簡易檢索 / 詳目顯示

研究生: 葛熙兒
Karishetty, Shilpa
論文名稱: 下行NOMA通信系統中配對用戶的物理層安全性研究
On Physical Layer Security of Paired Users for Down-link NOMA Communication Systems
指導教授: 吳仁銘
Wu, Jen-Ming
口試委員: 伍紹勳
Wu, Sau-Hsuan
翁詠祿
Ueng, Yeong-Luh
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2018
畢業學年度: 107
語文別: 英文
論文頁數: 30
中文關鍵詞: 連續干擾消除
外文關鍵詞: WEIGHTED SUM RATE MAXIMIZATION
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在本文中,我們研究了使用蜂窩網絡(Cellar Network)的用戶所遇到的特殊問題,像是遠端用戶的資料在近端用戶執行連續干擾消除(SIC)時會有的危險。由於這個問題沒有完善的在文獻中被討論,我們研究一個NOMA系統模型用來顯現用戶之間的主要洩漏問題並指出功率分配係數的差異會影響網路中其中一個用戶的保密優化程度。本研究還特別關注公平指數的概念,以確保此系統模型的體驗對其用戶具有相同獲最佳的公平性。這是通過使用加權概念來找出最佳的功率分配係數給用戶的。此外我們還研討了針對下行鏈路NOMA通信系統物理層安全性所潛在的研究挑戰。


    In this thesis, we study one of the special case issues encountered by a user pair in the cellular network i.e potential that the far user information is at risk when the near user performs successive interference cancellation(SIC).As this problem scenario is not well studied in the literature,we discuss a NOMA system model in order to emphasis on the major leakage issue between the user pair and indicate the difference in power allocation coefficient that leads to secrecy optimization for one of the users in the network.The study also focuses on fairness index concept in order to ensure that the system model experiences equal or optimal fairness for its users.This is done by finding out the optimal power allocation coefficient for the users using the concept of the weighted sum.Furthermore, we discuss the key features of Physical layer security for downlink NOMA communication system with their potential research challenges.

    1 Introduction 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 User pairing in NOMA . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1.2 Fairness of MIMO-NOMA systems . . . . . . . . . . . . . . . . . . . 4 1.2 Survey of Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2 NOMA System 7 2.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 Finding Achievable Rate Regions in Wireless Networks . . . . . . . . . . . . 10 2.2.1 Jain’s Fairness Index and Optimal Efficiency-Jain Trade-off . . . . . 11 2.3 Achievable Rate of the Legitimate Users . . . . . . . . . . . . . . . . . . . . 12 3 Physical Layer Security of NOMA System 14 3.1 Weighted Sum Rate Optimization . . . . . . . . . . . . . . . . . . . . . . . . 14 3.2 Fairness of NOMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.3 Secrecy Rate of Paired users of NOMA . . . . . . . . . . . . . . . . . . . . . 15 4 Simulations 18 4.1 Fairness Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 4.2 Optimization of Sum Rate and Secrecy Rate in NOMA . . . . . . . . . . . . 22 5 Conclusions ................................................................................................................26

    1] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. K. Bhargava., “A
    survey on non-orthogonal multiple access for 5g networks: Research challenges and
    future trends,” IEEE Journal on Selected Areas in Communications, vol. 35, pp. 2181
    – 2195, 11 July 2017.
    [2] Q. Li, H. Niu, A. Papathanassiou, and G. Wu., “5g network capacity: Key elements
    and technologies,” IEEE Veh. Technol. Mag., vol. 9, no. 1, pp. 71–78, March 2014.
    [3] T. Cover and J. Thomas., “Elements of information theory,” IEEE Transactions on
    Vehicular Technology, New York, NY, USA:Wiley, 1991.
    [4] Y. Liu, Z. Qin, M. Elkashlan, Y. F. Gao, and L. H. Hanzo, “Enhancing the physical layer
    security of non-orthogonal multiple access in large-scale networks,” IEEE Transactions
    on Wireless Communications, vol. 16, pp. 1656–1672, January 2017.
    [5] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal
    multiple access in 5g systems with randomly deployed users,” IEEE Transactions on
    Wireless Communications, vol. 21, pp. 1501–1505, December 2014.
    [6] W. Trappe, “The challenges facing physical layer security,” IEEE Communications Magazine,
    vol. 53, pp. 16–20, June 2015.
    27
    [7] Z. Qin, Y. Liu, Z. Ding, Y. Gao, and M. Elkashlan., “Physical layer security for 5g nonorthogonal
    multiple access in large-scale networks,” 2016 IEEE International Conference
    on Communications (ICC), 14 2016.
    [8] Z. Chen, Z. Ding, X. Dai, and G. K. Karagiannidis, “On the application of quasidegradation
    to miso-noma downlink,” IEEE Transactions on Signal Processing, vol. 64,
    29 August 2016.
    [9] Z. Ding, F. Adachi, and H. V. Poor., “The application of mimo to non-orthogonal
    multiple access,” IEEE Trans. Wireless Communication, vol. 15, January 2015.
    [10] S. Timotheou and I. Krikidis., “Fairness for non-orthogonal multiple access in 5g systems.,”
    IEEE Signal Processing Letters, pp. 1647 – 1651, Oct. 2015.
    [11] Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley., “On the application of cooperative
    transmission to secrecy communications,” IEEE J. Sel. Areas Commun., vol. 30, no. 2,
    p. 359–368, Feb 2012.
    [12] W. Yang, S. Wang, and X. X. ., “Cooperative transmission for security enhancement
    in clustered wireless sensor networks,” International Journal of Distributed Sensor Networks,
    vol. 11, 1 July 2015.
    [13] Z. Ding, P. Fan, and H. V. Poor., “Impact of user pairing on 5g nonorthogonal multiple
    access,” IEEE Transactions on Vehicular Technology, vol. 65, no. 2, pp. 6010 – 6023,
    Aug. 2016.
    [14] J. A. Oviedo and H. R. Sadjadpour, “A new noma approach for fair power allocation,”
    2016 IEEE Conference on Computer Communications Workshops (INFOCOM
    WKSHPS), 08 September 2016.
    [15] M. Codreanu, P. C. Weeraddana, M. Latva-aho, and A. Ephremides, “Weighted sumrate
    maximization in singlecast and multicast wireless networks - global optimum via
    branch and bound,” 2011 IEEE 22nd International Symposium on Personal, Indoor
    and Mobile Radio Communications, pp. 2166–9589, 26 January 2012.
    [16] A. B. Sediq, R. H. Gohary, and R. Schoenen., “Optimal tradeoff between sum-rate efficiency
    and jain’s fairness index in resource allocation,” IEEE Communications Society
    IEEE Signal Processing Society, pp. 3496 – 3509, 26 June 2013.
    [17] G. B. Satrya and S. Y. Shin, “Security enhancement to successive interference cancellation
    algorithm for non-orthogonal multiple access (noma),” 2017 IEEE 28th Annual
    International Symposium on Personal, Indoor, and Mobile Radio Communications
    (PIMRC), 15 February 2018.
    [18] S. Goel and R. Negi., “Guaranteeing secrecy using artificial noise,” IEEE Transactions
    on Wireless Communication, vol. 7, no. 6, pp. 6010 – 6023, June 2008.
    [19] A. Carleial, “Interference channels,” IEEE Trans. Inf. Theory, vol. 24, no. 1, pp. 60–70,
    Jan 1978.
    [20] J. G. Andrews., “Interference cancellation for cellular systems: a contemporary overview,”
    IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 19–29, April 2005.
    [21] A. B. Sediq, R. H. Gohary, and H. Yanikomeroglu, “Optimal tradeoff between efficiency
    and jain’s fairness index in resource allocation,” 2012 IEEE 23rd International Symposium
    on Personal, Indoor and Mobile Radio Communications - (PIMRC), no. 2166-9589,
    29 November 2012.
    [22] C.-H. wang, J.-Y. Lin, and J.-M. Wu, “Joint fairness and sum rate resource allocation
    for noma communications,” IEEE Conference on Standards for Communications and
    Networking(CSCN), pp. 1–6, October 2017.

    QR CODE