高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于MF协议的协作NOMA系统物理层安全性能研究

张延良 田月华 李兴旺 黄高见

张延良, 田月华, 李兴旺, 黄高见. 基于MF协议的协作NOMA系统物理层安全性能研究[J]. 电子与信息学报, 2023, 45(4): 1211-1218. doi: 10.11999/JEIT220246
引用本文: 张延良, 田月华, 李兴旺, 黄高见. 基于MF协议的协作NOMA系统物理层安全性能研究[J]. 电子与信息学报, 2023, 45(4): 1211-1218. doi: 10.11999/JEIT220246
ZHANG Yanliang, TIAN Yuehua, LI Xingwang, HUANG Gaojian. Research on Physical Layer Security of Cooperative NOMA System Based on MF Protocol[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1211-1218. doi: 10.11999/JEIT220246
Citation: ZHANG Yanliang, TIAN Yuehua, LI Xingwang, HUANG Gaojian. Research on Physical Layer Security of Cooperative NOMA System Based on MF Protocol[J]. Journal of Electronics & Information Technology, 2023, 45(4): 1211-1218. doi: 10.11999/JEIT220246

基于MF协议的协作NOMA系统物理层安全性能研究

doi: 10.11999/JEIT220246
基金项目: 河南省科技攻关项目(212102210504, 212102210557),国家自然科学基金青年基金(62001320)
详细信息
    作者简介:

    张延良:男,教授,研究方向为新一代无线通信技术、智能信息处理

    田月华:女,硕士生,研究方向为新一代无线通信技术

    李兴旺:男,副教授,研究方向为新一代宽带移动通信系统的新理论及技术

    黄高见:男,讲师,研究方向为雷达通信一体化技术、无线通信物理层安全技术、新兴通信调制技术和阵列信号处理等

    通讯作者:

    李兴旺 lixingwang@hpu.edu.cn

  • 中图分类号: TN925

Research on Physical Layer Security of Cooperative NOMA System Based on MF Protocol

Funds: The Science and Technology Project of Henan Province (212102210504, 212102210557), The Youth Fundation of the National Natural Science Foundation of China (62001320)
  • 摘要: 针对协作非正交多址(NOMA)系统中信息安全传输问题,该文提出一种基于修改转发(MF)中继的物理层安全(PLS)传输方案。该方案利用MF中继将解码信息修改后再转发,避免了合法信息泄露到窃听节点。首先对NOMA-MF系统进行建模,然后推导了系统安全中断概率(SOP)、严格正保密容量(SPSC)和窃听概率(IP)来衡量系统的保密性和安全性,以及中断概率(OP)以衡量其可靠性。此外,推导了系统的渐近性能,对比分析了解码转发(DF)协议下NOMA-DF系统与NOMA-MF系统的性能。推导及仿真结果表明:NOMA-MF系统的保密性能和安全性能比NOMA-DF系统更具有优势;NOMA-MF系统的OP和IP之间存在最优信噪比(SNR)以实现系统安全及可靠性的平衡;存在最佳功率分配参数以实现最低的SOP和OP。
  • 图  1  基于MF/DF中继协议的协作NOMA系统模型

    图  2  NOMA/OMA方案MF/DF协议的系统SOP对比

    图  3  NOMA/OMA方案MF/DF协议的系统SPSC对比

    图  4  NOMA系统MF/DF的OP/IP与信噪比的关系

    图  5  不同发射SNR下的OP/SOP与功率分配参数$ {a_1} $的关系

  • [1] DAI Linglong, WANG Bichai, YUAN Yifei, et al. Non-orthogonal Multiple Access for 5G: Solutions, challenges, opportunities, and future research trends[J]. IEEE Communications Magazine, 2015, 53(9): 74–81. doi: 10.1109/MCOM.2015.7263349
    [2] DING Zhiguo, LIU Yuanwei, CHOI J, et al. Application of non-orthogonal multiple access in LTE and 5G networks[J]. IEEE Communications Magazine, 2017, 55(2): 185–191. doi: 10.1109/MCOM.2017.1500657CM
    [3] LV Lu, YE Qiang, DING Zhiguo, et al. Multi-antenna two-way relay based cooperative NOMA[J]. IEEE Transactions on Wireless Communications, 2020, 19(10): 6486–6503. doi: 10.1109/TWC.2020.3003615
    [4] DING Zhiguo, ADACHI F, and POOR H V. The application of MIMO to non-orthogonal multiple access[J]. IEEE Transactions on Wireless Communications, 2016, 15(1): 537–552. doi: 10.1109/TWC.2015.2475746
    [5] XU Yongjun, HU R Q, and LI Guoquan. Robust energy-efficient maximization for cognitive NOMA networks under channel uncertainties[J]. IEEE Internet of Things Journal, 2020, 7(9): 8318–8330. doi: 10.1109/JIOT.2020.2989464
    [6] 徐勇军, 刘子腱, 李国权, 等. 基于NOMA的无线携能D2D通信鲁棒能效优化算法[J]. 电子与信息学报, 2021, 43(5): 1289–1297. doi: 10.11999/JEIT200175

    XU Yongjun, LIU Zijian, LI Guoquan, et al. Robust energy efficiency optimization algorithm for NOMA-based D2D communication with simultaneous wireless information and power transfer[J]. Journal of Electronics &Information Technology, 2021, 43(5): 1289–1297. doi: 10.11999/JEIT200175
    [7] KHAN R, KUMAR P, JAYAKODY D N K, et al. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions[J]. IEEE Communications Surveys & Tutorials, 2020, 22(1): 196–248. doi: 10.1109/COMST.2019.2933899
    [8] YANG Nan, WANG Lifeng, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015, 53(4): 20–27. doi: 10.1109/MCOM.2015.7081071
    [9] WYNER A D. The wire-tap channel[J]. The Bell System Technical Journal, 1975, 54(8): 1355–1387. doi: 10.1002/j.1538-7305.1975.tb02040.x
    [10] LIU Yuanwei, QIN Zhijin, ELKASHLAN M, et al. Enhancing the physical layer security of Non-orthogonal Multiple Access in large-scale networks[J]. IEEE Transactions on Wireless Communications, 2017, 16(3): 1656–1672. doi: 10.1109/TWC.2017.2650987
    [11] LI Xingwang, LI Jingjing, LIU Yuanwei, et al. Residual transceiver hardware impairments on cooperative NOMA networks[J]. IEEE Transactions on Wireless Communications, 2020, 19(1): 680–695. doi: 10.1109/TWC.2019.2947670
    [12] LI Xingwang, ZHENG Yike, ALSHEHRI M D, et al. Cognitive AmBC-NOMA IoV-MTS networks with IQI: Reliability and security analysis[J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(2): 2596–2607. doi: 10.1109/TITS.2021.3113995
    [13] TAO Xiaofeng, XU Xiaodong, and CUI Qimei. An overview of cooperative communications[J]. IEEE Communications Magazine, 2012, 50(6): 65–71. doi: 10.1109/MCOM.2012.6211487
    [14] CHEN Jianchao, YANG Liang, and ALOUINI M S. Physical layer security for cooperative NOMA systems[J]. IEEE Transactions on Vehicular Technology, 2018, 67(5): 4645–4649. doi: 10.1109/TVT.2017.2789223
    [15] ZAGHDOUD N, MNAOUER A B, BOUJEMAA H, et al. Secrecy performance analysis of cooperative NOMA system with multiple DF relays[C]. 2020 International Wireless Communications and Mobile Computing, Limassol, Cyprus, 2020: 2160–2163.
    [16] CHEN Xiaoming, NG D W K, GERSTACKER W H, et al. A survey on Multiple-Antenna techniques for physical layer security[J]. IEEE Communications Surveys & Tutorials, 2017, 19(2): 1027–1053. doi: 10.1109/COMST.2016.2633387
    [17] KIM S W. Modify-and-Forward for securing cooperative relay communications[C]. 23th International Zurich Seminar on Communications, Zurich, Switzerland, 2014: 136–139.
    [18] VIEN Q T, LE T A, NGUYEN H X, et al. A secure network coding based Modify-and-Forward scheme for cooperative wireless relay networks[C]. 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 2016: 1–5.
    [19] VIEN Q T, LE T A, and DUONG T Q. Opportunistic secure transmission for wireless relay networks with Modify-and-Forward protocol[C]. 2017 IEEE International Conference on Communications, Paris, France, 2017: 1–6.
    [20] CHU S I. Secrecy analysis of Modify-and-Forward relaying with relay selection[J]. IEEE Transactions on Vehicular Technology, 2019, 68(2): 1796–1809. doi: 10.1109/TVT.2018.2885807
    [21] PENG Hongxing, QI Hongyan, LI Xingwang, et al. Hardware impaired Modify-and-Forward relaying with relay selection: Reliability and security[J]. Physical Communication, 2021, 46: 101315. doi: 10.1016/j.phycom.2021.101315
    [22] QIN Zhijin, LIU Yuanwei, DING Zhiguo, et al. Physical layer security for 5G Non-orthogonal Multiple Access in large-scale networks[C]. 2016 IEEE International Conference on Communications, Kuala Lumpur, Malaysia, 2016: 1–6.
    [23] SHARMA P K and KIM D I. UAV-enabled downlink wireless system with non-orthogonal multiple access[C]. 2017 IEEE Globecom Workshops, Singapore, 2017: 1–6.
  • 加载中
图(5)
计量
  • 文章访问数:  1202
  • HTML全文浏览量:  460
  • PDF下载量:  86
  • 被引次数: 0
出版历程
  • 收稿日期:  2022-03-09
  • 修回日期:  2022-04-29
  • 网络出版日期:  2022-06-28
  • 刊出日期:  2023-04-10

目录

    /

    返回文章
    返回