Z31 are the channels' frequency response and AWGN between eavesdropper and antenna-1.
Similarly, the signal that is received at eavesdropper from transmission using antenna-2 is given as: y32 = H32U2 + Z32 (17) where Hs-iand zsiare the channels' frequency response and AWGN between eavesdropper and antenna-2.
Substituting the values ysi and y32, the composite signal can be presented as: ys = H31 U1 + Z31 + H32U2 + Z32 (18)
Substituting the values of uiand U2 from (1 ) and (2) and simplifying, we get: y3 = H3l (MlaXl + M2aX2) + Z31 + H32(Ml bXl + M2bX2) + Z32 (19) y3 = (Hsi Mla + H32Mlb)Xl + (H3l M2a+ H32M2b)X2 + Z31 + Z32 (20)
The eavesdropper would like to receive user-1 and user-2 information. Therefore, both the first and second terms in (20) are the desired terms for it.
Design of Pre-coders
Now, we design the Mia, M , M2a and M2b pre-coder matrices that will be superimposed with the modulated signal to provide secure information to the authorized users, ensuring safe communication from the internal and external eavesdroppers the composite received signal from simultaneous transmission via the antenna 1 and antenna 2. The pre-coder design is inspired by several interesting works in the literature.
The design procedure of Mia and M is discussed below:
We take measures to isolate the impact of the channel at user-1 , therefore we consider equation 8 and equate its first term with identity matrix as can be seen in equation 21 , HuMia + Hi2Mib=l (21 )
As both users cause interference. Now, we will remove this interference by equating the first term of (14) with zero. The new equation formed is given below:
H2lMla + H22Mlb=0 (22)
In order to find the values of pre-coders Mia and M , we will solve equations (21 ) and (22) simultaneously,
Mla= H22(H22H12 + H22H12)-1 (23)
Mlb= - H22(H22Hl2 + H22H12)'1 (24)
To design M2a and M2b, we will first recall the earlier steps used in designingM-ia and M . To remove the channel's effect at user-2, the second term in equation (14) can be set equal to identity matrix and can be written as: H2iM2a + H22M2b= I (25)
For canceling the interference caused by user 2 on user 1 . We consider equation 8 and equate its second term to 0.
HnM2a + Hi2M2b=0 (26)
In order to find the values of pre-coders M2a and M2b we will solve (21 ) and (22) simultaneously,
M2a= H12(H12H21 + H11 H22)-1 (27)
M2b = - H11 (H12H21 + H11 H22)-1 (28)
In the simultaneous transmission, the pre-coder matrices Mia, M , M2a and M2b are superimposed with the data to provide reliable and secure transmission against internal and external eavesdroppers. The pre-coder matrices are provided in equations (23), (24), (27) and (28).
Mathematical signal-to-interference-plus-noise ratio (SINR) analysis for the proposed algorithm
For the case of an eavesdropper, it is observed from the equation (20) that the eavesdropper is interested in eavesdropping the data of both user-1 and user-2. The signal to interference noise ratio (SINR) at eavesdropper for eavesdropping the information intended for user-1 is given as:
where, o2 31 and 0232 are the variances of noise power corresponding toHsizsiand H32Z32, respectively. Similarly, the SINR at eavesdropper for eavesdropping the information intended for user-2 is given as:
It is clear from equations 29 and 30 that there is a severe performance degradation at eavesdropper when it tries to eavesdrop the information intended for either user because of interference terms (inter-user interference) in the denominators of these equations. Moreover, the terms Hu, H12, H2iand H22 are unknown to the eavesdropper, making eavesdropping more challenging.
Below a step-by-step explanation of our invention's algorithm is given in the consideration of a multi-user OFDM communication system with two users:
Firstly, the data sequence of two users is passed through a modulator and then converted from serial to parallel, so it becomes a column vector.
The pre-coder matrices are devised where four different channel-dependent intelligent pre-coder matrices are superimposed with these data vectors.
The mixture of the data vector and pre-coder matrices is transmitted simultaneously from two antennas to the receiver of both user 1 and user 2, easily decrypted at the authorized users.
The simultaneous transmission of data from two antennas with superimposed pre-coder matrices helps in automatic interference cancellation. It eliminates the need for successive interference cancellation (SIC), which minimizes the computational complexity at the authorized receiver and increases the complexity for the eavesdropper.
Many existing communication security problems can be solved with this invented NOMA scheme such as, the problem of external and internal eavesdropping, complexity problems, and high-power consumption issues, also it provides improved PAPR performance.
Advantages of Our New Invented NOMA Scheme:
• The proposed scheme can provide security against external Eve because the pre-coders are dependent on the channels of the legitimate nodes.
• The proposed scheme can also provide security against internal Eve by ensuring that there will be no leakage of information among users.
• Due to the diagonal channel matrices, the inverse operation is simple. Hence, pre-coder matrices can be designed by simple computation.
• In our proposed scheme, there is no need of successive interference cancellation (SIC) at the receiver because we transmit the signal simultaneously from two antennas at one time and there is an automatic interference cancellation due to the specially designed pre-coding matrices. Hence, it can support applications with processing limited receiver (loT-based application).
• Mixture of channel-based pre-coded signals of two users that are transmitted simultaneously from two antennas is more challenging to eavesdrop compared to channel adaptive secure transmission based on a single user.
SIMULATION RESULTS FOR OUR INVENTION’S ALGORITHM
We have evaluated the performance for superimposed pre-coder matrices with simultaneous transmission using antenna diversity for two users’ signals. The simulation of bit error rate (BER), throughput, and PAPR used as performance metrics proves the effectiveness of our proposed technique.
• Bit Error Rate (BER) Analysis: Figure 2 compares the bit error rate (BER) versus signal to noise ratio (SNR) plots for the invention. It is evident from figure 2 that the user-1 (Bob1 ) and user-2 (Bob2) performances are similar. However, there is a considerable difference between authorized users' BER performances and those of eavesdroppers. The labels E-Eve-1 and E-Eve-2 represents external eavesdropper, and similarly, l-Eve-1 and l-Eve-2 represents the internal eavesdropper attempting to eavesdrop the signal. The degraded performance shown by both the eavesdroppers proves the efficiency of our invention’s algorithm. The results of the BER analysis
demonstrate that the proposed scheme provides efficient performance for the communications.
• Throughput Analysis: Figure 3 represents the throughput plots for the basic of our invention, multiple input single output (MISO) system. Through experiments, we have observed that the number of transmitted packets in our system is equal to the number of time slots, enhancing the joint throughput of authorized users. As can be seen from Fig. 3, the individual throughput performances of user-1 (Bob-1 ) and user- 2 (Bob-2) employing our invention’s algorithm are similar to each other. The excellent throughput performance of the authorized user's signals and the deterioration of external and internal eavesdropper's signals proves our algorithm's robustness.
It is essential to consider that although eavesdroppers' throughput performance is not zero, it is still possible to provide quality of service (QoS) based security. QoSbased security refers to the protection provided considering the requirements of various communication networks such as (voice, video, etc.). Further, it is observed that different communication networks have different QoS requirements for effective communication. Therefore, to enhance a specific network's security, we degrade the performance of eavesdropper below the requirements of QoS for that network.
• Peak to Average Power Ratio (PAPR) Analysis: Figure 4 depicts a comparison of the peak to average power ratio (PAPR) performances of the conventional OFDM and OFDM with our invention’s algorithm for user-1 (Bob-1) and user-2 (Bob-2). It can be observed in Fig. 4 that the proposed method's PAPR performance outperforms the conventional method at high SNR values. The developed scheme gets improved PAPR because the precoder matrices, when designed at the transmitter, change the signal's distribution from being gaussian to something less random than gaussian and close to uniform. Therefore, it resolves one of the significant challenges faced by OFDM systems by reducing the PAPR, which results in improved spectral and energy efficiency.
Overall, as can be seen from the above-detailed analysis, the proposed invention can be a good solution for providing secure communication, especially for the low processing loT-based devices.
Claims
CLAIMS A communication system with multiple-input single-output non-orthogonal multiple access (MISO-NOMA) system that employs spatial diversity, characterized by comprising;
- two-user two-antenna multi-carrier down-link authorized transmitter (Tx) to communicate with two single antenna authorized users by sending data sequences in the presence of a passive single antenna eavesdropper, and wherein the data sequences of two users are superimposed along side different pre-coder matrices and transmitted simultaneously from two antennas (two different channels),
- a channel between transmitter (Tx) and any random user that slowly varies multi-path Rayleigh fading with the exponentially decaying function, and wherein channel reciprocity property is adopted, where channel sounding techniques have the potential to be implemented to estimate the channel from the transmitter (Tx) to the receiver using the channel from the receiver to transmitter in time division duplexing (TDD) method. The communication device of claim 1 characterized by wherein the pre-coders are four different channel-dependent and a function of multiple authorized user channels. A method of a communication system with multiple-input single-output non- orthogonal multiple access (MISO-NOMA) system characterized by comprising the steps below;
- the data sequence of two users is passed through a modulator and then converted from serial to parallel, to become a column vector,
- the pre-coder matrices are devised where four different channeldependent intelligent pre-coder matrices are superimposed with these data vectors,
- the mixture of the data vector and pre-coder matrices is transmitted simultaneously from two antennas to the receiver of both user 1 and
user 2, which are easy to decrypt at the authorized users due to automatic interference cancellation which require very low computational processing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/TR2021/050485 WO2022031245A1 (en) | 2021-05-25 | 2021-05-25 | A communication system with multiple-input single-output non-orthogonal multiple access (miso-noma) system and its communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/TR2021/050485 WO2022031245A1 (en) | 2021-05-25 | 2021-05-25 | A communication system with multiple-input single-output non-orthogonal multiple access (miso-noma) system and its communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022031245A1 true WO2022031245A1 (en) | 2022-02-10 |
Family
ID=80118371
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/TR2021/050485 WO2022031245A1 (en) | 2021-05-25 | 2021-05-25 | A communication system with multiple-input single-output non-orthogonal multiple access (miso-noma) system and its communication method |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2022031245A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114650090A (en) * | 2022-03-24 | 2022-06-21 | 中国人民解放军战略支援部队航天工程大学 | Decoding power distribution strategy based on non-orthogonal multiple access in cognitive satellite-ground network |
CN114828031A (en) * | 2022-04-07 | 2022-07-29 | 上海应用技术大学 | Symbiotic NOMA system based safety performance design method |
CN118018077A (en) * | 2024-01-31 | 2024-05-10 | 北京交通大学 | Precoding method for downlink, communication system and related equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020261243A1 (en) * | 2019-06-28 | 2020-12-30 | Universidade De Aveiro | Method, transmitter device and receiver device for securing channel training on a power domain non- orthogonal multiple access system |
-
2021
- 2021-05-25 WO PCT/TR2021/050485 patent/WO2022031245A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020261243A1 (en) * | 2019-06-28 | 2020-12-30 | Universidade De Aveiro | Method, transmitter device and receiver device for securing channel training on a power domain non- orthogonal multiple access system |
Non-Patent Citations (5)
Title |
---|
HAMAMREH JEHAD M., ABEWA MOHAMEDOU, LEMAYIAN JOEL PONCHA: "New Non-Orthogonal Transmission Schemes for Achieving Highly Efficient, Reliable, and Secure Multi-User Communications", ISSUE 2, vol. 1, no. 2, 1 January 2020 (2020-01-01), XP055907234, DOI: 10.46470/03d8ffbd.324cc0fb * |
HAMAMREH JEHAD M: "ADVANCED CROSS-LAYER SECURE COMMUNICATION DESIGNS FOR FUTURE WIRELESS SYSTEMS", DISSERT., 1 July 2018 (2018-07-01), XP055907203, [retrieved on 20220330] * |
LEMAYIAN JOEL PONCHA, HAMAMREH JEHAD M.: "A Novel Small-Scale Nonorthogonal Communication Technique Using Auxiliary Signal Superposition with Enhanced Security for Future Wireless Networks", RS OPEN JOURNAL ON INNOVATIVE COMMUNICATION TECHNOLOGIES, 3 December 2020 (2020-12-03), XP055907236, DOI: 10.46470/03d8ffbd.86b0d106 * |
ZIA MUHAMMAD FURQAN, FURQAN HAJI M., HAMAMREH JEHAD M.: "Multi-cell, Multi-user, and Multi-carrier Secure Communication Using Non-Orthogonal Signals’ Superposition with Dual-Transmission for IoT in 6G and Beyond", ISSUE 3, vol. 4, 28 March 2021 (2021-03-28), XP055907230, DOI: 10.46470/03d8ffbd.08b7bd1d * |
ZIA MUHAMMAD FURQAN, HAMAMREH JEHAD M: "An Advanced NOMA Security Technique for Future Wireless Communication Networks", RS OPEN JOURNAL ON INNOVATIVE COMMUNICATION TECHNOLOGIES, 19 September 2020 (2020-09-19), XP055907220, Retrieved from the Internet <URL:https://jour.researcherstore.com/wp-content/uploads/2020/10/An-Advanced-NOMA-Security-Technique-Furqan-Zia-1.pdf> [retrieved on 20220330], DOI: 10.1109/RS.2017.DOI * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114650090A (en) * | 2022-03-24 | 2022-06-21 | 中国人民解放军战略支援部队航天工程大学 | Decoding power distribution strategy based on non-orthogonal multiple access in cognitive satellite-ground network |
CN114828031A (en) * | 2022-04-07 | 2022-07-29 | 上海应用技术大学 | Symbiotic NOMA system based safety performance design method |
CN118018077A (en) * | 2024-01-31 | 2024-05-10 | 北京交通大学 | Precoding method for downlink, communication system and related equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hamamreh et al. | Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey | |
Fu et al. | Robust secure beamforming design for two-user downlink MISO rate-splitting systems | |
Yan et al. | Secret channel training to enhance physical layer security with a full-duplex receiver | |
Choi et al. | Space–time line code for enhancing physical layer security of multiuser MIMO uplink transmission | |
WO2022031245A1 (en) | A communication system with multiple-input single-output non-orthogonal multiple access (miso-noma) system and its communication method | |
Tung et al. | Vulnerability and protection of channel state information in multiuser MIMO networks | |
CN106100710B (en) | A kind of unconditional safety of physical layer cooperation transmission method based on interference alignment techniques | |
TR201723427A2 (en) | Automatic Re-Request System for Absolute Security and Authentication in Wireless Networks | |
Melki et al. | Physical layer security schemes for MIMO systems: an overview | |
Koike-Akino et al. | Capacity, MSE and secrecy analysis of linear block precoding for distributed antenna systems in multi-user frequency-selective fading channels | |
Choi et al. | Artificial-noise-aided space–time line code for enhancing physical layer security of multiuser MIMO downlink transmission | |
Melki et al. | Physical layer security for NOMA: Limitations, issues, and recommendations | |
Singh et al. | NOMA and massive MIMO assisted physical layer security using artificial noise precoding | |
Kalantari et al. | Secure M-PSK communication via directional modulation | |
Masuda et al. | An uplink non-orthogonal multiple access scheme having physical layer security based on chaos modulation | |
Golstein et al. | Physical layer security in an OFDM time reversal SISO communication with imperfect channel state information | |
Li et al. | A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of interception | |
Mei et al. | Physical layer service integration in 5G: Potentials and challenges | |
Harper et al. | MIMO wireless secure communication using data-carrying artificial noise | |
Yan et al. | Channel training design in full-duplex wiretap channels to enhance physical layer security | |
Liu et al. | Artificial noise-assisted beamforming and power allocation for secure D2D-enabled V2V communications | |
CN102223628A (en) | Frequency domain encryption method and device for random subcarrier weight | |
Zhang et al. | Adaptive preamble embedding with MIMO to support user-defined functionalities in WLANs | |
WO2023107067A1 (en) | Channel-decomposition based adaptive physical layer security | |
Yang et al. | Securing channel state information in multiuser MIMO with limited feedback |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21852874 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023/006068 Country of ref document: TR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21852874 Country of ref document: EP Kind code of ref document: A1 |