Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices

被引:4
|
作者
Thapar, Sapna [1 ]
Mishra, Deepak [2 ]
Saini, Ravikant [1 ]
机构
[1] Indian Inst Technol Jammu, Dept Elect Engn, Jammu 181221, India
[2] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
关键词
Imperfect successive interference cancellation (SIC); joint optimization; nonorthogonal multiple access (NOMA); physical layer security; secrecy fairness; NONORTHOGONAL MULTIPLE-ACCESS; PHYSICAL LAYER SECURITY; POWER ALLOCATION; MIMO-NOMA; INTERNET; FAIRNESS; PRIVACY; SYSTEMS;
D O I
10.1109/TII.2023.3263276
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a non orthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation, we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate that the conventional decoding order and assigning more power allocation to weak devices, as presumed in many NOMA works, is not an optimal strategy from the secrecy fairness viewpoint. Also, average percentage gain of about 22.75%, 50.58%, 94.59%, and 98.16%, respectively, is achieved by jointly optimized solution over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation).
引用
收藏
页码:411 / 420
页数:10
相关论文
共 50 条
  • [31] Trustworthy Blockchain Gateways for Resource-Constrained Clients and IoT Devices
    Debe, Mazin
    Salah, Khaled
    Jayaraman, Raja
    Yaqoob, Ibrar
    Arshad, Junaid
    IEEE ACCESS, 2021, 9 : 132875 - 132887
  • [32] Information management for trust computation on resource-constrained IoT devices
    Bradbury, Matthew
    Jhumka, Arshad
    Watson, Tim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 135 : 348 - 363
  • [33] An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
    Rana, Sohel
    Hossain, Saddam
    Shoun, Hasan Imam
    Abul Kashem, Mohammod
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 267 - 275
  • [34] A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices
    Gaglio, Salvatore
    Lo Re, Giuseppe
    Martorella, Gloria
    Peri, Daniele
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 355 - 359
  • [35] SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices
    Ammar, Mahmoud
    Crispo, Bruno
    Tsudik, Gene
    2020 ACM/IEEE 11TH INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2020), 2020, : 247 - 258
  • [36] Multi-UAV and IRS placement for secure data transmission in NOMA-enabled wireless networks
    Gupta, Aishwarya
    Trivedi, Aditya
    Prasad, Binod
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2024, 178
  • [37] Lightweight Photoplethysmogram Waveform Change Detection for Resource-Constrained IoT Enabled Remote Health Monitoring Devices
    Sivaranjini, P. N.
    Manikandan, M. Sabarimalai
    Cenkeramaddi, Linga Reddy
    2023 11TH INTERNATIONAL CONFERENCE ON CONTROL, MECHATRONICS AND AUTOMATION, ICCMA, 2023, : 330 - 335
  • [38] Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks
    Wu, Wei
    Zhou, Fuhui
    Hu, Rose Qingyang
    Wang, Baoyun
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (01) : 493 - 505
  • [39] Ambient IoT: Transmit Power Minimization for NOMA-Enabled BackCom
    Galappaththige, Diluka
    Rezaei, Fatemeh
    Tellambura, Chintha
    Maaref, Amine
    2023 IEEE 34TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PIMRC, 2023,
  • [40] Reinforcement Learning for User Clustering in NOMA-enabled Uplink IoT
    Ahsan, Waleed
    Yi, Wenqiang
    Liu, Yuanwei
    Qin, Zhijin
    Nallanathan, Arumugam
    2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2020,