Rugui Yao, Lukun Yao, Xiaoya Zuo, Nan Qi, Yinsheng Liu, Juan Xu
{"title":"NOMA系统的保密能效最大化","authors":"Rugui Yao, Lukun Yao, Xiaoya Zuo, Nan Qi, Yinsheng Liu, Juan Xu","doi":"10.1109/ICCSN.2019.8905336","DOIUrl":null,"url":null,"abstract":"In this paper, for the downlink of a non-orthogonal multiple access (NOMA) system, the power allocation scheme is proposed for the legitimate users. Attaching importance to the physical layer security and the green requirements of 5G, the secrecy energy efficiency (SEE) has first been defined. Then, we formulate an optimization problem, where each user's power allocation factor and total power allocation factor are determined. For reducing the computational complexity, we decouple the optimization problem into two concatenate subproblems and solve them one by one. Finally, some numerical results are presented to validate our proposed power allocation algorithm.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Secrecy Energy Efficiency Maximization in a NOMA System\",\"authors\":\"Rugui Yao, Lukun Yao, Xiaoya Zuo, Nan Qi, Yinsheng Liu, Juan Xu\",\"doi\":\"10.1109/ICCSN.2019.8905336\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, for the downlink of a non-orthogonal multiple access (NOMA) system, the power allocation scheme is proposed for the legitimate users. Attaching importance to the physical layer security and the green requirements of 5G, the secrecy energy efficiency (SEE) has first been defined. Then, we formulate an optimization problem, where each user's power allocation factor and total power allocation factor are determined. For reducing the computational complexity, we decouple the optimization problem into two concatenate subproblems and solve them one by one. Finally, some numerical results are presented to validate our proposed power allocation algorithm.\",\"PeriodicalId\":330766,\"journal\":{\"name\":\"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSN.2019.8905336\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2019.8905336","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secrecy Energy Efficiency Maximization in a NOMA System
In this paper, for the downlink of a non-orthogonal multiple access (NOMA) system, the power allocation scheme is proposed for the legitimate users. Attaching importance to the physical layer security and the green requirements of 5G, the secrecy energy efficiency (SEE) has first been defined. Then, we formulate an optimization problem, where each user's power allocation factor and total power allocation factor are determined. For reducing the computational complexity, we decouple the optimization problem into two concatenate subproblems and solve them one by one. Finally, some numerical results are presented to validate our proposed power allocation algorithm.