Secure Beamforming in Downlink MIMO Nonorthogonal Multiple Access Networks

In this letter, we consider a cellular downlink multiple-input-multiple-output nonorthogonal multiple access (NOMA) secure transmission network, which consists of a base station, a central user, and a cell-edge user. The base station and two users are all equipped with multiple antennas. The central user is an entrusted user and the cell-edge user is a potential eavesdropper. We focus on secure beamforming optimization problem, which maximizes achievable secrecy rate of the central user subject to transmit power constraint at the base station and transmission rate requirement at the cell-edge user. The optimization problem is nonconvex. We employ majorization-minimization method to iteratively optimize a sequence of valid surrogate functions for the nonconvex optimization problem. Furthermore, in each iteration, we derive the semi-closed form solution to optimize the valid surrogate functions. Simulation results demonstrate that our proposed NOMA scheme outperforms the zero-forcing-based NOMA scheme and conventional orthogonal multiple access scheme.

[1]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.

[2]  Zhiguo Ding,et al.  Nonorthogonal Multiple Access for 5G , 2018, 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management.

[3]  H. Vincent Poor,et al.  Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.

[4]  J. Malick,et al.  Projection methods in conic optimization , 2011, 1103.1511.

[5]  H. Vincent Poor,et al.  A General MIMO Framework for NOMA Downlink and Uplink Transmission Based on Signal Alignment , 2015, IEEE Transactions on Wireless Communications.

[6]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[7]  Andrea J. Goldsmith,et al.  Joint Optimization of Power and Data Transfer in Multiuser MIMO Systems , 2016, IEEE Transactions on Signal Processing.

[8]  Qi Zhang,et al.  Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.

[9]  Qi Zhang,et al.  Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks , 2016, IEEE Transactions on Vehicular Technology.

[10]  Michael J. Todd,et al.  The Ellipsoid Method: A Survey , 1980 .

[11]  Michael J. Todd,et al.  Feature Article - The Ellipsoid Method: A Survey , 1981, Oper. Res..

[12]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[13]  Quanzhong Li,et al.  Robust AN-Aided Secure Precoding for an AF MIMO Untrusted Relay System , 2017, IEEE Transactions on Vehicular Technology.

[14]  Tamás Terlaky,et al.  Interior Point Methods for Nonlinear Optimization , 2010 .

[15]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[16]  Gert R. G. Lanckriet,et al.  On the Convergence of the Concave-Convex Procedure , 2009, NIPS.