[go: up one dir, main page]

CN114900902B - A secure transmission method for a semi-authorization-free system assisted by non-orthogonal multiple access - Google Patents

A secure transmission method for a semi-authorization-free system assisted by non-orthogonal multiple access Download PDF

Info

Publication number
CN114900902B
CN114900902B CN202210303322.8A CN202210303322A CN114900902B CN 114900902 B CN114900902 B CN 114900902B CN 202210303322 A CN202210303322 A CN 202210303322A CN 114900902 B CN114900902 B CN 114900902B
Authority
CN
China
Prior art keywords
user
unlicensed
users
rate
stage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210303322.8A
Other languages
Chinese (zh)
Other versions
CN114900902A (en
Inventor
雷宏江
杨方涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Zhengxin Information Security Testing Co ltd
Original Assignee
Shenzhen Wanzhida Technology Transfer Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wanzhida Technology Transfer Center Co ltd filed Critical Shenzhen Wanzhida Technology Transfer Center Co ltd
Priority to CN202210303322.8A priority Critical patent/CN114900902B/en
Publication of CN114900902A publication Critical patent/CN114900902A/en
Application granted granted Critical
Publication of CN114900902B publication Critical patent/CN114900902B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1263Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/121Wireless traffic scheduling for groups of terminals or users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a full transmission method of a non-orthogonal multiple access auxiliary semi-unlicensed system, wherein the transmission system comprises a source node, an authorized user, an eavesdropping user and a plurality of unlicensed users. The whole communication process is completed in five steps, namely 1) a base station transmits a training sequence, 2) each user estimates own channel state information, 3) an authorized user feeds own transmission signal-to-noise ratio, target rate and channel state information back to the base station, and 4) the base station calculates a decoding threshold of the authorized user and broadcasts the effective receiving signal-to-noise ratio and threshold value of the authorized user. 5) And calculating the transmission rate of the unlicensed user by using a sequencing theory, wherein the unlicensed user with the maximum reachable rate is scheduled to be accessed into a resource block of the licensed user, and sends a signal. The maximum reachable rate scheduling strategy can effectively reduce the number of unlicensed users accessing the resource blocks of the licensed users and improve the security performance of the system.

Description

Non-orthogonal multiple access auxiliary semi-unlicensed system safety transmission method
Technical Field
The invention belongs to the technical field of wireless communication networks, in particular to a semi-unlicensed wireless communication network assisted by a non-orthogonal multiple access technology, and belongs to the field of physical layer security.
Background
In the 5G era, the explosive growth of mobile data volume brought by the popularization of intelligent terminals has put higher demands on the speed, time delay, signal coverage rate and the like of wireless communication networks. To date, mobile communication technology has been iterated at high speeds in order to meet ever-increasing social demands. The first generation mobile communication technology is an analog communication technology utilizing analog frequency modulation and frequency division multiple access, mainly based on a cellular networking structure to overcome the problems of low large-area system capacity and limited movable range and realize voice function, in order to improve the channel capacity and anti-interference capability of communication and reduce the communication investment cost, the second generation mobile communication system utilizing time division multiple access technology and narrow-band digital communication technology mainly comprising voice and short message service is proposed, the third generation mobile communication system utilizing code division multiple access technology not only requires large system capacity but also can support the effective transmission of multiple services such as voice, data, image, multimedia and the like, and the fourth generation mobile communication technology is also called broadband intervention and distribution network, and represents mobile multimedia, global mobile solution and integrated wireless and customized service by utilizing orthogonal frequency division multiple access technology. At present, we are in the era of commercial use of the fifth generation mobile communication technology, namely the convenient era of interconnecting everything.
Non-orthogonal multiple access technology, a promising multiple access technology, is widely recognized as a technology for efficient utilization of spectrum resources in 5G wireless networks. The basic idea of the non-orthogonal multiple access technology is that the superposition coding technology is adopted at the transmitting end, the interference information is actively introduced, and the correct demodulation is realized at the receiving end through the serial interference deleting technology. The non-orthogonal multiple access is mainly divided into a power domain non-orthogonal multiple access, a code domain non-orthogonal multiple access and a space domain non-orthogonal multiple access technology. Non-orthogonal multiple access refers hereinafter to power domain non-orthogonal multiple access unless otherwise indicated. Power domain non-orthogonal multiple access refers to a communication technology that superimposes signals on the same time-frequency resource with different powers and performs interference cancellation at the receiving end.
As large-scale devices will access limited spectrum, two major scenarios in the internet of things, ultra-reliable low-latency communications (URLLC) and large-scale machine type communications (mMTC), have more stringent requirements on latency and signaling overhead, i.e., lower latency and signaling overhead.
The semi-unlicensed strategy is a combination of an unlicensed scheme for machine type users with small data packets and delay tolerant traffic and an unlicensed scheme for users with large data packets and delay sensitive traffic, and is an unlicensed user quantity strategy for controlling access to spectrum resources. In order to relieve the conflict of competing resources and obtain large-scale connectivity, the strategy can enable unlicensed users (delay tolerant devices) to share the spectrum resources of the licensed users, does not influence the licensed users to monopolize channels to communicate with the base station, and solves the problem that a large number of users exceed the non-orthogonal multiple access capacity and cannot successfully decode the information of the users.
Physical layer security technology, physical layer security does not need a secret key, and absolute security of information transmission can be realized theoretically by utilizing a time-varying encryption communication system of a wireless channel. As the computing power of the terminal increases gradually, the ability of the eavesdropper to crack the information increases gradually. Traditional cryptography is under increasing pressure in the field of information encryption. Physical layer security is based on information theory, and information security is realized in the physical layer, so that the method is a very promising encryption mode in the field of communication.
A general uplink non-orthogonal multiple access communication network model is shown in fig. 1. In the figure, S is a source node, and U 1 and U 2 are strong and weak users respectively. The method mainly comprises the steps of 1, decoding user information according to user Channel State Information (CSI), namely, decoding user information of a user U 1 (near user) with stronger CSI by a base station, deleting the signal through the serial interference cancellation technology, decoding user information of a user U 2 (far user) with weaker CSI, decoding the received signal and deleting the received signal and decoding the received signal by the base station, and 2, decoding the user information according to user service quality (QoS), namely, decoding the user information and decoding user information of a user U 2 according to user service quality (QoS), wherein U 1 is possibly delay sensitive equipment and has higher priority. This is primarily based on quality of service considerations for the user.
The semi-unlicensed communication technology not only can improve the spectrum efficiency, but also can reduce the signaling overhead, and simultaneously, the collision problem occurring when multiple users contend for the same resource block can be solved by combining the non-orthogonal multiple access technology, and the system performance can be obviously improved. The combination of semi-unlicensed communication with non-orthogonal multiple access techniques may further enhance the performance of non-orthogonal multiple access communication systems. As shown in fig. 2. In the figure, BS is a base station, U B and U k are respectively delay sensitive and delay tolerant users, and under the condition of guaranteeing the service quality of authorized users, whether the power gain of the unauthorized users is larger than a decoding threshold value tau (|g B|2) or not divides all the unauthorized users into two groups, namely, the user channel gain in the group 1 is larger than the threshold value, namely, the base station cannot directly and correctly decode the information of the authorized users, and only can decode the information of the unauthorized users in the first stage of serial interference elimination. The channel gains for all users in group 2 are less than the threshold. The information of the unauthorized users of the group can be decoded in the first stage of the serial interference cancellation as well as in the second stage. By comparing the reachable rates of the unlicensed users in the two phases, the maximum reachable rate can be obtained by decoding the GF user information in the second phase.
Physical layer security is a security theory based on information theory. The method utilizes the time-varying property of the wireless channel, and combines channel coding and encryption technology to ensure that the information is not deciphered by an eavesdropper. In classical literature (see literature [1]:Shannon C E.Communication theory of secrecy systems[J].The Bell System Technical Journal,1949,28(4):656-715.), from The aspect of information theory, it is proved that in order to realize absolute security of messages, a communication process must use a one-time-pad encryption method, that is, one-bit data should have one bit key, which is too severe to be applied in The engineering field, a.wyner builds a noise-containing eavesdropping channel model for The first time on The basis of Shannon research in 1975 (see literature [2]: wyner a d. The wire-TAP CHANNEL [ J ]. The Bell SYSTEM TECHNICAL Journal,1975,54 (8): 1355-1387)), as shown in fig. 3, the eavesdropping model is an improvement of Shannon model, in which, when The channel condition of a main channel is better than that of a listening channel, a coding mode must exist when information transmission is performed by a source and a receiving end, the probability of transmitting information errors is arbitrarily small, any useful information can be obtained by The first time, and The probability that The transmission of The channel is difficult to be expressed by The source and receiving end is a physical interrupt, the system is gradually measured by The fact that The practical threshold value is The practical, the practical threshold value is gradually reached by The ten years, the system is expressed by The fact that The practical threshold value is more than The practical threshold value, and The practical threshold value is gradually reached by The fact that The practical threshold value is reached by The practical layer of The transmission of The system:
Wherein, gamma D and gamma E represent the signal-to-noise ratio of the destination end and the eavesdropping end, R s denotes a safe rate threshold, and F D (x) denotes a cumulative distribution function of the primary channel signal-to-noise ratio. f (γ E) represents the probability density function of γ E.
The uplink communication system constructed based on the combination of non-orthogonal multiple access, semi-unlicensed and physical layer security theory is widely applied to ultra-reliable low-delay communication with low delay, high spectral efficiency and multiple connections and ultra-multiple machine type communication systems.
Disclosure of Invention
Aiming at the system safety problem that an eavesdropper possibly exists in the uplink non-orthogonal multiple access auxiliary semi-unlicensed system in transmission, the invention considers the safety of the system, and simultaneously adopts a given user scheduling strategy (such as the maximum reachable rate of a user) to further promote the safe transmission of the non-orthogonal multiple access system on the basis of guaranteeing the service quality of an authorized user.
The invention is based on physical layer security technology, and considers the security of the unlicensed user in the uplink non-orthogonal multiple access auxiliary semi-unlicensed system. The core of the strategy is based on physical layer security technology, and the selection of users with the maximum reachable rate is specifically comprising the following steps:
step S1, initializing a system, transmitting training series in a plurality of unlicensed users uplink non-orthogonal multiple access systems, and estimating channel state information of each channel by each user through a channel estimation algorithm.
And step S2, the authorized user feeds back the own transmission signal-to-noise ratio, the target rate R B and the channel state information g B to the base station.
Step S3, the base station calculates the decoding threshold of the authorized userWherein τ (|g B|2) is defined byThe result is that P F is the transmit power of the unlicensed user, P B is the transmit power of the licensed user, R B is the rate threshold and |h k|2 represents the channel gain of the unlicensed user, and the effective received signal-to-noise ratios P B|gB|2 and τ (|g B|2) of the licensed user are broadcast.
And S4, the unlicensed users calculate own transmission rate, and all unlicensed users are divided into two groups according to the maximum achievable rate scheduling algorithm and whether the power gain of the unlicensed users is larger than a decoding threshold value tau (|g B|2).
Step S5, obtaining the maximum reachable rate of the user k according to the step S4Wherein the method comprises the steps ofAndThe signal rates of the unlicensed users are respectively indicated by the base station in the first stage and the second stage of the serial interference elimination, and S 1 indicates the group that the power gain of the unlicensed users is smaller than the decoding threshold value.
Step S6, the unauthorized user with the maximum reachable rate is accessed into the resource block of the authorized user in a distributed competition mode.
The invention has the advantages that the correlation of the channel gains of a plurality of unauthorized users is considered, the probability of successfully decoding the users is increased through a user scheduling strategy under the condition of ensuring the service quality of the authorized users, the safe interruption probability and the signaling cost of a non-orthogonal multiple access auxiliary semi-unauthorized system are effectively reduced, and the safety performance of the system is improved.
The beneficial effects of the invention come from the following three aspects:
(1) Communication is performed using a semi-unlicensed-non-orthogonal multiple access technique. Since the authorized users generate high signaling overhead in the process of authorization and the unauthorized technology can cause the unauthorized users to collide when competing for the same resource block, in order to solve the two problems, a semi-unauthorized-non-orthogonal multiple access technology is generated, the non-orthogonal multiple access technology can accommodate a plurality of users in the same resource block, but the capacity of the non-orthogonal multiple access technology can overflow in a large number of equipment access networks. The semi-unlicensed technology adopts a distributed contention manner (see related document [5]Z.Ding,R.Schober,P.Fan,and H.V.Poor,"Simple semi-grant-free transmission strategies assisted by non-orthogonal multiple access,"IEEE Trans.Commun.,vol.67,no.6,pp.4464-4478,Jun.2019., which is not repeated herein), which can solve both the high signaling overhead generated and the capacity overflow problem occurring in the non-orthogonal multiple access technology. Thus, the technique can result in both lower signaling overhead and improved spectral efficiency and system performance.
(2) A user scheduling policy is employed. The user scheduling strategy can ensure lower signaling overhead and improve spectrum efficiency. In addition, unlike semi-unlicensed-non-orthogonal multiple access technology, which does not employ a policy of user scheduling, the present invention considers that unlicensed users schedule unlicensed users having a maximum reachable rate through a distributed contention resource manner under the condition of guaranteeing the quality of service of licensed users. The impact of the number of face authorized users on system security is shown in figure 5. This strategy not only prevents users accessing the same resource block from overflowing the capacity of the non-orthogonal multiple access technology, but also enhances the security of the system.
(3) Impact of rate on. The rate consisting of the interrupt rate threshold and the safety rate threshold has a great influence on the safety of the system, and whether the product of the rate and the rate is larger than 1 has influence on the safety interrupt probability of the system is shown in fig. 6. The Monte Carlo simulation results in FIG. 6 show that system security can be significantly enhanced when the rate-to-rate product is less than 1.
Drawings
Fig. 1 is a model of a generic uplink non-orthogonal multiple access system;
fig. 2 is a non-orthogonal multiple access assisted semi-unlicensed system model;
FIG. 3 is a Wyner eavesdropping channel model;
fig. 4 is a non-orthogonal multiple access assisted security system model;
fig. 5 is an illustration of the effect of the number of unlicensed users on the probability of system security outage for non-orthogonal multiple access assistance;
FIG. 6 is a graph of the impact of rate on the probability of system outage;
Fig. 7 is a flow diagram of implementation of a non-orthogonal multiple access assisted semi-unlicensed system security transmission scheme.
Detailed Description
As shown in fig. 4, the present invention considers the security of a non-orthogonal multiple access assisted system, where BS represents a base station, U B and U k are delay sensitive and delay tolerant users, respectively, and E is an eavesdropping end. The communication system of the embodiment of the invention comprises a base station BS, an authorized user U B, a eavesdropping node E and K unauthorized users U F, and the base station and all users are provided with single antennas. The channel power gain of the authorized user is represented by |g B|2, the channel power gain of the unauthorized user is represented by |g k|2, and the channel power gain of the unauthorized user is sequenced to be |h 1 2≤…≤|hK|2, whereinAndIt is assumed that all channels are subject to independent co-distributed rayleigh fading. The probability density function and cumulative distribution function of the channel ordered |h i|2 and |h j|2 (1. Ltoreq.i < j. Ltoreq.K) can therefore be expressed as:
Wherein, Phi 2 = K-j + n +1 and phi 3 = m + j-i-n. i, j respectively represent the ith user and the jth user, m, n respectively represent the (m+1) th user and the (n+1) th user, x, y respectively represent the lower and upper bounds of the channel gain variable |h| 2, and |h i|2,|hj|2 respectively represent the channel gains of the user i and the user j.
The embodiment of the invention is based on a physical layer security technology, and considers the security of the unlicensed user in the uplink non-orthogonal multiple access auxiliary semi-unlicensed system. A security transmission scheduling strategy for non-orthogonal multiple access assisted semi-unlicensed system is disclosed, the core of which is based on physical layer security technology, selection of users with maximum achievable rate. The specific implementation flow of the invention is shown in figure 7, and mainly comprises three stages, wherein the first stage mainly comprises a base station transmitting a training sequence, each user estimating own channel state information, an authorized user feeding back own transmitting signal-to-noise ratio, a rate threshold and channel state information to the base station, the base station calculating and broadcasting a decoding threshold and an effective receiving power gain of the authorized user, the second stage grouping unauthorized users according to the decoding threshold of the authorized user, and the third stage mainly comprises the steps of scheduling the unauthorized users meeting the requirements according to a scheduling strategy to access the resource blocks of the authorized users. The specific implementation flow is divided into six steps:
Step S1, the base station broadcasts a training sequence. The step has two purposes of (1) estimating channel state information of authorized users and unauthorized users, namely, each channel state information of BS-U B and BS-U k, and k E [1:K ], and (2) estimating channel state information of eavesdropping channels. I.e., channel state information of the BS-E channel. The acquisition of the channel state information of each link may be achieved by monitoring the transmission of each port or by using some complex channel estimation algorithm (see document [3]Zou Y,Zhu J,Wang X,et al.Improving physical-layer security in wireless communications using diversity techniques[J].IEEE Network,2015,29(1):42-48.) for details).
Step S2, the authorized user feeds back the own transmission signal-to-noise ratio, target rate R B and channel state information g B to the base station (see literature) [4]:Z.Ding,R.Schober,and H.V.Poor,"A new QoS-guarantee strategy for NOMA assisted semi-grant-free Transmission,"IEEE Trans.Commun,vol.69,no.11,pp.7489-7503,Nov 2021.).
Step S3, the base station calculates the decoding threshold of the authorized userWherein the method comprises the steps ofThe result, P F is the transmit power of the unlicensed user, P B,RB and |h k|2 represent the transmit power of the licensed user, the rate threshold and the channel gain of the unlicensed user, respectively, and the effective receive power gains P B|gB|2 and τ (|g B|2) of the licensed user are broadcast.
Step S4, the unlicensed users calculate own transmission rate, and divide all unlicensed users into two groups according to the maximum achievable rate scheduling algorithm and whether the power gain of the unlicensed users is greater than a decoding threshold value tau (|g B|2), wherein the user channel gain in group 1 is greater than the threshold value, namely P F|hm|2>τ(|gB|2), and P F is the transmission power of the unlicensed users, so that the method comprises the following steps ofThat is, the base station cannot directly and correctly decode the information of the authorized user, and can only decode the information of the unauthorized user in the first stage of the serial interference elimination. The channel gains for all users in group 2 are less than the threshold, P F|hk|2<τ(|gB|2). The information of the unauthorized users of the group can be decoded in the first stage of the serial interference cancellation as well as in the second stage. The achievable rate when decoded in the first stage isThe achievable rate at the second stage decoding is log 2(1+PF|hk|2). Obviously, the maximum achievable rate can be obtained by decoding the information of GF users in the second phase;
Step S5, according to the step S4, the maximum achievable rate obtained by the user K is Wherein the method comprises the steps ofAndThe group when the channel gain of the unlicensed user is smaller than the decoding threshold value is represented by S 1, under the condition that the service quality of the licensed user is ensured, all unlicensed users are decoded in the first stage by S 1 =k, all unlicensed users are decoded in the second stage by S 1 =0, and the unlicensed users can be decoded in the first stage and the second stage by S 1 =k.
Step S6, the unauthorized user with the maximum rate is accessed into the resource block of the authorized user in a distributed competition mode. The expression of the signal received by the base station is thatWherein P i and g i, i E { B, F } respectively represent the transmission power and channel gain of user U i, x i is the unit power signal sent by U i, i.eN represents additive white gaussian noise with a mean of 0 and a variance of σ 2.
The safety performance of the system of the embodiment of the present invention is analyzed as follows. Deducing a probability density function and a cumulative distribution function of related variables by utilizing probability theory and sequencing theory on the basis of the step S5, deducing the safe interruption probability of the system, and obtaining the safe interruption probability of the kth unlicensed user U k when transmitting signals according to the expression of the safe interruption probability and some algebraic operations, wherein the safe interruption probability is as follows:
wherein R th represents a safe rate threshold value, εB=θB-1, AndThe safe reachable rates of the unauthorized user in group 1, group 2 and both group 1 and group 2 are respectively represented, P out,1 represents the safe outage probability of the unauthorized user U k when the authorized user is interrupted, and the other three represent the safe outage probability of the unauthorized user U k when the authorized user is not interrupted.
The closed expression of the safe interrupt probability is as follows:
when the product of the interrupt rate threshold and the safe interrupt threshold rate is less than 1:
When the product of the interrupt rate threshold and the safe interrupt threshold rate is greater than 1:
Wherein the following a, b, c correspond to the variables of the corresponding functions in the above formula, respectively. As a function of the integral of the index, ε1=αBθth,ε4=ε3+(iPBαth+1)αB,εB=θB-1,εth=θth-1,λ1=PBθth2=PBαth+1,λ3=θth+1,η1=KPBθth2=KPBαth+1,η3=Kθth+1,η4=C0PBθth, A0=m+1,B0=K-k-n-1,C0=n+1,W0=K-k, ξ2=Wiθth+1,u1=WiPBθth,v1=u1PFε1,l1=u1ε1+PFξ3ε12,ξ5=(Bi+With+1,v2=u1PFε1,l2=u1ε16PFε15, ζ2=qjθth+1,ζ5=(bj+qjth+1,u2=qjPBθth,v3=u2PFε1,v4=u2PFε1,l3=u2ε13PFε12,l4=u2ε16PFε15.
Fig. 5 is an illustration of the effect of the number of unlicensed users on the probability of system security outage for non-orthogonal multiple access assistance. The parameter settings are such that R th =0.1 and R B =0.9 represent a safe rate threshold and a non-safe rate threshold, respectively. Wherein "K" represents the number of unauthorized users proposed in the present invention, "Sim" represents the monte carlo simulation result, and "Analysis" represents the theoretical Analysis result. The figure demonstrates the correctness of theoretical analysis by Monte Carlo simulation. Obviously, increasing the safe rate threshold may deteriorate the security performance of the wireless communication system. When the transmitting power of the unauthorized user is relatively high, the invention provides the user scheduling strategy which can obviously enhance the safety of the system. Fig. 6 is an effect of rate on the probability of system safe outage. The parameter is set such that k=4 represents the number of unauthorized users. Where R th=0.1,RB=0.9,Rth=0.1,RB =1.5 and R th=0.9,RB =1.5 represent rate-to-rate products less than 1 and greater than 1, respectively, while the impact of each rate on the system can be compared. "Sim" represents the monte carlo simulation result, and "Analysis" represents the theoretical Analysis result. The figure demonstrates the correctness of theoretical analysis by Monte Carlo simulation. Clearly, a rate-to-product of less than 1 can enhance the security performance of the system. In addition, simulation results show that in the case that the product of the rate and the rate is smaller than 1, the smaller the unsafe rate is, the smaller the SOP is, namely, the unsafe rate is reduced, and the better the safety of the system is.

Claims (3)

1. The non-orthogonal multiple access assisted semi-unlicensed system safe transmission method is characterized by comprising the following steps:
step S1, system initialization, transmitting training series in a plurality of unlicensed users uplink non-orthogonal multiple access systems, wherein each user estimates channel state information of each channel through a channel estimation algorithm;
step S2, the authorized user feeds back the own transmission signal-to-noise ratio, the target rate R B and the channel state information g B to the base station;
Step S3, the base station calculates the decoding threshold of the authorized user Wherein τ (|g B|2) is defined byThe obtained P F is the transmission power of the unlicensed user, P B is the transmission power of the licensed user, R B is the rate threshold of the licensed user, |h k|2 represents the channel gain of the unlicensed user, and the effective received signal-to-noise ratio P B|gB|2 and τ (|g B|2) of the licensed user are broadcasted;
Step S4, the unlicensed users calculate own transmission rate, and all unlicensed users are divided into two groups according to the maximum achievable rate scheduling algorithm and whether the power gain of the unlicensed users is larger than a decoding threshold value tau (|g B|2), namely, the power gain is larger than the decoding threshold value as group 1 (|S 1 |) and smaller than the decoding threshold value as group 2 (|S 2 |):
The user channel gains in group 1 are greater than the threshold, i.e., P F|hk|2>τ(|gB|2), and therefore there is I.e. the base station can not decode the information of authorized user directly and correctly, but can decode the information of unauthorized user only in the first stage of serial interference elimination, the channel gain of all users in group 2 is less than threshold value, i.e. P F|hk|2<τ(|gB|2), the information of unauthorized user of the group can be decoded in the first stage of serial interference elimination, also can be decoded in the second stage, and the reachable rate when decoded in the first stage isThe achievable rate at the second stage decoding is log 2(1+PF|hk|2), it is obvious that the maximum achievable rate can be obtained by decoding the information of the unauthorized user at the second stage;
Step S5, obtaining the maximum reachable rate of the user k according to the step S4 Wherein the method comprises the steps ofAndThe method comprises the steps of respectively representing signal rates of a base station for decoding an unlicensed user in a first stage and a second stage of serial interference elimination, wherein S 1 represents a group that the power gain of the unlicensed user is smaller than a decoding threshold value, S 1 I=0 represents that all unlicensed users are decoded in the second stage under the condition of guaranteeing the service quality of the licensed user, S 1 I=K represents that all unlicensed users are decoded in the first stage, S 1 I=k represents that the unlicensed user can be decoded in the first stage and the second stage;
step S6, the unauthorized user with the maximum reachable rate is accessed into the resource block of the authorized user in a distributed competition mode.
2. The method for secure transmission of non-orthogonal multiple access assisted semi-unlicensed system according to claim 1, wherein in step S6, the expression of the signal received by the base station is as followsWherein P i and g i, i E { B, F } respectively represent the transmission power and channel gain of user U i, x i is the unit power signal sent by U i, i.eN represents additive white gaussian noise with a mean of 0 and a variance of σ 2.
3. The method for secure transmission of a non-orthogonal multiple access assisted semi-unlicensed system according to claim 1 or 2, wherein the probability of secure interruption when the kth unlicensed user U k transmits a signal is:
Wherein, εB=θB-1, AndThe safe reachable rates of the unlicensed user in group 1, group 2 and both group 1 and group 2 are respectively represented, P out,1 represents the safe outage probability of the unlicensed user U k when the licensed user is outage, P out,2 represents the safe outage probability of the unlicensed user when the unlicensed user is decoded in the second phase, P out,3 represents the safe outage probability of the unlicensed user when the unlicensed user is decoded in the first phase, and P out,4 represents the safe outage probability of the unlicensed user when the unlicensed user is decoded in the first phase or the second phase.
CN202210303322.8A 2022-03-24 2022-03-24 A secure transmission method for a semi-authorization-free system assisted by non-orthogonal multiple access Active CN114900902B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210303322.8A CN114900902B (en) 2022-03-24 2022-03-24 A secure transmission method for a semi-authorization-free system assisted by non-orthogonal multiple access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210303322.8A CN114900902B (en) 2022-03-24 2022-03-24 A secure transmission method for a semi-authorization-free system assisted by non-orthogonal multiple access

Publications (2)

Publication Number Publication Date
CN114900902A CN114900902A (en) 2022-08-12
CN114900902B true CN114900902B (en) 2025-02-18

Family

ID=82716459

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210303322.8A Active CN114900902B (en) 2022-03-24 2022-03-24 A secure transmission method for a semi-authorization-free system assisted by non-orthogonal multiple access

Country Status (1)

Country Link
CN (1) CN114900902B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116261203B (en) * 2023-03-24 2025-06-24 鹏城实验室 Unauthorized signal access method, system, terminal and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381519A (en) * 2019-06-03 2019-10-25 中央民族大学 A kind of non-orthogonal multiple transmission method based on cognitive radio bi-directional relaying
CN112822781A (en) * 2021-01-20 2021-05-18 重庆邮电大学 Resource allocation method based on Q learning

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10848303B2 (en) * 2015-03-09 2020-11-24 University Of Houston System Methods and apparatuses for authentication in quantum key distribution and/or quantum data communication
CN113242600B (en) * 2021-05-08 2024-06-07 山东交通学院 Self-adaptive power distribution method suitable for semi-unlicensed NOMA

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381519A (en) * 2019-06-03 2019-10-25 中央民族大学 A kind of non-orthogonal multiple transmission method based on cognitive radio bi-directional relaying
CN112822781A (en) * 2021-01-20 2021-05-18 重庆邮电大学 Resource allocation method based on Q learning

Also Published As

Publication number Publication date
CN114900902A (en) 2022-08-12

Similar Documents

Publication Publication Date Title
CN111245498B (en) A relay-assisted non-orthogonal multiple access cooperative network security communication method
Zhou et al. Dynamic decode-and-forward based cooperative NOMA with spatially random users
CN109890031B (en) Multi-relay non-orthogonal multiple access system safe transmission method based on artificial noise
Krikidis et al. Relay selection for secure cooperative networks with jamming
CN110730452B (en) Performance analysis method for joint relay and interference selection scheme in wireless communication system
CN112333702A (en) Optimization method for delay minimization based on safe NOMA moving edge calculation
Zhou et al. Performance analysis of cooperative NOMA with dynamic decode-and-forward relaying
Cao et al. Artificial noise aided secure communications for cooperative NOMA networks
Umakoglu et al. Ber performance comparison of af and df assisted relay selection schemes in cooperative noma systems
Wang et al. A joint multiservice transmission scheme for RSMA-aided cell-free mMIMO system
CN114900902B (en) A secure transmission method for a semi-authorization-free system assisted by non-orthogonal multiple access
Ma et al. Performance analysis and optimization in two-way cooperative NOMA under two-phase transmission protocol
Alghasmari et al. Optimal power allocation in downlink non-orthogonal multiple access (NOMA)
Zheng et al. Secure offloading in noma-enabled multi-access edge computing networks
CN114501580B (en) Cooperative rate-splitting network secure transmission method with untrusted relay threat
CN113595675B (en) Interference management method and system for maximizing safe data transmission rate
CN118075735A (en) A method for analyzing the safe location of eavesdroppers in a channel fading environment
CN115134932B (en) Non-orthogonal multiple access auxiliary semi-unlicensed system safety transmission method
Hua et al. A method for low-latency secure multiple access
CN106603199A (en) Hash code based multiple access method and device of wireless network
Liu et al. Cognitive radio-inspired rate-splitting multiple access for semi-grant-free transmissions
CN113596026B (en) A multi-channel based physical layer security transmission method
CN116760458B (en) Satellite communication data safe transmission method based on non-orthogonal multiple access
Kalaimagal et al. Performance analysis of Cooperative underlay CRN in NOMA aided Energy harvesting for multiple secondary users
CN115426017B (en) A multiple access method and system based on virtual non-orthogonal decomposition of harmonic signals

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240813

Address after: 1003, Building A, Zhiyun Industrial Park, No. 13 Huaxing Road, Henglang Community, Dalang Street, Longhua District, Shenzhen City, Guangdong Province, 518000

Applicant after: Shenzhen Wanzhida Technology Transfer Center Co.,Ltd.

Country or region after: China

Address before: 400065 Chongwen Road, Nanshan Street, Nanan District, Chongqing

Applicant before: CHONGQING University OF POSTS AND TELECOMMUNICATIONS

Country or region before: China

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20250416

Address after: Room 202, Building 7, Caizhi Tiandi Park, No. 255 Renmin Middle Road, Chongchuan District, Nantong City, Jiangsu Province, 226000

Patentee after: Jiangsu Zhengxin Information Security Testing Co.,Ltd.

Country or region after: China

Address before: 1003, Building A, Zhiyun Industrial Park, No. 13 Huaxing Road, Henglang Community, Dalang Street, Longhua District, Shenzhen City, Guangdong Province, 518000

Patentee before: Shenzhen Wanzhida Technology Transfer Center Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right