Machine Learning and Intelligent Communications. 4th International Conference, MLICOM 2019, Nanjing, China, August 24–25, 2019, Proceedings

Research Article

Secrecy Sum Rate for Two-Way Untrusted Relay in SCMA Networks

Download
19 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-32388-2_7,
        author={Yiteng Huang and Shuai Han and Shizeng Guo and Ming Li and Zhiqiang Li},
        title={Secrecy Sum Rate for Two-Way Untrusted Relay in SCMA Networks},
        proceedings={Machine Learning and Intelligent Communications. 4th International Conference, MLICOM 2019, Nanjing, China, August 24--25, 2019, Proceedings},
        proceedings_a={MLICOM},
        year={2019},
        month={10},
        keywords={Amplify-and-forward Two-way communication Untrusted relay Sparse code multiple access},
        doi={10.1007/978-3-030-32388-2_7}
    }
    
  • Yiteng Huang
    Shuai Han
    Shizeng Guo
    Ming Li
    Zhiqiang Li
    Year: 2019
    Secrecy Sum Rate for Two-Way Untrusted Relay in SCMA Networks
    MLICOM
    Springer
    DOI: 10.1007/978-3-030-32388-2_7
Yiteng Huang1, Shuai Han1,*, Shizeng Guo1, Ming Li2, Zhiqiang Li1
  • 1: Harbin Institute of Technology
  • 2: China Academy of Space Technology
*Contact email: hanshuai@hit.edu.cn

Abstract

Sparse code multiple access (SCMA) is a novel non-orthogonal multiple access technology that combines the concepts of CDMA and OFDMA. The advantages of SCMA include high capacity, low time delay and high transfer rate. The information security is also very important in 5G network. Relay is essential to be used for long distance cooperative transmission. In this paper, we consider a two-way relay system that each user pair can only communicate through an untrusted intermediate relay. We regard the intermediate relay as an eavesdropper and the confidential information must be kept secret to it. In order to maximize the sum security capacity, a subcarrier assignment algorithm based on matching theory is proposed in this paper. Finally, the theoretical analysis is verified by simulation. Simulation results show that security performance is improved significantly.