2019 IEEE Global Communications Conference (GLOBECOM) 2019
DOI: 10.1109/globecom38437.2019.9014034
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Fairness Aware NOMA for Untrusted Users

Abstract: Spectrally-efficient secure non-orthogonal multiple access (NOMA) has recently attained a substantial research interest for fifth generation development. This work explores crucial security issue in NOMA which is stemmed from utilizing the decoding concept of successive interference cancellation. Considering untrusted users, we design a novel secure NOMA transmission protocol to maximize secrecy fairness among users. A new decoding order for two users' NOMA is proposed that provides positive secrecy rate to bo… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…Taking this challenge into account, a decoding order has been proposed for a two-user untrusted NOMA scenario in the preliminary version [1] of this work that is feasible in providing positive secrecy rate for both near and far NOMA users. As an extension of [1], in this work, we study all possible decoding orders for a two user NOMA system including conventional one and investigate the best decoding order under secrecy constraint for both users. Besides, in [1], we have considered ideal SIC receivers in which interference from the decoded user is completely removed while decoding the later user.…”
Section: B Research Gap and Motivationmentioning
confidence: 99%
“…Taking this challenge into account, a decoding order has been proposed for a two-user untrusted NOMA scenario in the preliminary version [1] of this work that is feasible in providing positive secrecy rate for both near and far NOMA users. As an extension of [1], in this work, we study all possible decoding orders for a two user NOMA system including conventional one and investigate the best decoding order under secrecy constraint for both users. Besides, in [1], we have considered ideal SIC receivers in which interference from the decoded user is completely removed while decoding the later user.…”
Section: B Research Gap and Motivationmentioning
confidence: 99%
“…As noted, [9]- [10] have assumed only far user as untrusted, however, there exists a serious security risk for the far user also in case the near user is untrusted. Taking this into account, [11] has considered a twouser NOMA system assuming both the users as untrusted and proposed a new decoding order that is efficient in providing positive secrecy rate at both the users.…”
Section: A State-of-the-artmentioning
confidence: 99%
“…Also, keep this in mind that the number of users should not be too large in NOMA due to the practical limitations such as high interference and implementation complexity at receivers with more users [12]. Besides, [11] assumes perfect SIC that cancels the interference from the decoded users entirely which is a strong assumption due to practical implementation issues [2]. Therefore, imperfect SIC model is highly realistic to explore secure NOMA which has been considered in [13] for two-user NOMA case.…”
Section: B Research Gap and Motivationmentioning
confidence: 99%
See 2 more Smart Citations