Secure transmission in downlink non-orthogonal multiple access based on polar codes

Non-orthogonal multiple access (NOMA) is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband (eMBB) in the fifth generation (5G) communication systems. In this paper, NOMA combined with polar codes is us...

Full description

Saved in:
Bibliographic Details
Published inChina communications Vol. 18; no. 9; pp. 221 - 235
Main Authors Sun, Ce, Fei, Zesong, Li, Bin, Wang, Xinyi, Li, Nan, Hu, Lijie
Format Journal Article
LanguageEnglish
Published China Institute of Communications 01.09.2021
School of Information and Electronics,Beijing Institute of Technology,Beijing 100081,China%Nanjing University of Information Science and Technology,Nanjing 210044,China%China Mobile Research Institute,Beijing 100053,China
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Non-orthogonal multiple access (NOMA) is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband (eMBB) in the fifth generation (5G) communication systems. In this paper, NOMA combined with polar codes is used to achieve secure transmission. Both degraded wiretap channel and non-degraded wiretap channel are considered, where an eavesdropper intercepts the communication between base station (BS) and users. For the degraded wiretap channel scenario, a secure polar encoding scheme is proposed in NOMA systems with power allocation to achieve the maximum secrecy capacity. With regard to the non- degraded wiretap channel, a polar encoding scheme with multiple-input-single-output (MISO) system is proposed, where artificial noise is generated at BS to confuse the eavesdropper's channel via transmit beam- forming. The security and the secure rate are employed respectively in order to measure the secrecy performance. We prove that the proposed schemes for each scenario can achieve the secure rate and can transmit the signal securely and reliably. The simulation results show that the eavesdropper hardly decoding the secure signal when the legitimate receiver can decode the signal with very low block error rate (BLER).
ISSN:1673-5447
DOI:10.23919/JCC.2021.09.017