浏览全部资源
扫码关注微信
1. 郑州大学河南先进技术研究院,河南 郑州 450003
2. 郑州大学产业技术研究院,河南 郑州 450001
3. 郑州大学信息工程学院,河南 郑州 450001
[ "孙钢灿(1977- ),男,河南濮阳人,博士,郑州大学教授,主要研究方向为通信信号处理、通信信号关键参数盲估计、调制方式识别、机器人和智慧物流等。" ]
[ "赵少柯(1996- ),男,河南周口人,郑州大学硕士生,主要研究方向为短包通信、物理层安全等。" ]
[ "郝万明(1988- ),男,河南安阳人,博士,郑州大学讲师,主要研究方向为毫米波、NOMA 无线通信、边缘缓存和无线携能通信等。" ]
[ "朱政宇(1988- ),男,河南周口人,博士,郑州大学讲师,主要研究方向为携能传输、大规模MIMO等。" ]
网络出版日期:2021-02,
纸质出版日期:2021-02-25
移动端阅览
孙钢灿, 赵少柯, 郝万明, 等. 基于短包通信的NOMA下行链路安全传输[J]. 通信学报, 2021,42(2):168-176.
Gangcan SUN, Shaoke ZHAO, Wanming HAO, et al. Secure transmission for NOMA downlink based on short packet communication[J]. Journal on communications, 2021, 42(2): 168-176.
孙钢灿, 赵少柯, 郝万明, 等. 基于短包通信的NOMA下行链路安全传输[J]. 通信学报, 2021,42(2):168-176. DOI: 10.11959/j.issn.1000-436x.2021041.
Gangcan SUN, Shaoke ZHAO, Wanming HAO, et al. Secure transmission for NOMA downlink based on short packet communication[J]. Journal on communications, 2021, 42(2): 168-176. DOI: 10.11959/j.issn.1000-436x.2021041.
面向物联网业务中的低时延需求,将短包通信(SPC)和非正交多址接入(NOMA)技术相结合,针对存在窃听者的情况研究多用户 NOMA 系统中的安全传输问题。以最大化弱用户的安全吞吐量为目标,考虑用户译码错误概率约束、总功率约束和功率分配约束,提出了一种低复杂度的功率分配方案实现系统安全传输。为解决复杂的目标函数和不可靠的串行干扰消除(SIC)技术带来的问题,首先证明约束条件在取得最优解时的紧约束性,在最大译码错误概率约束下,对功率约束进行转化和计算,得到强用户发射功率范围,推导出基站向强用户的发射功率搜索集;然后利用一维搜索算法对功率进行分配,实现弱用户吞吐量最大化。仿真结果证明,所提方案可有效提高系统中弱用户的安全吞吐量。
For the low-latency requirements of Internet of things (IoT) business
short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective
considering the user decoding error probability constraint
total power constraint and power allocation constraint
a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology
the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability
the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users
and the transmit power search set from base station to strong user was derived.Then
the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.
WANG D , CHEN D , SONG B , et al . From IoT to 5G I-IoT:the next generation IoT-based intelligent algorithms and 5G technologies [J ] . IEEE Communications Magazine , 2018 , 56 ( 10 ): 114 - 120 .
张平 , 陶运铮 , 张治 . 5G 若干关键技术评述 [J ] . 通信学报 , 2016 , 37 ( 7 ): 15 - 29 .
ZHANG P , TAO Y Z , ZHANG Z . Survey of several key technologies for 5G [J ] . Journal on Communications , 2016 , 37 ( 7 ): 15 - 29 .
CHEN J , ZHANG L , LIANG Y C , et al . Resource allocation for wireless-powered IoT networks with short packet communication [J ] . IEEE Transactions on Wireless Communications , 2019 , 18 ( 2 ): 1447 - 1461 .
钱志鸿 , 王雪 . 面向5G通信网的D2D技术综述 [J ] . 通信学报 , 2016 , 37 ( 7 ): 1 - 14 .
QIAN Z H , WANG X . Reviews of D2D technology for 5G communication networks [J ] . Journal on Communications , 2016 , 37 ( 7 ): 1 - 14 .
HAN S J , XU X D , LIU Z L , et al . Energy-efficient short packet communications for uplink NOMA-based massive MTC networks [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 12 ): 12066 - 12078 .
BOCKELMANN C , PRATAS N , NIKOPOUR H , et al . Massive machine-type communications in 5G:physical and MAC-layer solutions [J ] . IEEE Communications Magazine , 2016 , 54 ( 9 ): 59 - 65 .
BOCCARDI F , JR R W H , LOZANO A , et al . Five disruptive technology directions for 5G [J ] . IEEE Communications Magazine , 2014 , 52 ( 2 ): 74 - 80 .
SUN C J , SHE C Y , YANG C Y , et al . Optimizing resource allocation in the short blocklength regime for ultra-reliable and low-latency communications [J ] . IEEE Transactions on Wireless Communications , 2018 , 18 ( 1 ): 402 - 415 .
KHAN T A , HEATH R W , POPOVSKI P . Wirelessly powered communication networks with short packets [J ] . IEEE Transactions on Communications , 2017 , 65 ( 12 ): 5529 - 5543 .
SHIRVANIMOGHADDAM M , MOHAMMADI M S , ABBAS R , et al . Short block-length codes for ultra-reliable low-latency communications [J ] . IEEE Communications Magazine , 2019 , 57 ( 2 ): 130 - 137 .
张平 , 牛凯 , 田辉 , 等 . 6G 移动通信技术展望 [J ] . 通信学报 , 2019 , 40 ( 1 ): 141 - 148 .
ZHANG P , NIU K , TIAN H , et al . Technology prospect of 6G mobile communications [J ] . Journal on Communications , 2019 , 40 ( 1 ): 141 - 148 .
DING Z G , LIU Y W , CHOI J , et al . Application of non-orthogonal multiple access in LTE and 5G networks [J ] . IEEE Communications Magazine , 2017 , 55 ( 2 ): 185 - 191 .
曹雍 , 杨震 , 冯友宏 . 新的 NOMA 功率分配策略 [J ] . 通信学报 , 2017 , 38 ( 10 ): 157 - 165 .
CAO Y , YANG Z , FENG Y H . New NOMA power allocation strategy [J ] . Journal on Communications , 2017 , 38 ( 10 ): 157 - 165 .
HAO W M , ZENG M , CHU Z , et al . Energy-efficient power allocation in millimeter wave massive MIMO with non-orthogonal multiple access [J ] . IEEE Wireless Communications Letters , 2017 , 6 ( 6 ): 782 - 785 .
龚明言 , 杨震 . 针对 MIMO-NOMA 系统中配对弱用户的空时编码方案 [J ] . 通信学报 , 2018 , 39 ( 6 ): 181 - 189 .
GONG M Y , YANG Z . Space-time coding scheme for the paired weak user in MIMO-NOMA systems [J ] . Journal on Communications , 2018 , 39 ( 6 ): 181 - 189 .
HAO W M , ZENG M , SUN G C , et al . Codebook-based max-min energy-efficient resource allocation for uplink mmWave MIMO-NOMA systems [J ] . IEEE Internet of Things Journal , 2018 , 5 ( 2 ): 1299 - 1306 .
彭安妮 , 周威 , 贾岩 , 等 . 物联网操作系统安全研究综述 [J ] . 通信学报 , 2018 , 39 ( 3 ): 22 - 34 .
PENG A N , ZHOU W , JIA Y , et al . Survey of the Internet of things operating system security [J ] . Journal on Communications , 2018 , 39 ( 3 ): 22 - 34 .
王潮 , 胡广跃 , 张焕国 . 无线传感器网络的轻量级安全体系研究 [J ] . 通信学报 , 2012 , 33 ( 2 ): 30 - 35 .
WANG C , HU G Y , ZHANG H G . Lightweight security architecture design for wireless sensor network [J ] . Journal on Communications , 2012 , 33 ( 2 ): 30 - 35 .
ZENG M , NGUYEN N P , DOBRE O A , et al . Securing downlink massive MIMO-NOMA networks with artificial noise [J ] . IEEE Journal of Selected Topics in Signal Processing , 2019 , 13 ( 3 ): 685 - 699 .
赵飞 , 郝万明 , 孙钢灿 , 等 . 基于 SWIPT 的毫米波大规模MIMO-NOMA系统下安全能效资源优化 [J ] . 通信学报 , 2020 , 41 ( 8 ): 79 - 86 .
ZHAO F , HAO W M , SUN G C , et al . Resource optimization of secure energy efficiency based on mmWave massive MIMO-NOMA system with SWIPT [J ] . Journal on Communications , 2020 , 41 ( 8 ): 79 - 86 .
LEE B , PARK S , LOVE D J , et al . Packet structure and receiver design for low latency wireless communications with ultra-short packets [J ] . IEEE Transactions on Communications , 2018 , 66 ( 2 ): 796 - 807 .
XU Y Q , SHEN C Y , CHANG T H , et al . Energy-efficient non-orthogonal transmission under reliability and finite blocklength constraints [C ] // 2017 IEEE Globecom Workshops . Piscataway:IEEE Press , 2017 : 1 - 6 .
YANG W , DURISI G , KOCH T , et al . Quasi-static SIMO fading channels at finite blocklength [C ] // IEEE International Symposium on Information Theory . Piscataway:IEEE Press , 2013 : 1531 - 1535 .
POLYANSKIY Y , POOR H V , VERDU S . Channel coding rate in the finite blocklength regime [J ] . IEEE Transmissions on Information Theory , 2010 , 56 ( 5 ): 2307 - 2359 .
SUN X F , YAN S H , YANG N , et al . Short-packet downlink transmission with non-orthogonal multiple access [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 7 ): 4550 - 4564 .
HAGHIFAM M , MILI M R , MAKKI B , et al . Joint sum rate and error probability optimization:finite blocklength analysis [J ] . IEEE Wireless Communications Letters , 2017 , 6 ( 6 ): 726 - 729 .
XIAO C Y , ZENG J , NI W , et al . Downlink MIMO-NOMA for ultra-reliable low-latency communications [J ] . IEEE Journal on Selected areas in Communications , 2019 , 37 ( 4 ): 780 - 794 .
WANG H M , YANG Q , DING Z G , et al . Secure short-packet communications for mission-critical IoT applications [J ] . IEEE Transactions on Wireless Communications , 2019 , 18 ( 5 ): 2565 - 2578 .
YANG W , SCHAEFER R F , POOR H V . Finite-blocklength bounds for wiretap channels [C ] // 2016 IEEE International Symposium on Information Theory . Piscataway:IEEE Press , 2016 : 3087 - 3091 .
REN H , PAN C H , DENG Y S , et al . Joint power and blocklength optimization for URLLC in a factory automation scenario [J ] . IEEE Transactions on Wireless Communications , 2020 , 19 ( 3 ): 1786 - 1801 .
HALEEMA S , MUHAMMAD Z , SHAHZAD A S . Performance analysis of downlink power domain NOMA under fading channels [C ] // 2018 ELEKTRO . Piscataway:IEEE Press , 2018 : 1 - 6 .
张立健 , 金梁 , 刘璐 , 等 . 多天线中继系统中人工噪声辅助的安全波束成形 [J ] . 通信学报 , 2014 , 35 ( 11 ): 81 - 88 .
ZHANG L J , JIN L , LIU L , et al . Artificial noise aided secure beamforming for multi-antenna relay systems [J ] . Journal on Communications , 2014 , 35 ( 11 ): 81 - 88 .
FENG Y H , YAN S H , YANG Z . Secure transmission to the strong user in non-orthogonal multiple access [J ] . IEEE Communications Letters , 2018 , 22 ( 12 ): 2623 - 2626 .
0
浏览量
659
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构