TY - JOUR
T1 - Joint beamforming and jamming optimization for secure transmission in MISO-NOMA Networks
AU - Zhao, Nan
AU - Wang, Wei
AU - Wang, Jingjing
AU - Chen, Yunfei
AU - Lin, Yun
AU - Ding, Zhiguo
AU - Beaulieu, Norman C.
N1 - Funding Information:
Manuscript received June 18, 2018; revised September 22, 2018; accepted November 14, 2018. Date of publication November 23, 2018; date of current version March 15, 2019. The work of N. Zhao was supported by the National Natural Science Foundation of China (NSFC) under Grant 61871065, the open research fund of State Key Laboratory of Integrated Services Networks under Grant ISN19-02, the Fundamental Research Funds for the Central Universities under DUT17JC43, and the Xinghai Scholars Program. The work of Z. Ding was supported by the UK EPSRC under grant number EP/L025272/2 and by H2020-MSCA-RISE-2015 under grant number 690750. The work of Y. Lin was supported by the National Natural Science Foundation of China (NSFC) under Grant 61771154. This work of N. C. Beaulieu was supported by the China SAFEA Thousand Talents Program. The associate editor coordinating the review of this paper and approving it for publication was I. H. Kim. (Corresponding author: Yun Lin.) N. Zhao and W. Wang are with the School of Information and Communication Engineering, Dalian University of Technology, Dalian 116024, China, and also with the State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China (e-mail: [email protected]; [email protected]).
Funding Information:
The work of N. Zhao was supported by the National Natural Science Foundation of China (NSFC) under Grant 61871065, the open research fund of State Key Laboratory of Integrated Services Networks under Grant ISN19-02, the Fundamental Research Funds for the Central Universities under DUT17JC43, and the Xinghai Scholars Program. The work of Z. Ding was supported by the UK EPSRC under grant number EP/L025272/2 and by H2020-MSCA-RISE-2015 under grant number 690750. The work of Y. Lin was supported by the National Natural Science Foundation of China (NSFC) under Grant 61771154. This work of N. C. Beaulieu was supported by the China SAFEA Thousand Talents Program.
Publisher Copyright:
© 1972-2012 IEEE.
PY - 2019/3
Y1 - 2019/3
N2 - Non-orthogonal multiple access (NOMA) has been developed as a key multi-access technique for 5G. However, secure transmission remains a challenge in NOMA. Especially, the user with weakest channel is most threatened by eavesdropping, due to its highest transmit power. Two schemes are proposed to generate artificial jamming at the NOMA base station (BS), aiming at disrupting the potential eavesdropping without affecting the legitimate transmission. In the first scheme, the transmit power of artificial jamming is maximized, with its received power at each receiver higher than that of other users. Thus, the jamming signal can be eliminated via successive interference cancellation before others. When the transmit power of the BS is inadequate, the transmit jamming power is maximized with the jamming signal zero-forced at each receiver. Thus, the legitimate transmission is not affected by the jamming, and the eavesdropping can be disrupted effectively. Due to the non-convexity of these two optimization problems, we first convert them to convex ones and, then, provide an iterative algorithm to solve them. Simulation results are presented to show the effectiveness of the proposed schemes in guaranteeing the security of NOMA networks.
AB - Non-orthogonal multiple access (NOMA) has been developed as a key multi-access technique for 5G. However, secure transmission remains a challenge in NOMA. Especially, the user with weakest channel is most threatened by eavesdropping, due to its highest transmit power. Two schemes are proposed to generate artificial jamming at the NOMA base station (BS), aiming at disrupting the potential eavesdropping without affecting the legitimate transmission. In the first scheme, the transmit power of artificial jamming is maximized, with its received power at each receiver higher than that of other users. Thus, the jamming signal can be eliminated via successive interference cancellation before others. When the transmit power of the BS is inadequate, the transmit jamming power is maximized with the jamming signal zero-forced at each receiver. Thus, the legitimate transmission is not affected by the jamming, and the eavesdropping can be disrupted effectively. Due to the non-convexity of these two optimization problems, we first convert them to convex ones and, then, provide an iterative algorithm to solve them. Simulation results are presented to show the effectiveness of the proposed schemes in guaranteeing the security of NOMA networks.
KW - Artificial jamming
KW - beamforming optimization
KW - non-orthogonal multiple access
KW - physical layer security
KW - zero-forcing
UR - http://www.scopus.com/inward/record.url?scp=85057370540&partnerID=8YFLogxK
U2 - 10.1109/TCOMM.2018.2883079
DO - 10.1109/TCOMM.2018.2883079
M3 - Article
AN - SCOPUS:85057370540
SN - 0090-6778
VL - 67
SP - 2294
EP - 2305
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 3
M1 - 8543655
ER -