Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices

被引:4
|
作者
Thapar, Sapna [1 ]
Mishra, Deepak [2 ]
Saini, Ravikant [1 ]
机构
[1] Indian Inst Technol Jammu, Dept Elect Engn, Jammu 181221, India
[2] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
关键词
Imperfect successive interference cancellation (SIC); joint optimization; nonorthogonal multiple access (NOMA); physical layer security; secrecy fairness; NONORTHOGONAL MULTIPLE-ACCESS; PHYSICAL LAYER SECURITY; POWER ALLOCATION; MIMO-NOMA; INTERNET; FAIRNESS; PRIVACY; SYSTEMS;
D O I
10.1109/TII.2023.3263276
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a non orthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation, we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate that the conventional decoding order and assigning more power allocation to weak devices, as presumed in many NOMA works, is not an optimal strategy from the secrecy fairness viewpoint. Also, average percentage gain of about 22.75%, 50.58%, 94.59%, and 98.16%, respectively, is achieved by jointly optimized solution over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation).
引用
收藏
页码:411 / 420
页数:10
相关论文
共 50 条
  • [21] An HAP and UAVs Collaboration Framework for Uplink Secure Rate Maximization in NOMA-Enabled IoT Networks
    Wang, Dawei
    Wu, Menghan
    He, Yixin
    Pang, Linna
    Xu, Qian
    Zhang, Ruonan
    REMOTE SENSING, 2022, 14 (18)
  • [22] Cognitive Secure Shield - A Machine Learning enabled threat shield for resource constrained IoT Devices
    Vuppalapati, Jaya Shankar
    Kedari, Santosh
    Ilapakurti, Anitha
    Vuppalapati, Chandrasekar
    Chauhan, Chitanshu
    Mamidi, Vanaja
    Rautji, Surbhi
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 1073 - 1080
  • [23] Efficient Online Classification and Tracking on Resource-constrained IoT Devices
    Aftab, Muhammad
    Chau, Sid Chi-Kin
    Shenoy, Prashant
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2020, 1 (03):
  • [24] Secure and Low-Power Authentication for Resource-Constrained Devices
    Sethi, Mohit
    Kortoci, Pranvera
    Di Francesco, Mario
    Aura, Tuomas
    PROCEEDINGS 2015 5TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT), 2015, : 30 - 36
  • [25] Pair Outage Probability Minimization for NOMA Among Resource-Constrained IoT Users
    Thapar, Sapna
    Mishra, Deepak
    Saini, Ravikant
    Ding, Zhiguo
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (08) : 11362 - 11377
  • [26] Low Latency Implementations of CNN for Resource-Constrained IoT Devices
    Mujtaba, Ahmed
    Lee, Wai-Kong
    Hwang, Seong Oun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (12) : 5124 - 5128
  • [27] A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
    Kumar, Sunil
    Kumar, Dilip
    Dangi, Ramraj
    Choudhary, Gaurav
    Dragoni, Nicola
    You, Ilsun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 31 - 63
  • [28] Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices
    Noura, Hassan
    Couturier, Raphael
    Pham, Congduc
    Chehab, Ali
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [29] A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
    Yilmaz, Selim
    Aydogan, Emre
    Sen, Sevil
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4405 - 4418
  • [30] A lightweight secure cyber foraging infrastructure for resource-constrained devices
    Goyal, S
    Carter, J
    SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, : 186 - 195