基于NOMA的人工噪声物理层安全性能研究Security Performance Analysis of Artificial Noise Physical-Layer Based on NOMA
韩帅,董增寿,李美玲
摘要(Abstract):
添加人工噪声也是提升物理层安全性能的重要方式之一,能够有效抑制窃听行为,对于提升物理层的安全可靠性也有帮助。将非正交多址接入技术(NOMA)融入传统的人工噪声辅助方案中,在提升物理层安全性能的同时也可以节约频谱资源,考虑非信任中继节点的情况下,提出基于NOMA技术的人工噪声辅助方案,推导该方案的中断概率和遍历和速率,并给出了遍历和速率上界的表达式。仿真结果表明,NOMA方案相比传统的正交多址接入技术(OMA)中断概率更低,同时也提升了系统的遍历和速率,证明NOMA方案可以有效提升物理层的安全可靠性,也可以防止非信任中继节点对信息进行窃取。
关键词(KeyWords): 人工噪声;NOMA;非信任中继;中断概率;遍历和速率
基金项目(Foundation): 山西省重点学科建设经费资助
作者(Author): 韩帅,董增寿,李美玲
参考文献(References):
- [1]张丹婷.设备到设备通信的通信机制及资源管理研究[D].北京:北京邮电大学,2014.
- [2] LV L,CHEN J,NI Q. Cooperative Non-Orthogonal Multiple Access in Cognitive Radio[J]. IEEE Communications Letters,2016,20(10):1-4.
- [3] HIGUCHI K,BENJEBBOUR A. Non-orthogonal Multiple Access(NOMA)with Successive Interference Cancellation for Future Radio Access[J]. IEICE Transactions on Communications,2015,E98. B(3):403-414.
- [4] HUO Y,TIAN Y,MA L,et al. Jamming Strategies for Physical Layer Security[J]. IEEE Wireless Communications,2018,25(1):148-153.
- [5] KRIKIDIS I,THOMPSON J S,MCLAUGHLIN S. Relay selection for secure cooperative networks with jamming.[J]. IEEE Transactions on Wireless Communications,2013,2(4):5003-5011.
- [6] WANG L,ELKASHLAN M,HUANG J,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks[J]. IEEE Wireless Communications Letters,2014,3(3):289-292.
- [7] DING X,SONG T,ZOU Y,et al. Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection[J]. IEEE Transactions on Vehicular Technology,2016,66(99):1-1.
- [8] WANG H M,LUO M,YIN Q,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks[J]. IEEE Transactions on Information Forensics and Security,2013,8(12):2007-2020.
- [9] Improving physical layer security for wireless ad hoc networks via full-duplex receiver jamming[C]//IEEE International Workshop on Signal Processing Advances in Wireless Communications. Nan Jing:2017.
- [10] DING X,SONG T,ZOU Y,et al. Improving secrecy for multi-relay multi-eavesdropper wireless systems through relay selection[J]. Transactions on Emerging Telecommunications Technologies,2016,27(7):982-991.