[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Secure beamforming design for the UAV-enabled transmission over NOMA networks

Abstract

This paper considers an unmanned aerial vehicle -enabled multicast-unicast transmit system, in which downlink non-orthogonal multiple access (NOMA) is applied. Since two types of information are broadcast simultaneously, the security of information transmission is a matter of concern. Based on this, we investigate the problem of maximizing the secrecy rate of the particular unicasting user subject to the quality-of-service (QoS) requirements of the multicasting users and the power budget constraint of the UAV base station (BS). Such a problem is non-convex and hard to tackle, and a two-stage procedure is proposed to solve it optimally by dealing with a sequence of semidefinite relaxation (SDR) counterparts. First, fixing the maximal signal to interference plus noise ratio (SINR) of unicasting information in other users, we obtain the corresponding SINR of unicasting information at the particular user. Then, the maximal secrecy unicasting rate is derived by a one-dimension search over the intercepted SINR of unicasting information in other users. Furthermore, two suboptimal solutions with lower complexity are also proposed. Numerical simulation shows that the proposed NOMA assisted schemes always have a better security performance for UAV-enabled transmission.

1 Introduction

More and more techniques are proposed to improve network capacity and spectral efficiency [13]. As a promising technology, non-orthogonal multiple access (NOMA) has attracted a lot of research interests due to its superior spectral efficiency [47]. Unlike conventional orthogonal multiple access (OMA), NOMA serves multiple users with different power levels at the same time, code and frequency [8, 9], where successive interference cancellation (SIC) is employed at users. Many different kinds of NOMA designs, combined with wireless power supply [1012], millimeter-wave communication [13], and mobile edge computing [14] have appeared in recent researches. Cognitive radio and NOMA are also integrated to improve spectral efficiency and increase system capacity [15].

Although NOMA can achieve promising performance, there still exist challenges, especially when it is used to provide massive connections. Firstly, the quality of service (QoS) of edge users needs to be further improved [16]. In addition, more users should be served in a single subcarrier. This may increase the load and delay of SIC [17]. For these reasons, unmanned aerial vehicles (UAVs) can be exploited as a potential method to assist NOMA to achieve better performance. Due to the flexibility and mobility, UAVs have drawn increasing attention, which can be applied to many wireless scenarios including ubiquitous coverage, relaying, as well as information dissemination and data collection [18].

Recently, plenty of excellent research on UAV communications has been conducted. The authors of [19] considered a UAV-BS to communicate with two ground users using NOMA and investigated their outage probability. In [20], the authors characterized the capacity region of a UAV-enabled broadcast channel with two ground users and jointly optimized the UAV’s trajectory and transmit power/rate allocations over time. In [21], the authors employed a UAV system and NOMA to optimize the power allocation and the UAV altitude to maximize sum-rate for two users [22, 23]. However, in order to achieve the maximum rate gains from UAV-enabled communication, it is important to jointly optimize multiple relevant parameters, e.g., UAV altitude, antenna beamwidth, power allocation, and bandwidth allocation. To the authors’ best knowledge, this important problem, within a NOMA setting, has not been treated previously.

It is worth noting that a signal bearing different information messages sent from the UAV-BS is transmitted to corresponding receivers, which is equivalent to unicasting scenarios. So the aforementioned research efforts focus on wireless unicast strategies. However, if some users have the common interest, the same data hence has to be sent separately, which would lead to low spectral efficiency and inefficient utilization. Considering the broadcasting feature of wireless channel, multicast can deliver the same information to all users, while unicasting stream can be transmitted to one user within the same resource block [24], which yields bandwidth saving and efficient utilization.

Meanwhile, beamforming is a signal processing technique used in various wireless systems for directional communications and security communication [25], rather than information theoretic aspect [26, 27]. The integration of NOMA and multi-user beamforming thus has the potential to capture the benefits of both NOMA and beamforming [28, 29]. Therefore, in NOMA systems, when some users have the same interest, integrating multicast-unicast into NOMA can combine their advantages, and thus increase system capacity and reliability, boost the spectral efficiency and ameliorate link utilization simultaneously. The application of NOMA to multicasting transmission has also drawn some attention [24, 30]. The work of [30] has designed a beamforming-based NOMA unicast-multicast strategy, which has employed beamforming and power allocation to improve the reliability of a unicasting user while guaranteeing the quality of a group of multicasting users. However, the maximal ratio transmission (MRT) principle is applied in [30], which does not take full advantage of beamforming. Similar to NOMA protocol, [24] considers a multiple-antenna communication system with a mixed unicast and multicast traffic, where the successive decoding is applied at the unicast user to decode both common and private messages, while only the common message will be decoded at the other user. But this work focuses on two-user case of multicast, and that case is also considered in [31], whereas, in practical networks, a large number of users may intend the same data due to common interest. The problem of transmitting beamforming to multiple co-channel multicast groups based on semidefinite relaxation (SDR) has been proposed in [32] without the consideration of unicast.

The remainder of this paper is organized as follows. Section 2 proposes the main method for this paper. Section 3 introduces the system model of the NOMA-enabled multicast-unicast system and then presents the formulated optimization problem. In Section 4, the optimal solution to the problem is proposed. Section 5 presents two suboptimal solutions for the problem. Numerical results are provided to compare the performances of various proposed schemes in Section 6. The conclusions are given in Section 7.

1.1 Notations

Scalar is denoted by lower-cases letters, vectors are denoted by boldface lower-case letters, and matrices are denoted by boldface upper-case letters. For a square matrix A, tr(A), rank(A) and AH denote its trace, rank, and conjugate, respectively. A≥0 and A≤0 represent that A is a positive semidefinite matrix and a negative semidefinite matrix, respectively. x denotes the Euclidean norm of a complex vector x. E[·] denotes the statistical expectation. The distribution of a circularly symmetric complex Gaussian (CSCG) random vector with mean vector x and covariance matrix Σ is denoted by CN(0,Σ), and stands for “distributed as”. \({{\mathbb {C}}^{x \times y}}\) denotes the space of x×y complex matrices.

2 Method

In this paper, we consider a physical layer security problem in a multiuser network with mixed multicast and unicast information streams, which are superposed and simultaneously sent from the UAV-BS. The multicasting information is for every user while the unicasting information is for the special one of the users. Actually, the cognitive radio concept is used by assigning multicasting message with a higher priority compared to unicasting message. Thus, all users can first apply SIC to decode the multicast and then subtract it from their observations before the unicast is decoded. So the unicasting information may be intercepted by the other users, who are potential eavesdroppers. Different from [30], we aim to maximize the secrecy rate of the unicasting signal via the design of proper beamforming vectors for different users, subject to the users’ quality of service (QoS) about multicasting information and the power constraint of the BS, which is solved by a two-stage procedure. Since all the users’ channel state information (CSI) are perfectly available at the BS, the artificial noise (AN) precoding technologies are not required, and AN-aided beamforming also achieves an inherent trade-off between the transmission rate and the ability to impair eavesdroppers [33]. Although [34] considered the AN-aided transmit beamforming, where the channels of two eavesdroppers could be considered as multicast transmission in some cases, the maximum allowable signal to interference plus noise ratio (SINR) threshold on eavesdroppers is given. As a matter of fact, a more practical model is considered in this paper, in which neither the number of other users nor the maximal intercepted SINR of unicasting information is known. Furthermore, two suboptimal solutions with lower complexity are proposed. Finally, we compare the performance of our proposed solutions by numerical simulations.

3 System model and problem formulation

Consider the application of NOMA to a multiuser downlink communication system, in which one BS has two combined messages to send. We denote the multicasting message to all users by sM and denote the unicasting message to the certain user by sU. The multicasting information sM can be received by all the users and the unicasting message sU is intended for the particular user, as shown in Fig. 1. The BS is equipped N antennas and each user has a single antenna for the facility cost. Meanwhile, the user of the next generation wireless mobile communication systems also needs to satisfy the demand of low power consumption and portability, which results that using single receive antenna for each user would be more appropriate. It is assumed that the users’ channels are quasi-static fading channels, and the CSI is perfectly available at the BS.

Fig. 1
figure 1

A NOMA-enabled multicast-unicast transmission system

It is assumed that sM and sU are independent and identically distributed (i.i.d.) CSCG random variables with unit average power, denoted by sM,sUCN(0,1). Therefore, the complex baseband transmitted signal of the BS can be expressed as:

$$ {\mathbf{x}} = {{\mathbf{w}}_{0}}{s_{M}} + {{\mathbf{w}}_{1}}{s_{U}} $$
(1)

where \({{\mathbf {w}}_{0}},{{\mathbf {w}}_{1}} \in {{\mathbb {C}}^{N \times 1}}\) are multicasting and unicasting beamforming vectors, respectively. Suppose that the maximal transmission power budget of the BS is P. From [35], we thus have

$$ E[{{\mathbf{x}}^{H}}{\mathbf{x}}] = {\left\| {{{\mathbf{w}}_{0}}} \right\|^{2}} + {\left\| {{{\mathbf{w}}_{1}}} \right\|^{2}} \le P $$
(2)

The small scale-fading channel between the UAV and the ground users can be represented by a complex vector. In this paper, the matrix element hp(τ) denotes the channel impulse response (CIR) between the pth UAV antenna and the given ground user, and it can be expressed by the summation of the LoS component and several NLoS components as

$${} \begin{aligned} h_{p}(\tau)&=\sqrt{\frac{K}{1+K}}h^{\text{LoS}}_{p}\delta\left(\tau-\tau^{\text{LoS}}_{p}\right)+\sqrt{\frac{1}{1+K}}\sum^{N}_{n=1}\\ &\quad\sqrt{P_{p,n}}h^{\text{NLoS}}_{p,n}\delta\left(\tau-\tau^{\text{NLoS}}_{p,n}\right), \end{aligned} $$
(3)

where N is the number of NLoS components, K denotes the Ricean factor, \(h_{p,n}^{\text {NLoS}}\), Pp,n and \(\tau ^{\text {LoS}}_{p}\) mean the complex channel coefficient, the power and delay of the nth NLoS component, respectively, \(h^{\text {NLoS}}_{p,n}\) and \(\tau ^{\text {NLoS}}_{p,n}\) represent the complex channel coefficient and the delay of the LoS component. It should be mentioned that this paper only considers the power-normalized small scale-fading channel model. The total power equals to one, while the power of the LoS component and all NLoS components are \(\frac {K}{1+K}\) and \(\frac {1}{1+K}\), respectively.

The observation at the kth user is given by:

$$ {y_{k}} = {\mathbf{h}}_{k}^{H}{\mathbf{x}}{\mathrm{ + }}{n_{i}} = {\mathbf{h}}_{k}^{H}({{\mathbf{w}}_{0}}{s_{M}} + {{\mathbf{w}}_{1}}{s_{U}}{\mathrm{) + }}{n_{k}}, $$
(4)

where \({{\mathbf {h}}_{k}} \in {{\mathbb {C}}^{N \times 1}},k = 1, \cdots,K\), denotes the conjugated complex channel vector of user k. which is perfectly known at the BS. nk is additive Gaussian noise at each user, satisfying nkCN(0,σ2),k=1,,K. Similar to conventional NOMA protocol, SIC can be carried out at all users, so all users can detect sM first and then subtract sM from the observations before sU is decoded. In fact, the cognitive radio concept is used here, which means that sM is assigned with higher priority compared to sU. So the multicasting rate at each user can be written as Rk,M=log2(1+SINRk,M),k=1,,K and the other users are potential eavesdroppers to intercept the unicasting information. So the secrecy rate of unicasting information is written as:

$$ R = {\log_{2}}(1 + SINR_{1,U}) - \mathop {\max }\limits_{k = 2}^{K} {\log_{2}}(1 + {\text{SIN}}{{\mathrm{R}}_{k,U}}) $$
(5)

where

$$ {\text{SINR}_{k,M}}=\frac{{|{\mathbf{h}}_{k}^{H}{{\mathbf{w}}_{0}}{|^{2}}}}{{|{\mathbf{h}}_{k}^{H}{{\mathbf{w}}_{1}}{|^{2}} + \sigma^{2}}},k = 1, \cdots,K. $$
(6)
$$ {\text{SINR}_{k,U}} = \frac{{|{\mathbf{h}}_{k}^{H}{{\mathbf{w}}_{1}}{|^{2}}}}{{\sigma^{2}}},k = 1, \cdots,K. $$
(7)

On the right side of (5), the first part represents the unicasting SINR at particular user, and the last part is the intercepted unicasting SINR, which is inevitable and unexpected. The secrecy rate of unicasting information is effective, when the particular user has a maximal unicasting SINR, including that user 1 has a better channel condition than the other users. Thus, prior to the NOMA transmission, the BS selects the user who has the maximal unicasting SINR in order to guarantee an effective secrecy unicasting rate. Here, we assume that the BS chooses the proper user as the particular user before transmission.

In this paper, we aim to maximize the secrecy rate of sU subject to the predefined QoS of sM at each user and the given transmission sum-power P of the BS. The optimization problem can be formulated as:

$$ \mathop {\max }\limits_{{{\mathbf{w}}_{0}},{{\mathbf{w}}_{1}}} \;\; R $$
(8a)
$$ s.t.\;\; {SINR_{k,M}} \ge {\gamma_{M}},k = 1, \cdots,K, $$
(8b)
$$ \quad \;\; \;{\mathrm{ }}{\left\| {{{\mathbf{w}}_{0}}} \right\|^{2}} + {\left\| {{{\mathbf{w}}_{1}}} \right\|^{2}} \le P, $$
(8c)

where \({\gamma _{M}}{\mathrm { = }}{2^{2{R_{M}} - 1}}\phantom {\dot {i}\!}\) is the minimum SINR threshold for multicasting to satisfy the corresponding target rate requirement RM.

4 The optimal solution

In this section, we propose an algorithm based on SDR [36] to solve the problem (8). As we can see, there always exists a maximal intercepted unicasting SINR γe>0 at other users except user 1 in (8a), i.e., \({{\max }}_{k = 2}^{K}{\text {SIN}}{{\mathrm {R}}_{k,U}} \le {\gamma _{e}}\). For given γe>0, the following problem (9) has the same optimal solution to problem (8) [37]:

$$ \mathop {\max }\limits_{{{\mathbf{w}}_{0}},{{\mathbf{w}}_{1}}} |{\mathbf{h}}_{1}^{H}{{\mathbf{w}}_{1}}{|^{2}} $$
(9a)
$$ s.t.\;\;{SINR_{k,U}} \le {\gamma_{e}},k = 2, \cdots,K,\\ $$
(9b)
$$ \quad \;\; \; {SINR_{k,M}} \ge {\gamma_{M}},k = 1, \cdots,K,\\ $$
(9c)
$$ \quad \; \;\; {\mathrm{ }}{\left\| {{{\mathbf{w}}_{0}}} \right\|^{2}} + {\left\| {{{\mathbf{w}}_{1}}} \right\|^{2}} \le P, $$
(9d)

Let f(γe) denote the optimal value of problem (9) with given γe>0, and then (8a) can be written as following:

$$ \begin{aligned} R &= {\log_{2}}\left(1 + \frac{{f({\gamma_{e}})}}{{{\sigma^{2}}}}\right) -{\log_{2}}(1 + {\gamma_{e}})\\ &= {\log_{2}}\left[{\frac{{{\sigma^{2}} + f({\gamma_{e}})}}{{{\sigma^{2}}(1 + {\gamma_{e}})}}} \right] = R({\gamma_{e}}) \end{aligned} $$
(10)

It can be shown that the optimal value of problem (8) is the same as that of the following problem:

$$ \mathop {\max }\limits_{{\gamma_{e}} > 0} \; R({\gamma_{e}}) $$
(11)

Assume that γe is the optimal solution to problem (11). From the above results, when γe=γe, problem (9) and (8) have the same optimal solution. Hence problem (8) can be solved by two steps: First, given any γe, f(γe) can be obtained by solving (9). Then, the optimal γe for (8) can be obtained by one dimension search over γe>0. Therefore, in the rest of this section, we focus on solving (9).

Define \({{\mathbf {W}}_{1}} = {{\mathbf {w}}_{1}}{\mathbf {w}}_{1}^{H},{{\mathbf {W}}_{0}} = {{\mathbf {w}}_{0}}{\mathbf {w}}_{0}^{H}\) and \({{\mathbf {H}}_{k}} = {{\mathbf {h}}_{k}}{\mathbf {h}}_{k}^{H},k = 1, \cdots,K\). By ignoring the rank-one constraint on W1 and W0, the SDR of (9) can be expressed as:

$$ \mathop {\max }\limits_{{{\mathbf{W}}_{0}} \ge 0,{{\mathbf{W}}_{1} \ge 0}} tr{\mathrm{(}}{{\mathbf{H}}_{\mathrm{1}}}{{\mathbf{W}}_{\mathrm{1}}}{\mathrm{)}} $$
(12a)
$$ s.t.\;tr{\mathrm{(}}{{\mathbf{H}}_{k}}{{\mathbf{W}}_{\mathrm{1}}}{\mathrm{)}} \le {\gamma_{\mathrm{e}}}{\sigma^{2}},k = 2, \cdots,K $$
(12b)
$$ \begin{array}{l} \;\;\;\;\; tr({{\mathbf{H}}_{k}}{{\mathbf{W}}_{\mathrm{0}}}) \ge {\gamma_{\mathrm{M}}}[tr({{\mathbf{H}}_{k}}{{\mathbf{W}}_{\mathrm{1}}}) + {\sigma^{2}}],k = 1, \cdots,K \end{array} $$
(12c)
$$ \;\;\;\;\;\;tr{\mathrm{(}}{{\mathbf{W}}_{\mathrm{0}}}{\mathrm{)}} + tr{\mathrm{(}}{{\mathbf{W}}_{\mathrm{1}}}{\mathrm{)}} \le {\mathrm{P}}, $$
(12d)

Obviously, problem (12) is a separable semidefinite program (SDP). According to Theorem 3.2 in [38], the optimal solution \(({\mathbf {W}}_{1}^{*},{\mathbf {W}}_{0}^{*} \)) to problem (12) must satisfy \(\text {rank}({\mathbf {W}}_{1}^{*}) + \text {rank}({\mathbf {W}}_{0}^{*}) \le 2K\), where 2K denotes the number of linear constraints given in (12b)–(12d). But it is not sufficient to verify the rank-one of the variables because K in the problem (12) may be very large. As a result, the result of [5] for separable SDPs cannot be applied in our problem (9) to show the tightness of SDP in (12).

Then, we will discuss the rank of the optimal solution \({\mathbf {W}}_{1}^{*}\) by the Langrangian dual method. Since problem (12) is convex and satisfies the Slater’s condition, its duality gap is zero [39]. Let {αk},{βk} and λ denote the dual variables of (12a), (12b), and (12c), respectively. Then, the Lagrangian function of problem (12) is expressed as:

$$ \begin{array}{l} L({{\mathbf{W}}_{1}},{{\mathbf{W}}_{0}},\{ {\alpha_{k}}\},\{ {\beta_{k}}\},\lambda)= tr({\mathbf{A}}{{\mathbf{W}}_{1}}) + tr({\mathbf{B}}{{\mathbf{W}}_{0}}) + {\mathbf{C}} \end{array} $$
(13)

where

$$ {\mathbf{A}} = {{\mathbf{H}}_{1}} - \sum\limits_{k = 2}^{K} {{\alpha_{k}}{{\mathbf{H}}_{k}}} - {\gamma_{M}}\sum\limits_{k = 1}^{K} {{\beta_{k}}{{\mathbf{H}}_{k}}} - \lambda {\mathbf{I}}, \; $$
(14)
$$ {\mathbf{B}} = \sum\limits_{k = 1}^{K} {{\beta_{k}}{{\mathbf{H}}_{k}}} - \lambda {\mathbf{I}},\; $$
(15)
$$ {\boldsymbol{C}} = {\gamma_{e}}{\sigma^{2}}\sum\limits_{k = 2}^{K} {{\alpha_{k}} -} {\gamma_{M}}{\sigma^{2}}\sum\limits_{k = 1}^{K} {{\beta_{k}} +} \lambda P $$
(16)

And the dual problem of (12) can be expressed as:

$$ \mathop {\min }\limits_{{\mathrm{\{ }}{\alpha_{k}}{\mathrm{\},\{ }}{\beta_{k}}{\mathrm{\},}}\lambda} {\gamma_{e}}{\sigma^{2}}\sum\limits_{k = 2}^{K} {{\alpha_{k}}} - {\gamma_{M}}{\sigma^{2}}\sum\limits_{k = 1}^{K} {{\beta_{k}}} + \lambda P $$
(17a)
$$ s.t.\; \;{\boldsymbol{A}} \le 0,{\boldsymbol{B}} \le 0, $$
(17b)
$$ \;\;\;\;\;\;{\alpha_{k}} \ge 0,{\beta_{k}} \ge 0, $$
(17c)
$$ \;\;\;\;\;\;\lambda \ge 0, $$
(17d)

Denote the optimal dual variables of problem (17) as (\({\mathrm {\{ }}\alpha _{k}^{*} {\mathrm {\},\{ }}\beta _{k}^{*} {\mathrm {\} }},{\lambda ^{*}}\)), and let A and B be given in (14) and (15), respectively. By substituting the optimal dual variables, we have the following proposition:

Proposition 1

The optimal dual solution to problem (12) satisfies that λ>0 when γe>0.

Proof

We show that λ>0 by contradiction. Define \(\Phi = \{ k|{(\alpha _{k}^{*})^{2}} + {(\beta _{k}^{*})^{2}} > 0,k = 1, \cdots,K\} \); here define \(\alpha _{1}^{*} = 0\). Next, we will discuss that in the following two cases, the constraints of (17) cannot be satisfied when λ=0.1. If Φ = ϕ: In this case, we can derive that \(\alpha _{k}^{*} = 0,\beta _{k}^{*} = 0\). So the objective function of (9) is zero and the secrecy rate is zero. That is not true.2. If Φϕ: According to the contraint of (17b), \({{\mathbf {B}}^{*}} = {\sum \nolimits }_{k \in \Phi } {\beta _{k}^{*} {{\mathbf {H}}_{k}}} \le 0\), so \(\beta _{k}^{*} = 0\). Then, there must exists k and \(\alpha _{k}^{*} \ne 0\). It is obvious that \({\sum \nolimits }_{k \in \Phi } {\alpha _{k}^{*} {{\mathbf {H}}_{k}}} \ge 0\). To guarantee that \({{\mathbf {A}}^{*}} = {{\mathbf {H}}_{1}} - {\sum \nolimits }_{k \in \Phi } {\alpha _{k}^{*} {{\mathbf {H}}_{k}}} \le 0\) and \({{\mathbf {A}}^{*} }{\mathbf {W}}_{1}^{*} = 0\), it requires that the optimal solution \({\mathbf {W}}_{1}^{*} \), which lies in the null space of Hk, must also lie in the null space of H1. However, in such case, user 1 cannot receive the unicasting information either. So in this case, we can also conclude that λ>0.

By combining the above two cases, we can have λ>0. The Proposition 1 is proved. □

Due to the complementary slackness, in the optimal solution of (12), the sum power constraint must be satisfied with equality. Define

$$ {{\mathbf{D}}^{*}} = -\sum\limits_{k = 2}^{K} {\alpha_{k}^{*} {{\mathbf{H}}_{k}}} - {\gamma_{M}}\sum\limits_{k = 1}^{K} {\beta_{k}^{*} {{\mathbf{H}}_{k}}} - {\lambda^{*} }{\mathbf{I}}={{\mathbf{A}}^{*}} - {{\mathbf{H}}_{1}} $$
(18)

and l=rank(D). Then, let \({\mathbf {\Pi }} \in {{\mathbb {C}}^{N \times (N - l)}}\) denote the orthogonal basis of the null space of D, where Π=0 if l=N, and πn denote the nth column of Π, 1≤nNl. Hence we have the following proposition.

Proposition 2

The optimal solution \(({\mathbf {W}}_{1}^{*},{\mathbf {W}}_{0}^{*})\) to (12) satisfies the following conditions:

1. \({\mathbf {W}}_{1}^{*} \) can be expressed as

$$ {\mathbf{W}}_{1}^{*} {\mathrm{ = }}\sum\limits_{k = 1}^{N - l} {{a_{n}}{{\boldsymbol{\pi }}_{n}}{\boldsymbol{\pi }}_{n}^{H} + b{\boldsymbol{\tau}}{{\boldsymbol{\tau }}^{H}}} $$
(19)

where an≥0,b>0 and \({\boldsymbol {\tau }} \in {{\mathbb {C}}^{N \times 1}}\) has unit-norm and satisfies τHΠ=0.2. If \({\mathbf {W}}_{1}^{*} \) given in (19) has the rank larger than one, there exists at least an n such that an≥0, and the following solution with \(rank(\hat {\mathbf {W}}_{1}^{*}) = 1\), is also an optimal solution to (12).

$$ \hat{\mathbf{W}}_{1}^{*} {\mathrm{ = }}b{\boldsymbol{\tau }}{{\boldsymbol{\tau }}^{H}}, $$
(20)
$$ \hat{\mathbf{W}}_{0}^{*} = {\mathbf{W}}_{0}^{*} + \sum\limits_{k = 1}^{N - l} {{a_{n}}{{\boldsymbol{\pi }}_{n}}{\boldsymbol{\pi}}_{n}^{H}} $$
(21)

Proof

If l=N, rank(A)≥rank(D)−rank(H1)=N−1 [40]. However, if rank(A)=N, according to \({{\mathbf {A}}^{*} }{\mathbf {W}}_{1}^{*} = 0\), we will have \({\mathbf {W}}_{1}^{*} = 0\), which is not an optimal solution to (12). Thus, in this case, rank(A)=N−1. So \(\text {rank}({\mathbf {W}}_{1}^{*}) = 1\), and \({\mathbf {W}}_{1}^{*} {\mathrm { = }}b{\boldsymbol {\tau }}{{\boldsymbol {\tau }}^{H}}\),where τ spans the null space of A.

If l<N, there must exist Π≠0 and DΠ=0. Then, we have

$$ \begin{aligned} {\boldsymbol{\pi }}_{n}^{H}{{\mathbf{A}}^{*} }{{\boldsymbol{\pi }}_{n}} &= {\boldsymbol{\pi }}_{n}^{H}({{\mathbf{H}}_{1}} - {{\mathbf{D}}^{*} }){{\boldsymbol{\pi }}_{n}}\\ &= {\boldsymbol{\pi }}_{n}^{H}{{\mathbf{H}}_{1}}{{\boldsymbol{\pi }}_{n}} - {\boldsymbol{\pi }}_{n}^{H}{{\mathbf{D}}^{*} }{{\boldsymbol{\pi }}_{n}}\\ &= {\left| {{\mathbf{h}}_{1}^{H}{{\boldsymbol{\pi }}_{n}}} \right|^{2}} \ge 0, 1 \le n \le N - l. \end{aligned} $$
(22)

Since A≤0, it follows that \(|{\mathbf {h}}_{1}^{H}{{\boldsymbol {\pi }}_{n}}{|^{2}} = 0\), and it means that H1Π=0. So AΠ=(H1D)Π=0, and rank(A)≥rank(D)−rank(H1)=l−1. Let Ω denote the orthogonal basis of the null space of A, and rank(Ω)=N−rank(A)≤Nl+1. Since AΠ=0, Π spans (Nl) orthogonal dimensions of the null space of A, i.e., rank(Ω)≥rank(Π)=Nl. If rank(Ω)=Nl, we have Ω=Π and \({\mathbf {W}}_{1}^{*} = \sum \limits _{n = 1}^{N - l} {{a_{n}}{{\boldsymbol {\pi }}_{n}}{\boldsymbol {\pi }}_{n}^{H}} \), where an≥0. In such case, \({{\mathbf {H}}_{1}}{\mathbf {W}}_{1}^{*} = 0\), no unicasting information is transferred to user 1 since πn all lie in the null space of H1, i.e., H1Π=0. Thus, there exists only one single subspace spanned by \({\boldsymbol {\tau }} \in {{\mathbb {C}}^{N \times 1}}\) of unit norm, which lies in the null space of A, i.e., Aτ=0, and is orthogonal to the span of Π, i.e., ΠHτ=0. So we have Ω=[Π,τ] and rank(Ω)=Nl+1. Furthermore, any optimal solution to (12) can be expressed as (19).

If \(\text {rank}({\mathbf {W}}_{1}^{*}) > 1\), (\(\hat {\mathbf {{W}}}_{1}^{*},\hat {\mathbf {{W}}}_{0}^{*} \)), which is given in the second part of Proposition 2, is substituted into the objective function and constraints of (12), respectively, we have:

$$ tr({{\mathbf{H}}_{1}}\hat{\mathbf{{W}}}_{1}^{*}) = tr[{{\mathbf{H}}_{1}}({\mathbf{W}}_{1}^{*} - \sum\limits_{n = 1}^{N - l} {{a_{n}}{{\boldsymbol{\pi }}_{n}}{\boldsymbol{\pi }}_{n}^{H}})] = tr({{\mathbf{H}}_{1}}{\mathbf{W}}_{1}^{*}) $$
(23)
$${} {\begin{aligned} & {\text{tr}}({{\mathbf{H}}_{k}}\hat{\mathbf{{W}}}_{0}^{*}) - {\gamma_{M}}{\text{tr}}({{\mathbf{H}}_{k}}\hat{\mathbf{{W}}}_{1}^{*}) \\ & = {\text{tr}}({{\mathbf{H}}_{k}}{\mathbf{W}}_{0}^{*}) - {\gamma_{M}}{\text{tr}}({{\mathbf{H}}_{k}}{\mathbf{W}}_{1}^{*}) + (1 + {\gamma_{M}})\sum\limits_{n = 1}^{N - l} {{a_{n}}{{\left| {{\boldsymbol{h}}_{k}^{H}{{\boldsymbol{\pi }}_{n}}} \right|}^{2}}} \ge {\gamma_{M}}{\sigma^{2}} \end{aligned}} $$
(24)
$$ tr(\hat{\mathbf{{W}}}_{0}^{*}) + tr(\hat{\mathbf{{W}}}_{1}^{*}) = tr({\mathbf{W}}_{0}^{*}) + tr({\mathbf{W}}_{1}^{*}) \le P $$
(25)

(23) −(25) indicate that the new solution \((\hat {\mathbf {{W}}}_{1}^{*},\hat {\mathbf {{W}}}_{0}^{*})\) can achieve the same optimal value of (12), while it always satisfies all the constraints of (12). So \((\hat {\mathbf {{W}}}_{1}^{*},\hat {\mathbf {{W}}}_{0}^{*})\) is also an optimal solution to (12) with \(\text {rank}(\hat {\mathbf {{W}}}_{1}^{*}) = 1\). Proposition 2 is proved. □

Thus, we can derive the optimal solution to problem (9) with rank-one matrix for \({\mathbf {W}}_{1}^{*} \) as follows. First, we solve problem (12) via CVX [41] and obtain the solution \(({\mathbf {W}}_{1}^{*},{\mathbf {W}}_{0}^{*})\). If \(\text {rank}({\mathbf {W}}_{1}^{*}) = 1\), the optimal unicasting and multicasting information beamforming vectors \({\mathbf {W}}_{1}^{*} \) and \({\mathbf {w}}_{0}^{*} \) for problem (9) can be obtained from the eigenvalue decomposition of \({\mathbf {W}}_{1}^{*} \) and \({\mathbf {w}}_{0}^{*} \), respectively. Otherwise, if \(\text {rank}({\mathbf {W}}_{1}^{*}) > 1\), a new solution \((\hat {\mathbf {{W}}}_{1}^{*},\hat {\mathbf {{W}}}_{0}^{*})\) with \(\text {rank}(\hat {\mathbf {{W}}}_{1}^{*}) = 1\) can be constructed according to Proposition 2, and they are the optimal solution to problem (12). So, the rank-one relaxation on \({\mathbf {W}}_{1}^{*} \) in problem (12) results in no loss of optimality to problem (9), and given any γe>0, the value of f(γe) can be obtained by solving problem (12).

Proposition 2 guarantees that problem (12) has a rank-one optimal covariance solution \({\mathbf {W}}_{1}^{*} \), and if \(\text {rank}({\mathbf {W}}_{1}^{*}) >1\), the optimal value of problem (12) only serves as an upper bound on that of problem (9). So according to above analysis of Proposition 2, we have the following proposition.

Proposition 3

The optimal solution to problem (12) always satisfies that \(({\mathbf {W}}_{1}^{*}) =1\).

Proof

According to (18), we have D≤0 since A≤0 and H1≥0. If rank(D)=N, it follows that \(\text {rank}({\mathbf {W}}_{1}^{*}) =1\) is always satisfied according to Proposition 2. As a result, to show rank(D)=N, it is sufficient to verify that the maximum eigenvalue of D is negative, i.e., D<0. Thus, in the following, we show by contradiction that the maximum eigenvalue of D must be negative.

Suppose that the maximum eigenvalue of D is zero. There is at least an \({\mathbf {x}} \in {\mathbb {C}^{N \times 1}} \ne 0\) such that:

$$ {{\mathbf{x}}^{H}}{{\mathbf{D}}^{*}}{\mathbf{x}} = 0 $$
(26)

Since A≤0 according to (18), we have

$$ {{\mathbf{x}}^{H}}{{\mathbf{A}}^{*} }{\mathbf{x}} = 0 $$
(27)
$$ {{\mathbf{x}}^{H}}{{\mathbf{H}}_{1}}{\mathbf{x}} = 0 $$
(28)

According to (15) and (18), we can derive the equation on the relationship between B and D.

$$ {{\mathbf{D}}^{*}} = \sum\limits_{k = 2}^{K} {\left[ {\alpha_{k}^{*} + \left({{\gamma_{M}} + 1} \right)\beta_{k}^{*}} \right]{{\mathbf{H}}_{k}}} + ({\gamma_{M}} + 1)\beta_{1}^{*}{{\mathbf{H}}_{1}} - {{\mathbf{B}}^{*} } $$
(29)

Substituting (28), (29), and (15) into (26), we can have

$$ {{\mathbf{x}}^{H}}\left\{ {\sum\limits_{k = 2}^{K} {\left[ {\alpha_{k}^{*} + \left({{\gamma_{M}} + 1} \right)\beta_{k}^{*}} \right]{{\mathbf{H}}_{k}} + \lambda {\mathbf{I}}}} \right\}{\mathbf{x}}{\mathrm{ = }}0 $$
(30)

Since λ>0 and \({\alpha _{k}^{*}} \ge 0 \), \({\beta _{k}^{*}} \ge 0 \) according to Proposition 1 and (17c), there is no non-zero solution to Eq. (30). Then, all the eigenvalues of D must be negative. Therefore rank(D)=N, and \(\text {rank}({\mathbf {W}}_{1}^{*}) =1\). The Proposition 3 is proved. □

To summarize, the algorithm for optimal solution to solve problem (9) is given in Algorithm 1.

5 The suboptimal solutions

In order to reduce the computational complexity, we propose two suboptimal solutions for problem (9) based on zeroforcing (ZF) beamforming and maximal ratio transmission (MRT).

5.1 The ZF-based suboptimal solution

Assume that KN, the ZF-based beamforming scheme can be used to reduce the interception by restricting unicasting information beamforming vector w1 to satisfy \({\mathbf {h}}_{k}^{H}{{\mathbf {w}}_{1}} = 0,k = 2, \cdots,K\), which simplifies the beamforming design.

Let \({{\mathbf {H}}^{H}}={[{{\boldsymbol {h}}_{2}}, \cdots,{{\mathbf {h}}_{K}}]^{H}} \in {{\mathbb {C}}^{(K - 1) \times N}}\), and the singular value decomposition of H is denoted as HH=uΛvH=uΛ[v1,v0]H, where \({\mathbf {u}} \in {{\mathbb {C}}^{(K - 1) \times (K - 1)}},\;{\mathbf {v}} \in {{\mathbb {C}}^{N \times N}}\) are the orthogonal left and right singular vectors of H, respectively, which are both unitary matrices, \({\mathbf {\Lambda }} \in {{\mathbb {C}}^{(K - 1) \times N}}\) consists of (K−1) positive singular values of H. \({{\mathbf {v}}_{0}} \in {{\mathbb {C}}^{N \times (N - K + 1)}}\) is the last (NK+1) columns of v and forms an orthogonal basis for the null space of H. The ZF-based precoding vector w1 can be expressed as \({{\mathbf {w}}_{1}} = {{\mathbf {v}}_{0}}{\tilde {\mathbf {w}}_{1}}\), where \({\tilde {\mathbf {w}}_{1}} \in {{\mathbb {C}}^{(N - K + 1) \times 1}}\) denotes the new vector to be designed, and \({\tilde {\mathbf {w}}_{0}} \in {{\mathbb {C}}^{N \times 1}}\) is the ZF-based multicasting beamforming vector to be designed accordingly. In order to guarantee the feasibility of the ZF-based solution, we must have KN.

Define \({\tilde {\mathbf {H}}_{0}} = {\mathbf {v}}_{0}^{H}{{\mathbf {h}}_{1}}{\mathbf {h}}_{1}^{H}{{\mathbf {v}}_{0}}\) and new variables \({\tilde {\mathbf {W}}_{1}} = {\tilde {\mathbf {w}}_{1}}{\tilde {\mathbf {w}}}_{1}^{H} \), \({\tilde {\mathbf {W}}_{0}} = {\tilde {\mathbf {w}}_{0}}{\tilde {\mathbf {w}}}_{0}^{H}\). Similar to the optimal solution, the SDR of problem (12) based on ZF is consequently formulated as:

$$ \mathop {\max }\limits_{{{\tilde{\mathbf{W}}}_{0}} \ge 0,{{\tilde{\mathbf{W}}}_{1}} \ge 0} tr({\tilde{\mathbf{H}}_{0}}{{\tilde{\mathbf{W}}}_{1}}) $$
(31a)
$$ s.t.\;\;{\mathrm{ }}tr({{\mathbf{H}}_{k}}{{\tilde{\mathbf{W}}}_{0}}) \ge {\gamma_{M}}{\sigma^{2}},k = 1, \cdots,K, $$
(31b)
$$ \;\;\quad\;tr{\mathrm{(}}{{\tilde{\mathbf{W}}}_{0}}{\mathrm{) + }}tr{\mathrm{(}}{{\tilde{\mathbf{W}}}_{1}}) \le P, $$
(31c)

Problem (31) can be solved by using the technique of CVX, and then the corresponding solution also can be derived according to Proposition 2. Different from the optimal scheme, the ZF-based scheme significantly reduces the computational complexity without the one-dimension search. The algorithm for suboptimal solution based on ZF is summarized as Algorithm 2.

5.2 The MRT-based suboptimal solution

In the second suboptimal solution, with the application of MRT principle and given γe, the beamforming vectors are artificially designed to improve the effective channel gain of unicasting information [30], i.e., w=h1/||h1||, and the suboptimal solution works for arbitrary value of N. It means that \({{\mathbf {w}}_{1}} = \sqrt {{\alpha _{U}}} {\mathbf {w}},{{\mathbf {w}}_{0}} = \sqrt {{\alpha _{M}}} {\mathbf {w}}\) in (9), where αM,αU are the power of multicasting and unicasting information which are designed to satisfy transmission power constraint of the BS, i.e., αM+αUP. So the MRT-based secrecy unicasting rate maximization problem is transformed into a power allocation problem, which can be expressed as:

$$ \mathop {\max }\limits_{{\alpha_{U}} > 0,{\alpha_{M}} > 0} {\alpha_{U}}{\mathrm{|}}{\mathbf{h}}_{1}^{H}{\mathbf{w}}{{\mathrm{|}}^{2}} $$
(32a)
$$ {\mathrm{s}}.{\mathrm{t}}.\;\;{\alpha_{U}}{\mathrm{|}}{\mathbf{h}}_{k}^{H}{\mathbf{w}}{{\mathrm{|}}^{2}} \le {\gamma_{e}}{\sigma^{2}},k = 2, \cdots,K $$
(32b)
$$ \begin{array}{l} \;\;\;\;\;\;\;{\alpha_{M}}{\mathrm{|}}{\mathbf{h}}_{k}^{H}{\mathbf{w}}{{\mathrm{|}}^{2}} \ge {\gamma_{M}}({\alpha_{U}}{\mathrm{|}}{\mathbf{h}}_{k}^{H}{\mathbf{w}}{{\mathrm{|}}^{2}} + {\sigma^{2}}),k = 1, \cdots,K \end{array} $$
(32c)
$$ \; \; \; \; \; \quad {\alpha_{M}} + {\alpha_{U}} \le P, $$
(32d)

As mentioned before, the constraint (32d) must be satisfied with equality, i.e., αM+αU=P. So with given γe>0, from (32b) and (32c), we can derive the feasible set of power allocation for unicasting information as:

$$ {\alpha_{U}} \in \left\{ {0,\mathop {\min }\limits_{2 \le k \le K} \left[ {\frac{{P{\mathrm{|}}{\mathbf{h}}_{k}^{H}{\mathbf{w}}{{\mathrm{|}}^{2}} - {\gamma_{M}}{\sigma^{2}}}}{{{\mathrm{|}}{\mathbf{h}}_{k}^{H}{\mathbf{w}}{{\mathrm{|}}^{2}}({\gamma_{M}} + 1)}},\frac{{{\gamma_{e}}{\sigma^{2}}}}{{|{\mathbf{h}}_{k}^{H}{\mathbf{w}}{{\mathrm{|}}^{2}}}}} \right]} \right\} $$
(33)

Since the objective function of (32a) is a monotonically increasing function about αU, the optimal solution can be expressed as:

$$ \alpha_{U}^{*} = \mathop {\min }\limits_{2 \le k \le K} \left[ {\frac{{P{\mathrm{|}}{\mathbf{h}}_{k}^{H}{\mathbf{w}}{{\mathrm{|}}^{2}} - {\gamma_{M}}{\sigma^{2}}}}{{{\mathrm{|}}{\mathbf{h}}_{k}^{H}{\mathbf{w}}{{\mathrm{|}}^{2}}({\gamma_{M}} + 1)}},\frac{{{\gamma_{e}}{\sigma^{2}}}}{{|{\mathbf{h}}_{k}^{H}\textbf{w}{{\mathrm{|}}^{2}}}}} \right] $$
(34)

Thus, the secrecy rate of unicasting based on MRT also can be obtained by one-dimension search over γe>0, just as the optimal solution. The detailed steps of the MRT-based scheme are presented as Algorithm 3.

6 Simulation results and discussions

In this section, we numerically evaluate the performance of the proposed optimal and suboptimal schemes in the NOMA-enabled multicast-unicast transmission system, in which the BS is equipped with N antennas, and servers K users. Combining the feasibility of the ZF-based scheme with the facility cost in practice, we set N=K and σ2=−50 dBm, P=20 dBm in the simulations. We assume that signal attenuation from BS to the special user is 55 dB, corresponding to an identical distance of 15 m, and the signal attenuations from BS to other users are no less than 65 dB, corresponding to an identical distance of 20 m considering the user scheduling. The channel vectors are randomly generated from i.i.d. Rayleigh fading. All simulation results are achieved over 1000 random channel realization.

First, we check that given γe>0, whether problem (11) can be optimally solved. Figure 2 shows the plot about the function \(R({\gamma _{e}}) = {\log _{2}}\left [ {\frac {{{\sigma ^{2}} + f({\gamma _{e}})}}{{{\sigma ^{2}}(1 + {\gamma _{e}})}}} \right ]\) over γe>0 with N=K=4. We adopt one-dimension search to find the maximum of R(γe), and the uniqueness of \(\gamma _{e}^{*} \) guarantees the validity of one-dimension search. Meanwhile, given γe>0, the corresponding solution (w0,w1) of problem (9) can be derived. Under such particular setup, there is only one single maximum point in the plotted function. Actually, we cannot verify analytically the concavity or even the quasi-concavity of the function. From Fig. 2, we can observe that under such a situation, there is only one single maximal value \(\gamma _{e}^{*} \), and many others used in simulations of algorithm 1 and 3 also have their unique points.

Fig. 2
figure 2

Uniqueness of \({\gamma _{e}^{*}}\) in the multicast-unicast transmission system

Next, with the transmission power of the BS P=20 dBm and the target rate of multicasting information RM=1 bps/Hz, Fig. 3 compares the secrecy rate of unicasting information versus the number of antennas at the BS, which is set to be equal to the number of users in all simulations. The capacity of unicasting rate is also showed simultaneously under ideal conditions without the interception of unicasting.

Fig. 3
figure 3

Secrecy unicasting rate versus the number of users with P=20 dBm

Without loss of generality, time division multiple access (TDMA) is used as a representative of OMA, in which the multicasting and unicasting information are separately transmitted in different time slot. From the simulation results showed in the Fig. 3, the security performance of our proposed NOMA assisted system is undoubtedly better than that of TDMA system, and the performance of our proposed schemes is better with the growth of the number of antennas. Although the number of users also increases, the unicasting rate can be improved by proper beamforming design with more antennas at BS, and especially the optimal scheme has a significant improvement on the security performance. And the performance of optimal scheme is much closer to the capacity of the unicasting.

Then, we illustrate the secrecy rate of unicasting for our proposed optimal and suboptimal schemes, including TDMA scheme, against the transmission power at the BS in Fig. 4. The capacity of unicasting rate is also compared versus the transmission power of the BS under ideal conditions without the interception of unicasting. It is observed that the optimal and suboptimal strategies can achieve higher secrecy rate than TDMA, and with more power of transmit supply, the performance of the ZF-based scheme in algorithm 2 is close to that of the optimal scheme.

Fig. 4
figure 4

Secrecy rate of unicasting versus the transmission power with RM=1 bps/Hz

In order to compare the computational complex of proposed schemes, we list the running time of proposed optimal and suboptimal solution in Table 1 with the average time over 100 random channel realization. Regardless of the computer hardware, we can find that the running time of optimal scheme is tremendously large because of the matrix optimization and the one-dimension search, especially with more users.

Table 1 The running time of three schemes (unit, second)

At last, we show in Fig. 5 the impact of the target multicasting rate, RM, on the secrecy rate of unicasting achieved for all proposed solutions, with fixed transmission power at the BS P=25 dBm and P=30 dBm, respectively. It is observed that the curves of all solutions decreases with the target rate of multicasting. The reason is that more power is allocated to transmit multicasting information so as to meet the requirement of QoS. However, increasing the transmission power can improve the secrecy unicasting rate.

Fig. 5
figure 5

Secrecy unicasting rate versus the target rate of multicasting with K=5

7 Conclusion

This paper has investigated the security problem in a UAV-aided multiuser network with multicast-unicast transmission assisted by NOMA. Using the two-stage procedure, we can optimally solve the non-convex design problem by applying the technique of SDR. We also show that SDR here has no loss of optimality. Two suboptimal solutions with lower complexity than the optimal solution are also presented based on ZF and MRT. Experimental results show that the new approach of placement problem improves the security performance of UAV communication systems.

Availability of data and materials

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

Abbreviations

UAV:

Unmanned aerial vehicle

NOMA:

Non-orthogonal multiple access

SIC:

Successive interference cancellation

BS:

Base station

LoS:

Line-of-sight

SDR:

Semidefinite relaxation

MRT:

Maximal ratio transmission

References

  1. Y Zeng, R Zhang, TJ Lim, Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag.54(5), 36–42 (2016).

    Article  Google Scholar 

  2. C. Li, H. J. Yang, F. Sun, J. M. Cioffi, L. Yang, Adaptive overhearing in two-way multi-antenna relay channels. IEEE Sig. Process. Lett.23(1), 117–120 (2016).

    Article  Google Scholar 

  3. F. Zhou, Y. Wu, R. Q. Hu, Y. Qian, Computation rate maximization in UAV-enabled wireless powered mobile-edge computing systems. IEEE J. Sel. Areas Commun.36(9), 1927–1941 (2018).

    Article  Google Scholar 

  4. C. Li, H. J. Yang, F. Sun, J. M. Cioffi, L. Yang, Multiuser overhearing for cooperative two-way multiantenna relays. IEEE Trans. Veh. Technol.65(5), 3796–3802 (2016).

    Article  Google Scholar 

  5. Z. Ding, Z. Yang, P. Fan, H. V. Poor, On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users. IEEE Sig. Process. Lett.21(12), 1501–1505 (2014).

    Article  Google Scholar 

  6. W. Wu, F. Zhou, R. Q. Hu, B. Wang, Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks. IEEE Trans. Commun.68(1), 493–505 (2019). https://doi.org/10.1109/tcomm.2019.2949994.

    Article  Google Scholar 

  7. F. Zhou, Y. Wu, R. Q. Hu, Y. Wang, K. Wong, Energy-efficient NOMA heterogeneous cloud radio access networks. IEEE Netw.32(2), 152–160 (2018).

    Article  Google Scholar 

  8. Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, K. Higuchi, in Proc. IEEE Veh. Tech. Conf. (VTC Spring). Non-orthogonal multiple access (NOMA) for cellular future radio access (IEEE, 2013), pp. 1–5. https://doi.org/10.1109/vtcspring.2013.6692652.

  9. C. Li, F. Sun, J. M. Cioffi, L. Yang, Energy efficient MIMO relay transmissions via joint power allocations. IEEE Trans. Circ. Syst.61(7), 531–535 (2014).

    Google Scholar 

  10. P. Deng, B. Wang, W. Wu, T. Guo, Transmitter design in MISO-NOMA system with wireless-power supply. IEEE Commun. Lett.22(4), 844–847 (2018).

    Article  Google Scholar 

  11. C. Li, S. Zhang, P. Liu, F. Sun, J. M. Cioffi, L. Yang, Overhearing protocol design exploiting inter-cell interference in cooperative green networks. IEEE Trans. Veh. Technol.65(1), 441–446 (2016).

    Article  Google Scholar 

  12. W. Wu, F. Zhou, R. Q. Hu, B. Wang, Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks. IEEE Trans. Commun.68(1), 493–505 (2020). https://doi.org/10.1109/TCOMM.2019.2949994.

    Article  Google Scholar 

  13. J. Cui, Y. Liu, Z. Ding, P. Fan, A. Nallanathan, Optimal user scheduling and power allocation for millimeter wave NOMA systems. IEEE Trans. Wireless Commun.17(3), 1502–1517 (2018).

    Article  Google Scholar 

  14. W. Wu, F. Zhou, P. Li, P. Deng, B. Wang, V. C. M. Leung, in ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Energy efficient secure NOMA-enabled mobile edge computing networks (IEEE, 2019). https://doi.org/10.1109/icc.2019.8761823.

  15. F. Zhou, Y. Wu, Y. Liang, Z. Li, Y. Wang, K. Wong, State of the art, taxonomy, and open issues on cognitive radio networks with NOMA. IEEE Wirel. Commun.25(2), 100–108 (2018).

    Article  Google Scholar 

  16. C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, L. Yang, Spectral-efficient cellular communications with coexistent one- and two-hop transmissions. IEEE Trans. Veh. Technol.65(8), 6765–6772 (2016).

    Article  Google Scholar 

  17. W. Wu, Y. Wang, J. Mo, J. Liu, in EURASIP Journal on Wireless Communications and Networking. Robust Proactive Eavesdropping in UAV-Enabled Wireless Communication Networking (Springer, 2019). https://doi.org/10.1186/s13638-019-1599-6.

  18. F. Zhou, Y. Wu, Y. Liang, Z. Li, Y. Wang, K. Wong, State of the art, taxonomy, and open issues on NOMA in cognitive radio networks. IEEE Wirel. Commun.25(2), 100–108 (2018).

    Article  Google Scholar 

  19. Sharma P.K., D. I. Kim, in Proc. IEEE Globecom Workshops (GC Wkshps). UAV-enabled downlink wireless system with non-orthogonal multiple access (IEEE, 2017). https://doi.org/10.1109/glocomw.2017.8269066.

  20. Q. Wu, J. Xu, R. Zhang, Capacity characterization of UAV-enabled two-user broadcast channel. IEEE J. Sel. Areas Commun.36(9), 1955–1971 (2018).

    Article  Google Scholar 

  21. M. F. Sohail, C. Y. Leow, S. Won, Non-orthogonal multiple access for unmanned aerial vehicle assisted communication. IEEE Access. 6:, 22716–22727 (2018).

    Article  Google Scholar 

  22. M. M. Azari, F. Rosas, K. -C. Chen, S. Pollin, Ultra reliable UAV communication using altitude and cooperation diversity. IEEE Trans. Commun.66(1), 330–344 (2018).

    Article  Google Scholar 

  23. Z. Ding, P. Fan, H. V. Poor, Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions. IEEE Trans. Veh. Technol.65(8), 6010–6023 (2016).

    Article  Google Scholar 

  24. U. Sethakaset, S. Sun, in 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Sum-rate maximization in the simultaneous unicast and multicast services with two users (IEEE, 2010). https://doi.org/10.1109/pimrc.2010.5671672.

  25. W. Wu, B. Wang, Z. Deng, H. Zhang, Secure beamforming for full-duplex wireless powered communication systems with self-energy recycling. IEEE Wirel. Commun. Lett.6(2), 146–149 (2017).

    Article  Google Scholar 

  26. H. Ly, T. Liu, Y. Liang, Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages. IEEE Tran. Inf. Theory. 56(11), 5477–5487 (2010).

    Article  MathSciNet  Google Scholar 

  27. R. Liu, T. Liu, H. V. Poor, S. Shamai, in 2010 IEEE International Symposium on Information Theory. MIMO Gaussian broadcast channels with confidential and common messages (IEEE, 2010). https://doi.org/10.1109/isit.2010.5513775.

  28. F. Zhou, Z. Chu, H. Sun, R. Q. Hu, L. Hanzo, Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT. IEEE J. Sel. Areas Commun.36(4), 918–931 (2018).

    Article  Google Scholar 

  29. B. Kim, S. Lim, H. Kim, S. Suh, J. Kwun, S. Choi, C. Lee, S. Lee, D. Hong, in MILCOM 2013 - 2013 IEEE Military Communications Conference. Non-orthogonal multiple access in a downlink multiuser beamforming system (IEEE, 2013). https://doi.org/10.1109/milcom.2013.218.

  30. Z. Ding, Z. Zhao, M. Peng, H. V. Poor, On the spectral efficiency and security enhancements of NOMA assisted multicast-unicast streaming. IEEE Trans. Commun.65(7), 3151–3163 (2017).

    Article  Google Scholar 

  31. W. Mei, Z. Chen, J. Fang, GSVD-based precoding in MIMO systems with integrated services. IEEE Sig. Process. Lett.23(11), 1528–1532 (2016).

    Article  Google Scholar 

  32. E. Karipidis, N. Sidiropoulos, Z-Q Luo, Quality of service and Max-Min fair transmit beamforming to multiple cochannel multicast groups. IEEE Trans. Sig. Process.56(3), 1268–1279 (2008).

    Article  MathSciNet  Google Scholar 

  33. H. -H. Chen, L. Wang, Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Comm. Surv. Tuts.19(1), 347–376 (2017).

    Article  Google Scholar 

  34. W. -C. Liao, T. -H. Chang, W. -K. Ma, C. -Y. Chi, QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach. IEEE Trans. Sig. Process.59(3), 1202–1216 (2011).

    Article  MathSciNet  Google Scholar 

  35. P. Gover, A. Sahai, in 2010 IEEE International Symposium on Information Theory. Shannon meets Tesla: wireless information and power transfer (IEEE, 2010). https://doi.org/10.1109/isit.2010.5513714.

  36. Z. -Q. Luo, W. -K. Ma, A. M. -c. So, Y. Ye, S. Zhang, Semidefinite relaxation of quadratic optimization problems. IEEE Sig. Process. Mag.27(3), 20–34 (2010).

    Article  Google Scholar 

  37. L. Zhang, R. Zhang, Y. C. Liang, Y. Xin, S. Cui, On the relationship between the multi-antenna secrecy communications and cognitive radio communications. IEEE Trans. Commun.58(6), 1877–1886 (2010).

    Article  Google Scholar 

  38. Y. Huang, D. P. Palomar, Rank-constrained separable semidefinite programming with applications to optimal beamforming. IEEE Trans. Sig. Process.58(2), 664–678 (2010).

    Article  MathSciNet  Google Scholar 

  39. S. Boyd, L. Vandenberghe, Convex Optimization (Cambridge Univ. Press, Cambridge U.K., 2004).

    Book  Google Scholar 

  40. L. Liu, R. Zhang, K. -C. Chua, in 2013 IEEE Global Communications Conference (GLOBECOM). Secrecy wireless information and power transfer with MISO beamforming (IEEE, 2013). https://doi.org/10.1109/glocom.2013.6831340.

  41. M. Grant, S. Boyd, CVX: Matlab Software for Disciplined Convex Programming, Version 1.21 (2011). http://download.csdn.net/detail/herosofearth/9631094.

Download references

Funding

This work is supported by the National Natural Science Foundation of China under grant numbers 61801153, State Key Laboratory of Millimeter Waves under grant numbers K202012, Natural Science Foundation of Zhejiang Province (LQY20F010001) and Doctoral Research Fund of Henan Institute of Technology (KQ1852).

Author information

Authors and Affiliations

Authors

Contributions

Chuan Yin is the main author of the current paper. Chuan Yin contributed to the development of the ideas, design of the study, theory, result analysis, and article writing. Leibing Yan carried out the experimental work and the data collection and interpretation and finished the analysis and interpretation of data and drafted the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Leibing Yan.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yin, C., Yan, L. Secure beamforming design for the UAV-enabled transmission over NOMA networks. J Wireless Com Network 2020, 79 (2020). https://doi.org/10.1186/s13638-020-01682-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-020-01682-9

Keywords