137 research outputs found

    Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays

    Full text link
    A downlink single-input single-output non-orthogonal multiple access system is considered in which a base station (BS) is communicating with two legitimate users in the presence of an external eavesdropper. A group of trusted cooperative half-duplex relay nodes, powered by the BS, is employed to assist the BS's transmission. The goal is to design relaying schemes such that the legitimate users' secrecy rate region is maximized subject to a total power constraint on the BS and the relays' transmissions. Three relaying schemes are investigated: cooperative jamming, decode-and-forward, and amplify-and-forward. Depending on the scheme, secure beamforming signals are carefully designed for the relay nodes that either diminish the eavesdropper's rate without affecting that of the legitimate users, or increase the legitimate users' rates without increasing that of the eavesdropper. The results show that there is no relaying scheme that fits all conditions; the best relaying scheme depends on the system parameters, namely, the relays' and eavesdropper's distances from the BS, and the number of relays. They also show that the relatively simple cooperative jamming scheme outperforms other schemes when the relays are far from the BS and/or close to the eavesdropper.Comment: To appear in IEEE Globecom 201

    Beamforming Techniques for Non-Orthogonal Multiple Access in 5G Cellular Networks

    Full text link
    In this paper, we develop various beamforming techniques for downlink transmission for multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) systems. First, a beamforming approach with perfect channel state information (CSI) is investigated to provide the required quality of service (QoS) for all users. Taylor series approximation and semidefinite relaxation (SDR) techniques are employed to reformulate the original non-convex power minimization problem to a tractable one. Further, a fairness-based beamforming approach is proposed through a max-min formulation to maintain fairness between users. Next, we consider a robust scheme by incorporating channel uncertainties, where the transmit power is minimized while satisfying the outage probability requirement at each user. Through exploiting the SDR approach, the original non-convex problem is reformulated in a linear matrix inequality (LMI) form to obtain the optimal solution. Numerical results demonstrate that the robust scheme can achieve better performance compared to the non-robust scheme in terms of the rate satisfaction ratio. Further, simulation results confirm that NOMA consumes a little over half transmit power needed by OMA for the same data rate requirements. Hence, NOMA has the potential to significantly improve the system performance in terms of transmit power consumption in future 5G networks and beyond.Comment: accepted to publish in IEEE Transactions on Vehicular Technolog

    Secure transmission via joint precoding optimization for downlink MISO NOMA

    Get PDF
    Non-orthogonal multiple access (NOMA) is a prospective technology for radio resource constrained future mobile networks. However, NOMA users far from base station (BS) tend to be more susceptible to eavesdropping because they are allocated more transmit power. In this paper, we aim to jointly optimize the precoding vectors at BS to ensure the legitimate security in a downlink multiple-input single-output (MISO) NOMA network. When the eavesdropping channel state information (CSI) is available at BS, we can maximize the sum secrecy rate by joint precoding optimization. Owing to its non-convexity, the problem is converted into a convex one, which is solved by a second-order cone programming based iterative algorithm. When the CSI of the eavesdropping channel is not available, we first consider the case that the secure user is not the farthest from BS, and the transmit power of the farther users is maximized via joint precoding optimization to guarantee its security. Then, we consider the case when the farthest user from BS requires secure transmission, and the modified successive interference cancellation order and joint precoding optimization can be adopted to ensure its security. Similar method can be exploited to solve the two non-convex problems when the CSI is unknown. Simulation results demonstrate that the proposed schemes can improve the security performance for MISO NOMA systems effectively, with and without eavesdropping CSI

    Best sum-throughput evaluation of cooperative downlink transmission nonorthogonal multiple access system

    Get PDF
    In cooperative simultaneous wireless information and power transfer (SWIPT) nonorthogonal multiple access (NOMA) downlink situations, the current research investigates the total throughput of users in center and edge of cell. We focus on creating ways to solve these problems because the fair transmission rate of users located in cell edge and outage performance are significant hurdles at NOMA schemes. To enhance the functionality of cell-edge users, we examine a two-user NOMA scheme whereby the cell-center user functions as a SWIPT relay using power splitting (PS) with a multiple-input single-output. We calculated the probability of an outage for both center and edge cell users, using closed-form approximation formulas and evaluate the system efficacy. The usability of cell edge users is maximized by downlink transmission NOMA (CDT-NOMA) employing a SWIPT relay that employs PS. The suggested approach calculates the ideal value of the PS coefficient to optimize the sum throughput. Compared to the noncooperative and single-input single-output NOMA systems, the best SWIPT-NOMA system provides the cell-edge user with a significant throughput gain. Applying SWIPT-based relaying transmission has no impact on the framework’s overall throughput
    • …
    corecore