Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Physical layer security in non-orthogonal multiple access

Physical layer security in non-orthogonal multiple access

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Non-orthogonal multiple access (NOMA) has been widely considered as a promising technology to enable high-efficient wireless transmissions in future 5G communication systems. In this chapter, we investigate single-input single-output (SISO) NOMA systems from the perspective of physical layer security. There into, two different SISO NOMA systems are studied in sequence so as to explore security issues in NOMA. First, we attempt the physical layer security technique in a SISO NOMA system which consists of a transmitter, multiple legitimate users and an eavesdropper who aims to wiretap the messages intended for all legitimate users. The objective is to maximise sum of secrecy rates subject to an individual quality of service constraint for each legitimate user, respectively. The investigations in this system will provide a preliminary analysis of the secure performance of SISO NOMA systems. Second, on the basis of the SISO NOMA system previously studied, a multi-antenna jammer is additionally equipped to enhance secure transmissions of the system. The joint optimisation of power allocation and beamforming design is considered. The efforts in this second system aim to propose an effective solution for realising secure transmissions for each legitimate user.

Chapter Contents:

  • 15.1 Introduction
  • 15.2 Preliminary analysis of the secure performance of SISO NOMA systems
  • 15.2.1 System model
  • 15.2.1.1 Achievable rates of legitimate users
  • 15.2.1.2 Sum of secrecy rates of the SISO NOMA system
  • 15.2.2 Maximisation of the sum of secrecy rates
  • 15.2.2.1 Minimum transmit power that satisfies QoS requirements
  • 15.2.2.2 Optimal power allocation policy
  • 15.2.3 Simulation results
  • 15.3 Secure transmissions realised by a multi-antenna jammer
  • 15.3.1 System model
  • 15.3.1.1 Achievable rate of the mth legitimate user RmJb
  • 15.3.1.2 Discussions on the capability of the eavesdropper
  • 15.3.2 Secure transmissions based on secrecy rate guarantees
  • 15.3.2.1 Secrecy rate constraints
  • 15.3.2.2 Problem formulations and approximations
  • 15.3.2.3 Generation of initial feasible solution
  • 15.3.2.4 Convergence analysis
  • 15.3.3 Simulation results
  • 15.4 Conclusions and open issues
  • References

Inspec keywords: multi-access systems; quality of service; array signal processing; 5G mobile communication; optimisation; telecommunication security

Other keywords: single-input single-output NOMA systems; beamforming design; power allocation; SISO NOMA systems; secrecy rate sum maximization; nonorthogonal multiple-access; physical layer security technique; 5G communication systems; high-efficient wireless transmissions; quality of service constraint; multiple-legitimate users; multiantenna jammer; joint optimisation

Subjects: Optimisation techniques; Mobile radio systems; Signal processing and detection; Multiple access communication

Preview this chapter:
Zoom in
Zoomout

Physical layer security in non-orthogonal multiple access, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch15-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch15-2.gif

Related content

content/books/10.1049/pbte076e_ch15
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address