Physical layer security in non-orthogonal multiple access

Hui Ming Wang, Yi Zhang, Zhiguo Ding

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review


Non-orthogonal multiple access (NOMA) has been widely considered as a promising technology to enable high-efficient wireless transmissions in future 5G communication systems. In this chapter, we investigate single-input single-output (SISO) NOMA systems from the perspective of physical layer security. There into, two different SISO NOMA systems are studied in sequence so as to explore security issues in NOMA. First, we attempt the physical layer security technique in a SISO NOMA system which consists of a transmitter, multiple legitimate users and an eavesdropper who aims to wiretap the messages intended for all legitimate users. The objective is to maximise sum of secrecy rates subject to an individual quality of service constraint for each legitimate user, respectively. The investigations in this system will provide a preliminary analysis of the secure performance of SISO NOMA systems. Second, on the basis of the SISO NOMA system previously studied, a multi-antenna jammer is additionally equipped to enhance secure transmissions of the system. The joint optimisation of power allocation and beamforming design is considered. The efforts in this second system aim to propose an effective solution for realising secure transmissions for each legitimate user.

Original languageBritish English
Title of host publicationTrusted Communications with Physical Layer Security for 5G and Beyond
PublisherInstitution of Engineering and Technology
Number of pages25
ISBN (Electronic)9781785612350
StatePublished - 1 Jan 2017


  • 5G communication systems
  • 5G mobile communication
  • Array signal processing
  • Beamforming design
  • High-efficient wireless transmissions
  • Joint optimisation
  • Multi-access systems
  • Multiantenna jammer
  • Multiple-legitimate users
  • Nonorthogonal multiple-access
  • Optimisation
  • Physical layer security technique
  • Power allocation
  • Quality of service
  • Quality of service constraint
  • Secrecy rate sum maximization
  • Single-input single-output NOMA systems
  • SISO NOMA systems
  • Telecommunication security


Dive into the research topics of 'Physical layer security in non-orthogonal multiple access'. Together they form a unique fingerprint.

Cite this