Sum Rate Maximization of Secure NOMA Transmission with Imperfect CSI

In multiple access systems, physical layer security is degraded since more attacking targets are available for the eavesdropper. Fortunately, it has been recently demonstrated that non-orthogonal multiple access (NOMA) could improve secure transmission performance. However, it is still unknown how to design a transmission scheme for maximizing the sum rate when the channel state information is imperfectly known at the transmitter. To fill this gap, we formulate a maximization problem of sum rate while incorporating versatile metrics such as outage probability, quality of service, and transmit power. By leveraging the first-order and log-concavity properties of the Marcum Q-function, the maximum sum rate of the secure NOMA transmission scheme is efficiently obtained. Simulation results validate the strength of this newly established scheme when compared with conventional orthogonal multiple access scheme.

[1]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[2]  Mandy Eberhart,et al.  Digital Communication Over Fading Channels , 2016 .

[3]  F. Richard Yu,et al.  Secure Transmission via Beamforming Optimization for NOMA Networks , 2020, IEEE Wireless Communications.

[4]  Mohamed-Slim Alouini,et al.  Secure Broadcasting With Imperfect Channel State Information at the Transmitter , 2016, IEEE Transactions on Wireless Communications.

[5]  Hui-Ming Wang,et al.  An Adaptive Transmission Scheme for Slow Fading Wiretap Channel with Channel Estimation Errors , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[6]  Derrick Wing Kwan Ng,et al.  Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems , 2017, IEEE Transactions on Communications.

[7]  G. Wachsmuth Differentiability of implicit functions: Beyond the implicit function theorem , 2014 .

[8]  Pingzhi Fan,et al.  On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users , 2014, IEEE Signal Processing Letters.

[9]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[10]  Prabhu Babu,et al.  Majorization-Minimization Algorithms in Signal Processing, Communications, and Machine Learning , 2017, IEEE Transactions on Signal Processing.

[11]  Zhu Han,et al.  Secrecy sum rate maximization in NOMA systems with wireless information and power transfer , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[12]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[13]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[14]  Shuai Wang,et al.  Machine Intelligence at the Edge With Learning Centric Power Allocation , 2019, IEEE Transactions on Wireless Communications.

[15]  Yik-Chung Wu,et al.  Probabilistic Constrained Secure Transmissions: Variable-Rate Design and Performance Analysis , 2020, IEEE Transactions on Wireless Communications.

[16]  Theodore S. Rappaport,et al.  Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .

[17]  Norman C. Beaulieu,et al.  Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks , 2019, IEEE Transactions on Communications.

[18]  D. Hunter,et al.  A Tutorial on MM Algorithms , 2004 .

[19]  H. Vincent Poor,et al.  Multiple Access Techniques for 5G Wireless Networks and Beyond , 2018 .

[20]  Dan Raphaeli,et al.  Series expansions for the distribution of noncentral indefinite quadratic forms in complex normal variables , 1995 .

[21]  Shidong Zhou,et al.  On the Monotonicity, Log-Concavity, and Tight Bounds of the Generalized Marcum and Nuttall $Q$-Functions , 2010, IEEE Transactions on Information Theory.

[22]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[23]  Chenxi Liu,et al.  Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access , 2019, IEEE Transactions on Information Forensics and Security.

[24]  W. K. Pratt,et al.  Partial differentials of Marcum's Q function , 1968 .