Journal on Communications ›› 2021, Vol. 42 ›› Issue (2): 168-176.doi: 10.11959/j.issn.1000-436x.2021041

• Correspondences • Previous Articles     Next Articles

Secure transmission for NOMA downlink based on short packet communication

Gangcan SUN1,2,3, Shaoke ZHAO1,2, Wanming HAO2,3, Zhengyu ZHU2,3   

  1. 1 Henan Institute of Advanced Technology, Zhengzhou University, Zhengzhou 450003, China
    2 Industrial Technology Research Institute, Zhengzhou University, Zhengzhou 450001, China
    3 School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China
  • Revised:2020-09-25 Online:2021-02-25 Published:2021-02-01
  • Supported by:
    The National Natural Science Foundation of China(61801435);Science and Technology Project of Henan Province(202102210119);Major Science and Technology Innovation Project of Zhengzhou(2019CXZX0037)

Abstract:

For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.

Key words: short packet communication, non-orthogonal multiple access, secure throughput, power allocation

CLC Number: 

No Suggested Reading articles found!