Massive Access in Secure NOMA Under Imperfect CSI: Security Guaranteed Sum-Rate Maximization With First-Order Algorithm

Non-orthogonal multiple access (NOMA) is a promising solution for secure transmission under massive access. However, in addition to the uncertain channel state information (CSI) of the eavesdroppers due to their passive nature, the CSI of the legitimate users may also be imperfect at the base statio...

Full description

Saved in:
Bibliographic Details
Published inIEEE journal on selected areas in communications Vol. 39; no. 4; pp. 998 - 1014
Main Authors Li, Zongze, Xia, Minghua, Wen, Miaowen, Wu, Yik-Chung
Format Journal Article
LanguageEnglish
Published New York IEEE 01.04.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN0733-8716
1558-0008
DOI10.1109/JSAC.2020.3018805

Cover

Abstract Non-orthogonal multiple access (NOMA) is a promising solution for secure transmission under massive access. However, in addition to the uncertain channel state information (CSI) of the eavesdroppers due to their passive nature, the CSI of the legitimate users may also be imperfect at the base station due to the limited feedback. Under both channel uncertainties, the optimal power allocation and transmission rate design for a secure NOMA scheme is currently not known due to the difficulty of handling the probabilistic constraints. This article fills this gap by proposing novel transformation of the probabilistic constraints and variable decoupling so that the security guaranteed sum-rate maximization problem can be solved by alternatively executing branch-and-bound method and difference of convex programming. To scale the solution to a truly massive access scenario, a first-order algorithm with very low complexity is further proposed. Simulation results show that the proposed first-order algorithm achieves identical performance to the conventional method but saves at least two orders of magnitude in computation time. Moreover, the resultant transmission scheme significantly improves the security guaranteed sum-rate compared to the orthogonal multiple access transmission and NOMA ignoring CSI uncertainty.
AbstractList Non-orthogonal multiple access (NOMA) is a promising solution for secure transmission under massive access. However, in addition to the uncertain channel state information (CSI) of the eavesdroppers due to their passive nature, the CSI of the legitimate users may also be imperfect at the base station due to the limited feedback. Under both channel uncertainties, the optimal power allocation and transmission rate design for a secure NOMA scheme is currently not known due to the difficulty of handling the probabilistic constraints. This article fills this gap by proposing novel transformation of the probabilistic constraints and variable decoupling so that the security guaranteed sum-rate maximization problem can be solved by alternatively executing branch-and-bound method and difference of convex programming. To scale the solution to a truly massive access scenario, a first-order algorithm with very low complexity is further proposed. Simulation results show that the proposed first-order algorithm achieves identical performance to the conventional method but saves at least two orders of magnitude in computation time. Moreover, the resultant transmission scheme significantly improves the security guaranteed sum-rate compared to the orthogonal multiple access transmission and NOMA ignoring CSI uncertainty.
Author Wen, Miaowen
Li, Zongze
Wu, Yik-Chung
Xia, Minghua
Author_xml – sequence: 1
  givenname: Zongze
  orcidid: 0000-0003-2994-7217
  surname: Li
  fullname: Li, Zongze
  email: zzli@eee.hku.hk
  organization: Department of Electrical and Electronic Engineering, The University of Hong Kong, Hong Kong
– sequence: 2
  givenname: Minghua
  orcidid: 0000-0002-0820-2227
  surname: Xia
  fullname: Xia, Minghua
  email: xiamingh@mail.sysu.edu.cn
  organization: School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou, China
– sequence: 3
  givenname: Miaowen
  orcidid: 0000-0002-9638-7048
  surname: Wen
  fullname: Wen, Miaowen
  email: eemwwen@scut.edu.cn
  organization: School of Electronics and Information Engineering, South China University of Technology, Guangzhou, China
– sequence: 4
  givenname: Yik-Chung
  orcidid: 0000-0002-2738-0387
  surname: Wu
  fullname: Wu, Yik-Chung
  email: ycwu@eee.hku.hk
  organization: Department of Electrical and Electronic Engineering, The University of Hong Kong, Hong Kong
BookMark eNp9kDFv2zAQhYkiAeok_QFFFwKd5dyJlkh3E4w6cRHHQByjo0CRp4SBJbkk1Sb59ZVrI0OHTLe87z3cd8ZO2q4lxj4jjBFhevljXczGKaQwFoBKQfaBjTDLVAIA6oSNQAqRKIn5R3YWwhMATiYqHbE_Sx2C-028MIZC4K7lazK9J367WhZ801ryfNHsyNdkIp-tF98OARdf-FWvvW4jkeXrvknudCS-1M-uca86uq7lP1185HPnQ0xWft9UbB-6AX1sLthprbeBPh3vOdvMv9_PrpOb1dViVtwkJp2KmKBEayymlMtMYZUbo6yQUGVWUaoqALIKa7JCi7qupKpyMICZSgcJIs-tOGdfD7073_3qKcTyqet9O0yWaQYiAxQyH1J4SBnfheCpLnfeNdq_lAjl3m-591vu_ZZHvwMj_2OMi__ejl677bvklwPpiOhtaYpyoiZK_AWlRomS
CODEN ISACEM
CitedBy_id crossref_primary_10_1049_cmu2_12196
crossref_primary_10_1109_JSAC_2021_3088623
crossref_primary_10_1109_TVT_2021_3134758
crossref_primary_10_3390_network2030025
crossref_primary_10_1109_TVT_2023_3253021
crossref_primary_10_1109_TSP_2024_3413017
crossref_primary_10_1016_j_dcan_2024_10_019
crossref_primary_10_1109_TVT_2021_3106661
crossref_primary_10_1016_j_optcom_2024_130979
crossref_primary_10_1016_j_phycom_2022_101968
crossref_primary_10_1016_j_sigpro_2024_109571
crossref_primary_10_1109_TCOMM_2023_3239631
crossref_primary_10_1007_s43926_025_00123_7
crossref_primary_10_1109_COMST_2021_3108618
crossref_primary_10_1109_TVT_2022_3225195
crossref_primary_10_1109_ACCESS_2025_3549450
crossref_primary_10_1109_TVT_2023_3250654
Cites_doi 10.1007/s10107-013-0701-9
10.1109/35.339880
10.1007/s00186-008-0213-1
10.1109/TCOMM.2017.2709301
10.1109/JIOT.2019.2943377
10.1109/TWC.2019.2963181
10.1109/JSAC.2018.2825560
10.1109/ACSSC.2008.5074588
10.1109/TIT.2006.883550
10.1109/TSP.2008.925896
10.1017/CBO9780511804441
10.1109/JSTSP.2019.2901170
10.1109/TCOMM.2018.2830325
10.1109/TWC.2012.051712.110357
10.1109/TWC.2019.2906202
10.1109/TSP.2017.2784412
10.1137/1.9780898718829
10.1109/JSTSP.2019.2899778
10.1109/TCOMM.2015.2496592
10.1109/JSAC.2007.070920
10.1007/BF02124750
10.1007/978-3-319-92090-0
10.1109/COMST.2020.3013514
10.1109/JSAC.2017.2777672
10.1109/TCOMM.2015.2511078
10.1007/s10479-004-5022-1
10.1109/TCOMM.2019.2948343
10.1007/s10107-015-0892-3
10.1109/LSP.2014.2343971
10.1155/2009/802548
10.1109/TSP.2018.2812733
10.1007/s10957-007-9199-8
10.1007/978-94-009-0035-6
10.1007/978-1-4419-8853-9
10.1109/TSP.2018.2818082
10.1109/TIT.2005.864426
10.1007/s11081-015-9294-x
10.1109/JSAC.2020.3000826
10.1137/13094829X
10.1109/JSAC.2018.2825058
10.1002/j.1538-7305.1975.tb02040.x
10.1109/LCOMM.2015.2478460
10.1109/MCOM.2017.1500657CM
10.1080/02331930108844543
10.1109/TIFS.2016.2620279
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
DOI 10.1109/JSAC.2020.3018805
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0008
EndPage 1014
ExternalDocumentID 10_1109_JSAC_2020_3018805
9174848
Genre orig-research
GrantInformation_xml – fundername: Fundamental Research Funds for the Central Universities
  grantid: 191gjc04; 2019SJ02
  funderid: 10.13039/501100012226
– fundername: Key-Area Research and Development Program of Guangdong Province
  grantid: 2018B010114001
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
41~
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACNCT
ADRHT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IBMZZ
ICLAB
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
TN5
VH1
AAYXX
CITATION
7SP
8FD
L7M
ID FETCH-LOGICAL-c293t-171dcd12e67581b6cc8d370b5d8e28b00ed81fed3a3ffb78b60c01582018366d3
IEDL.DBID RIE
ISSN 0733-8716
IngestDate Mon Jun 30 10:15:25 EDT 2025
Wed Oct 01 02:47:41 EDT 2025
Thu Apr 24 22:57:05 EDT 2025
Wed Aug 27 02:47:25 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-171dcd12e67581b6cc8d370b5d8e28b00ed81fed3a3ffb78b60c01582018366d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-2994-7217
0000-0002-0820-2227
0000-0002-9638-7048
0000-0002-2738-0387
PQID 2503501376
PQPubID 85481
PageCount 17
ParticipantIDs ieee_primary_9174848
proquest_journals_2503501376
crossref_primary_10_1109_JSAC_2020_3018805
crossref_citationtrail_10_1109_JSAC_2020_3018805
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-04-01
PublicationDateYYYYMMDD 2021-04-01
PublicationDate_xml – month: 04
  year: 2021
  text: 2021-04-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE journal on selected areas in communications
PublicationTitleAbbrev J-SAC
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
beck (ref19) 2009
ref56
ref12
ref53
ref52
ref55
ref11
ref10
ref17
ref16
clerckx (ref21) 2013
ref51
bartle (ref54) 2011
ref48
ref47
ref42
ref41
jeffrey (ref50) 2000
ref44
(ref45) 2013
ref49
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
xie (ref15) 2018
ref35
ref34
ref37
ref36
ref31
ref30
ref32
ref2
ref1
ref39
rappaport (ref46) 2002
ref38
bertsekas (ref18) 1989
bechar (ref14) 2009
ref24
ref23
ref26
ref25
ref20
ref22
liang (ref33) 2008
ref28
ref27
ref29
bertsekas (ref43) 1999
References_xml – ident: ref56
  doi: 10.1007/s10107-013-0701-9
– ident: ref26
  doi: 10.1109/35.339880
– ident: ref53
  doi: 10.1007/s00186-008-0213-1
– year: 2000
  ident: ref50
  publication-title: Table of Integrals Series and Products
– ident: ref12
  doi: 10.1109/TCOMM.2017.2709301
– ident: ref47
  doi: 10.1109/JIOT.2019.2943377
– ident: ref10
  doi: 10.1109/TWC.2019.2963181
– ident: ref5
  doi: 10.1109/JSAC.2018.2825560
– ident: ref44
  doi: 10.1109/ACSSC.2008.5074588
– ident: ref24
  doi: 10.1109/TIT.2006.883550
– ident: ref22
  doi: 10.1109/TSP.2008.925896
– start-page: 42
  year: 2009
  ident: ref19
  publication-title: Gradient-based Algorithms with Applications to Signal-recovery Problems
– ident: ref52
  doi: 10.1017/CBO9780511804441
– ident: ref7
  doi: 10.1109/JSTSP.2019.2901170
– ident: ref8
  doi: 10.1109/TCOMM.2018.2830325
– ident: ref23
  doi: 10.1109/TWC.2012.051712.110357
– ident: ref9
  doi: 10.1109/TWC.2019.2906202
– ident: ref31
  doi: 10.1109/TSP.2017.2784412
– ident: ref39
  doi: 10.1137/1.9780898718829
– ident: ref11
  doi: 10.1109/JSTSP.2019.2899778
– start-page: 249
  year: 2008
  ident: ref33
  article-title: Wireless broadcast networks: Reliability, security, and stability
  publication-title: Proc Inf Theory Appl Workshop
– ident: ref34
  doi: 10.1109/TCOMM.2015.2496592
– ident: ref13
  doi: 10.1109/JSAC.2007.070920
– ident: ref20
  doi: 10.1007/BF02124750
– year: 2009
  ident: ref14
  article-title: A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables
  publication-title: arXiv 0909 3595
– ident: ref1
  doi: 10.1007/978-3-319-92090-0
– ident: ref4
  doi: 10.1109/COMST.2020.3013514
– year: 2013
  ident: ref45
  publication-title: Evolved Universal Terrestrial Radio Access Multi-Standard Radio (MSR) Base Station (BS) Radio Transmission and Reception
– ident: ref28
  doi: 10.1109/JSAC.2017.2777672
– ident: ref25
  doi: 10.1109/TCOMM.2015.2511078
– year: 2011
  ident: ref54
  publication-title: Introduction to Real Analysis
– ident: ref17
  doi: 10.1007/s10479-004-5022-1
– ident: ref6
  doi: 10.1109/TCOMM.2019.2948343
– year: 1999
  ident: ref43
  publication-title: Nonlinear Programming
– year: 2002
  ident: ref46
  publication-title: Wireless Communications Principles and Practice
– ident: ref42
  doi: 10.1007/s10107-015-0892-3
– start-page: 1065
  year: 2018
  ident: ref15
  article-title: A block coordinate ascent algorithm for mean-variance optimization
  publication-title: Proc Adv Neural Inf Process Syst (NIPS)
– ident: ref48
  doi: 10.1109/LSP.2014.2343971
– ident: ref51
  doi: 10.1155/2009/802548
– ident: ref41
  doi: 10.1109/TSP.2018.2812733
– ident: ref36
  doi: 10.1007/s10957-007-9199-8
– ident: ref35
  doi: 10.1007/978-94-009-0035-6
– ident: ref55
  doi: 10.1007/978-1-4419-8853-9
– year: 1989
  ident: ref18
  publication-title: Parallel and Distributed Computation Numerical Methods
– ident: ref2
  doi: 10.1109/TSP.2018.2818082
– ident: ref49
  doi: 10.1109/TIT.2005.864426
– ident: ref38
  doi: 10.1007/s11081-015-9294-x
– ident: ref3
  doi: 10.1109/JSAC.2020.3000826
– ident: ref40
  doi: 10.1137/13094829X
– ident: ref29
  doi: 10.1109/JSAC.2018.2825058
– ident: ref30
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– year: 2013
  ident: ref21
  publication-title: MIMO Wireless Networks Channels Techniques and Standards for Multi-Antenna Multi-User and Multi-Cell Systems
– ident: ref37
  doi: 10.1109/LCOMM.2015.2478460
– ident: ref27
  doi: 10.1109/MCOM.2017.1500657CM
– ident: ref16
  doi: 10.1080/02331930108844543
– ident: ref32
  doi: 10.1109/TIFS.2016.2620279
SSID ssj0014482
Score 2.488775
Snippet Non-orthogonal multiple access (NOMA) is a promising solution for secure transmission under massive access. However, in addition to the uncertain channel state...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 998
SubjectTerms Algorithms
Branch and bound methods
Computational geometry
Convexity
Decoupling
Eavesdropping
First order algorithms
First-order algorithm
Interference
limited feedback
massive access
Mathematical programming
Maximization
NOMA
non-orthogonal multiple access
Nonorthogonal multiple access
Optimization
outage probability
physical layer security
Power system reliability
Probabilistic logic
Security
Simulation
Uncertainty
Title Massive Access in Secure NOMA Under Imperfect CSI: Security Guaranteed Sum-Rate Maximization With First-Order Algorithm
URI https://ieeexplore.ieee.org/document/9174848
https://www.proquest.com/docview/2503501376
Volume 39
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-0008
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014482
  issn: 0733-8716
  databaseCode: RIE
  dateStart: 19830101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTxsxEB6FnMqBRwERGpAPPVU47NtOb6uoUYK0IBEQua3ix5IIkiDYqFV_fWe8m6iFqurNB1uy9I3H33jG3wB8DoXwNF4DPJ6YmEcqiLmMC8WLpGusRJMSTlIou0oGd9HlOB434HzzF8Za64rPbIeGLpdvlnpFT2UXGFpEMpJbsCVkUv3V2mQMMMxwGQMRhpyCgDqD6Xvdi8tR2sNIMMAA1SP5sfiPO8g1VXnnid310t-FbL2xqqrksbMqVUf_fKPZ-L8734OdmmeytDKMfWjYxUfY_k198AC-Z0ic0dmx1DVNZLMFc6_vll1dZylzHZHYEGn1C5V8sN5o-LWagMSdkWkRKNaw0WrOb5CysmzyYzav_3Wy-1k5Zf0Zkkt-TfKeLH16WOLS6fwQ7vrfbnsDXvdh4BrJQMl94Rtt_MBScOGrRGtpQuGp2EgbSDy31ki_sCachEWhhFSJp5FlELeQYZKY8Aiai-XCHgObCPTMhZFRYZNIKCWRnQZKKpK5Nya2LfDWyOS6FimnXhlPuQtWvG5OYOYEZl6D2YIvmyXPlULHvyYfEDibiTUuLWiv4c_rM_yaIzmkrCt64JO_r_oEHwKqcHF1PG1oli8re4oUpVRnzjZ_AYxO4SA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxEB6VcgAOvEpFoAUfOCGc7sNeO72tIqKkdFOJtKK3VfxYGtEkVbsRiF_fGe8mooAQNx9sydI3Hn_jGX8D8C5VKrJ4DXA5dZILk0iuZWV4lfWc12hSKkgKFeNseCaOzuX5FnzY_IXx3ofiM9-lYcjlu6Vd0VPZAYYWQgt9D-5LIYRsfmttcgYYaIScgUpTTmFAm8OMo97B0STvYyyYYIgakQCZvHMLhbYqf_jicMEMnkCx3lpTV_Ktu6pN1_78TbXxf_f-FB63TJPljWk8gy2_eA6PftEf3IHvBVJndHcsD20T2WzBwvu7Z-OTImehJxIbIbG-pqIP1p-MDpsJSN0ZGRfB4h2brOb8M5JWVkx_zObtz072ZVZfsMEM6SU_IYFPll9-XeLSi_kLOBt8PO0PeduJgVukAzWPVeysixNP4UVsMmu1S1VkpNM-0XhyvdNx5V06TavKKG2yyCLPIHah0yxz6S5sL5YL_xLYVKFvrpwWlc-EMkYjP02MNiR075z0HYjWyJS2lSmnbhmXZQhXol5JYJYEZtmC2YH3myVXjUbHvybvEDibiS0uHdhbw1-2p_imRHpIeVf0wa_-vuotPBieFsfl8Wj86TU8TKjeJVT17MF2fb3y-0hYavMm2OktfdHkbQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Massive+Access+in+Secure+NOMA+Under+Imperfect+CSI%3A+Security+Guaranteed+Sum-Rate+Maximization+With+First-Order+Algorithm&rft.jtitle=IEEE+journal+on+selected+areas+in+communications&rft.au=Li%2C+Zongze&rft.au=Xia%2C+Minghua&rft.au=Wen%2C+Miaowen&rft.au=Yik-Chung%2C+Wu&rft.date=2021-04-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0733-8716&rft.eissn=1558-0008&rft.volume=39&rft.issue=4&rft.spage=998&rft_id=info:doi/10.1109%2FJSAC.2020.3018805&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0733-8716&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0733-8716&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0733-8716&client=summon