Secure Downlink Massive MIMO NOMA Network in the Presence of a Multiple-Antenna Eavesdropper

Nam Phong Nguyen, Octavia A. Dobre, Long D. Nguyen, Chuyen T. Nguyen, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

In this paper, the secrecy performance of a massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) network is studied in the presence of a multiple-antenna eavesdropper. The ergodic secrecy rates for the downlink transmission in the considered system are derived to provide important insights. Then, by using these results, a joint power allocation scheme is proposed for both uplink training and downlink data transmission phases to maximize the sum ergodic secrecy rates. Because the utility function of interest is non-concave and the involved constraints are non-convex, a new iterative algorithm is proposed, which can find at least a local optimum. The obtained results reveal that the secrecy performance of NOMA networks benefits from deploying massive MIMO techniques. They also indicate that the proposed optimization algorithm enhances the secrecy performance of the considered system.

Original languageEnglish (US)
Title of host publication2019 IEEE International Conference on Communications, ICC 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538680889
DOIs
StatePublished - May 2019
Event2019 IEEE International Conference on Communications, ICC 2019 - Shanghai, China
Duration: May 20 2019May 24 2019

Publication series

NameIEEE International Conference on Communications
Volume2019-May
ISSN (Print)1550-3607

Conference

Conference2019 IEEE International Conference on Communications, ICC 2019
Country/TerritoryChina
CityShanghai
Period5/20/195/24/19

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Keywords

  • NOMA
  • massive MIMO
  • multiple-antenna eavesdropper.
  • physical layer security

Fingerprint

Dive into the research topics of 'Secure Downlink Massive MIMO NOMA Network in the Presence of a Multiple-Antenna Eavesdropper'. Together they form a unique fingerprint.

Cite this