Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices

被引:4
|
作者
Thapar, Sapna [1 ]
Mishra, Deepak [2 ]
Saini, Ravikant [1 ]
机构
[1] Indian Inst Technol Jammu, Dept Elect Engn, Jammu 181221, India
[2] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
关键词
Imperfect successive interference cancellation (SIC); joint optimization; nonorthogonal multiple access (NOMA); physical layer security; secrecy fairness; NONORTHOGONAL MULTIPLE-ACCESS; PHYSICAL LAYER SECURITY; POWER ALLOCATION; MIMO-NOMA; INTERNET; FAIRNESS; PRIVACY; SYSTEMS;
D O I
10.1109/TII.2023.3263276
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a non orthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation, we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate that the conventional decoding order and assigning more power allocation to weak devices, as presumed in many NOMA works, is not an optimal strategy from the secrecy fairness viewpoint. Also, average percentage gain of about 22.75%, 50.58%, 94.59%, and 98.16%, respectively, is achieved by jointly optimized solution over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation).
引用
收藏
页码:411 / 420
页数:10
相关论文
共 50 条
  • [1] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [2] Secure and Multistep Computation Offloading and Resource Allocation in Ultradense Multitask NOMA-Enabled IoT Networks
    Zhou, Tianqing
    Fu, Yanyan
    Qin, Dong
    Nie, Xuefang
    Jiang, Nan
    Li, Chunguo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03): : 5347 - 5361
  • [3] Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices
    Karati, Arijit
    Fan, Chun-I
    Hsu, Ruei-Hau
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10431 - 10440
  • [4] Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices
    Hijawi, Ula
    Unal, Devrim
    Hamila, Ridha
    Gastli, Adel
    Ellabban, Omar
    IEEE ACCESS, 2021, 9 : 5640 - 5650
  • [5] Hybrid User Grouping With Heterogeneous Devices in NOMA-Enabled IoT Networks
    Wang, Chenbo
    Zhang, Rongqing
    Jiao, Bingli
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (12) : 9564 - 9578
  • [6] Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks
    Wali Ullah Khan
    Furqan Jameel
    Asim Ihsan
    Omer Waqar
    Manzoor Ahmed
    Digital Communications and Networks, 2023, 9 (01) : 264 - 269
  • [7] Comments on "Provably Secure Generalized Signcryption Scheme With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices"
    Zhang, Bo
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 4666 - 4670
  • [8] Symbiotic Ambient Backscatter IoT Transmission over NOMA-Enabled Network
    Elsayed, Mohamed
    Samir, Ahmed
    El-Banna, Ahmad A. Aziz
    Rabie, Khaled
    Li, Xingwang
    ElHalawany, Basem M.
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 2266 - 2271
  • [9] Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks
    Khan, Wali Ullah
    Jameel, Furqan
    Ihsan, Asim
    Waqar, Omer
    Ahmed, Manzoor
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (01) : 264 - 269
  • [10] Secure Protocol for Resource-Constrained IoT Device Authentication
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Al Rababah, Ahmad A.
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2022, 14 (01)