研究生: |
葛熙兒 Karishetty, Shilpa |
---|---|
論文名稱: |
下行NOMA通信系統中配對用戶的物理層安全性研究 On Physical Layer Security of Paired Users for Down-link NOMA Communication Systems |
指導教授: |
吳仁銘
Wu, Jen-Ming |
口試委員: |
伍紹勳
Wu, Sau-Hsuan 翁詠祿 Ueng, Yeong-Luh |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 通訊工程研究所 Communications Engineering |
論文出版年: | 2018 |
畢業學年度: | 107 |
語文別: | 英文 |
論文頁數: | 30 |
中文關鍵詞: | 連續干擾消除 |
外文關鍵詞: | WEIGHTED SUM RATE MAXIMIZATION |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在本文中,我們研究了使用蜂窩網絡(Cellar Network)的用戶所遇到的特殊問題,像是遠端用戶的資料在近端用戶執行連續干擾消除(SIC)時會有的危險。由於這個問題沒有完善的在文獻中被討論,我們研究一個NOMA系統模型用來顯現用戶之間的主要洩漏問題並指出功率分配係數的差異會影響網路中其中一個用戶的保密優化程度。本研究還特別關注公平指數的概念,以確保此系統模型的體驗對其用戶具有相同獲最佳的公平性。這是通過使用加權概念來找出最佳的功率分配係數給用戶的。此外我們還研討了針對下行鏈路NOMA通信系統物理層安全性所潛在的研究挑戰。
In this thesis, we study one of the special case issues encountered by a user pair in the cellular network i.e potential that the far user information is at risk when the near user performs successive interference cancellation(SIC).As this problem scenario is not well studied in the literature,we discuss a NOMA system model in order to emphasis on the major leakage issue between the user pair and indicate the difference in power allocation coefficient that leads to secrecy optimization for one of the users in the network.The study also focuses on fairness index concept in order to ensure that the system model experiences equal or optimal fairness for its users.This is done by finding out the optimal power allocation coefficient for the users using the concept of the weighted sum.Furthermore, we discuss the key features of Physical layer security for downlink NOMA communication system with their potential research challenges.
1] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. K. Bhargava., “A
survey on non-orthogonal multiple access for 5g networks: Research challenges and
future trends,” IEEE Journal on Selected Areas in Communications, vol. 35, pp. 2181
– 2195, 11 July 2017.
[2] Q. Li, H. Niu, A. Papathanassiou, and G. Wu., “5g network capacity: Key elements
and technologies,” IEEE Veh. Technol. Mag., vol. 9, no. 1, pp. 71–78, March 2014.
[3] T. Cover and J. Thomas., “Elements of information theory,” IEEE Transactions on
Vehicular Technology, New York, NY, USA:Wiley, 1991.
[4] Y. Liu, Z. Qin, M. Elkashlan, Y. F. Gao, and L. H. Hanzo, “Enhancing the physical layer
security of non-orthogonal multiple access in large-scale networks,” IEEE Transactions
on Wireless Communications, vol. 16, pp. 1656–1672, January 2017.
[5] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal
multiple access in 5g systems with randomly deployed users,” IEEE Transactions on
Wireless Communications, vol. 21, pp. 1501–1505, December 2014.
[6] W. Trappe, “The challenges facing physical layer security,” IEEE Communications Magazine,
vol. 53, pp. 16–20, June 2015.
27
[7] Z. Qin, Y. Liu, Z. Ding, Y. Gao, and M. Elkashlan., “Physical layer security for 5g nonorthogonal
multiple access in large-scale networks,” 2016 IEEE International Conference
on Communications (ICC), 14 2016.
[8] Z. Chen, Z. Ding, X. Dai, and G. K. Karagiannidis, “On the application of quasidegradation
to miso-noma downlink,” IEEE Transactions on Signal Processing, vol. 64,
29 August 2016.
[9] Z. Ding, F. Adachi, and H. V. Poor., “The application of mimo to non-orthogonal
multiple access,” IEEE Trans. Wireless Communication, vol. 15, January 2015.
[10] S. Timotheou and I. Krikidis., “Fairness for non-orthogonal multiple access in 5g systems.,”
IEEE Signal Processing Letters, pp. 1647 – 1651, Oct. 2015.
[11] Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley., “On the application of cooperative
transmission to secrecy communications,” IEEE J. Sel. Areas Commun., vol. 30, no. 2,
p. 359–368, Feb 2012.
[12] W. Yang, S. Wang, and X. X. ., “Cooperative transmission for security enhancement
in clustered wireless sensor networks,” International Journal of Distributed Sensor Networks,
vol. 11, 1 July 2015.
[13] Z. Ding, P. Fan, and H. V. Poor., “Impact of user pairing on 5g nonorthogonal multiple
access,” IEEE Transactions on Vehicular Technology, vol. 65, no. 2, pp. 6010 – 6023,
Aug. 2016.
[14] J. A. Oviedo and H. R. Sadjadpour, “A new noma approach for fair power allocation,”
2016 IEEE Conference on Computer Communications Workshops (INFOCOM
WKSHPS), 08 September 2016.
[15] M. Codreanu, P. C. Weeraddana, M. Latva-aho, and A. Ephremides, “Weighted sumrate
maximization in singlecast and multicast wireless networks - global optimum via
branch and bound,” 2011 IEEE 22nd International Symposium on Personal, Indoor
and Mobile Radio Communications, pp. 2166–9589, 26 January 2012.
[16] A. B. Sediq, R. H. Gohary, and R. Schoenen., “Optimal tradeoff between sum-rate efficiency
and jain’s fairness index in resource allocation,” IEEE Communications Society
IEEE Signal Processing Society, pp. 3496 – 3509, 26 June 2013.
[17] G. B. Satrya and S. Y. Shin, “Security enhancement to successive interference cancellation
algorithm for non-orthogonal multiple access (noma),” 2017 IEEE 28th Annual
International Symposium on Personal, Indoor, and Mobile Radio Communications
(PIMRC), 15 February 2018.
[18] S. Goel and R. Negi., “Guaranteeing secrecy using artificial noise,” IEEE Transactions
on Wireless Communication, vol. 7, no. 6, pp. 6010 – 6023, June 2008.
[19] A. Carleial, “Interference channels,” IEEE Trans. Inf. Theory, vol. 24, no. 1, pp. 60–70,
Jan 1978.
[20] J. G. Andrews., “Interference cancellation for cellular systems: a contemporary overview,”
IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 19–29, April 2005.
[21] A. B. Sediq, R. H. Gohary, and H. Yanikomeroglu, “Optimal tradeoff between efficiency
and jain’s fairness index in resource allocation,” 2012 IEEE 23rd International Symposium
on Personal, Indoor and Mobile Radio Communications - (PIMRC), no. 2166-9589,
29 November 2012.
[22] C.-H. wang, J.-Y. Lin, and J.-M. Wu, “Joint fairness and sum rate resource allocation
for noma communications,” IEEE Conference on Standards for Communications and
Networking(CSCN), pp. 1–6, October 2017.