Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Secure transmission via beamforming optimization for NOMA Networks

Tools
- Tools
+ Tools

Cao, Yang, Zhao, Nan, Chen, Yunfei, Jin, Minglu, Ding, Zhiguo, Li, Yonghui and Yu, F. Richard (2020) Secure transmission via beamforming optimization for NOMA Networks. IEEE Wireless Communications Magazine, 27 (1). pp. 193-199. doi:10.1109/MWC.001.1900159

[img]
Preview
PDF
WRAP-secure-transmission-via-beamforming-optimization-NOMA-Chen-2019.pdf - Accepted Version - Requires a PDF viewer.

Download (906Kb) | Preview
Official URL: https://doi.org/10.1109/MWC.001.1900159

Request Changes to record.

Abstract

Owing to the eminent performance gain, non-orthogonal multiple access (NOMA) has been regarded as a promising approach to achieve high throughput and low latency for the next-generation networks. Nevertheless, the potential adversaries can still pose a threat to the secure transmission in NOMA systems. Hence, in this article, secure transmission schemes based on beamforming optimization are designed to combat both internal and external eavesdropping for downlink multi-input single-output NOMA networks. Using the transmit beamforming design, we first propose two schemes to protect the privacy of a specific NOMA user in the presence of untrusted users. Then, the sum secrecy rate optimization problem is studied to combat the external eavesdropper through optimizing the precoding vectors, when the channel state information (CSI) is available. In addition, two secure beam forming strategies with the help of artificial noise and inter-user interference are proposed without eavesdropping CSI, respectively. Simulation results are presented to demonstrate the effectiveness of the proposed schemes, and some open issues are discussed as well.

Item Type: Journal Article
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Science > Engineering
Library of Congress Subject Headings (LCSH): Multiple access protocols (Computer network protocols)
Journal or Publication Title: IEEE Wireless Communications Magazine
Publisher: IEEE
ISSN: 1536-1284
Official Date: February 2020
Dates:
DateEvent
February 2020Published
21 August 2019Available
7 June 2019Accepted
Volume: 27
Number: 1
Page Range: pp. 193-199
DOI: 10.1109/MWC.001.1900159
Status: Peer Reviewed
Publication Status: Published
Access rights to Published version: Restricted or Subscription Access
RIOXX Funder/Project Grant:
Project/Grant IDRIOXX Funder NameFunder ID
ISN19-02State Key Laboratory of Integrated Services NetworksUNSPECIFIED
61871065[NSFC] National Natural Science Foundation of Chinahttp://dx.doi.org/10.13039/501100001809
Related URLs:
  • Publisher

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us