Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices

08/17/2023
by   Sapna Thapar, et al.
0

The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a nonorthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing the resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation (SIC), we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate an interesting observation that the conventional decoding order and assigning more power allocation to the weak device, as presumed in many works on NOMA, is not an optimal strategy from the secrecy fairness viewpoint. Also, the average percentage gain of about 22.75 94.59 over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation).

READ FULL TEXT

page 1

page 10

research
03/30/2021

Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective

The amalgamation of non-orthogonal multiple access (NOMA) and physical l...
research
03/30/2021

Secrecy Fairness Aware NOMA for Untrusted Users

Spectrally-efficient secure non-orthogonal multiple access (NOMA) has re...
research
03/30/2021

Decoding Orders for Securing Untrusted NOMA

This letter focuses on exploring a new decoding order to resolve the sec...
research
02/11/2023

User Pairing and Power Allocation in Untrusted Multiuser NOMA for Internet-of-Things

In the Internet-of-Things (IoT), massive sensitive and confidential info...
research
02/03/2020

Fairness-Aware Hybrid Precoding for mmWave NOMA Unicast/Multicast Transmissions in Industrial IoT

This paper investigates dual-layer non-orthogonally superimposed transmi...
research
02/28/2022

Optimizing Information Freshness in RIS-assisted NOMA-based IoT Networks

This paper investigates the benefits of integrating reconfigurable intel...
research
03/31/2021

Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users

Observing the significance of spectrally-efficient secure non-orthogonal...

Please sign up or login with your details

Forgot password? Click here to reset