Home > Research > Publications & Outputs > Covert and Secure Communications in NOMA Networ...

Associated organisational unit

Electronic data

  • covert_and_secure_NOMA

    Accepted author manuscript, 209 KB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Covert and Secure Communications in NOMA Networks with Internal Eavesdropping

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Covert and Secure Communications in NOMA Networks with Internal Eavesdropping. / Li, Qiang; Xu, Dongyang; Navaie, Keivan et al.
In: IEEE Wireless Communications Letters, Vol. 12, No. 12, 12, 01.12.2023, p. 2178-2182.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Li, Q, Xu, D, Navaie, K & Ding, Z 2023, 'Covert and Secure Communications in NOMA Networks with Internal Eavesdropping', IEEE Wireless Communications Letters, vol. 12, no. 12, 12, pp. 2178-2182. https://doi.org/10.1109/lwc.2023.3312689

APA

Li, Q., Xu, D., Navaie, K., & Ding, Z. (2023). Covert and Secure Communications in NOMA Networks with Internal Eavesdropping. IEEE Wireless Communications Letters, 12(12), 2178-2182. Article 12. https://doi.org/10.1109/lwc.2023.3312689

Vancouver

Li Q, Xu D, Navaie K, Ding Z. Covert and Secure Communications in NOMA Networks with Internal Eavesdropping. IEEE Wireless Communications Letters. 2023 Dec 1;12(12):2178-2182. 12. Epub 2023 Sept 7. doi: 10.1109/lwc.2023.3312689

Author

Li, Qiang ; Xu, Dongyang ; Navaie, Keivan et al. / Covert and Secure Communications in NOMA Networks with Internal Eavesdropping. In: IEEE Wireless Communications Letters. 2023 ; Vol. 12, No. 12. pp. 2178-2182.

Bibtex

@article{5ae1e57a5f284eeaad900ff5aa23da29,
title = "Covert and Secure Communications in NOMA Networks with Internal Eavesdropping",
abstract = "This letter proposes a joint covert and secure transmission scheme in the non-orthogonal multiple access (NOMA) networks against internal eavesdropping and external monitoring. In the network, the strong user wiretaps the signals of the weak user while an external warden monitors the communication behaviors of the strong user. To address the issue, a random artificial noise (AN) based beamforming is adopted, which not only reduces the eavesdropping rate of the strong user but also confuses the warden. We consider the worst case, where the warden can minimize the detection error probability (DEP) by optimizing its detection threshold. Further, we characterize the closed-form expressions of the average minimum DEP of the warden, the connection outage probabilities of the NOMA users and the secrecy outage probability of the weak user under the imperfect successive interference cancellation (SIC). To improve the performance, an effective covert rate maximization problem is formulated, under the constraints of the covertness, reliability and secrecy, which is analytically solved. Numerical results validate the superiority of the proposed scheme.",
keywords = "Electrical and Electronic Engineering, Control and Systems Engineering",
author = "Qiang Li and Dongyang Xu and Keivan Navaie and Zhiguo Ding",
year = "2023",
month = dec,
day = "1",
doi = "10.1109/lwc.2023.3312689",
language = "English",
volume = "12",
pages = "2178--2182",
journal = "IEEE Wireless Communications Letters",
issn = "2162-2337",
publisher = "IEEE Communications Society",
number = "12",

}

RIS

TY - JOUR

T1 - Covert and Secure Communications in NOMA Networks with Internal Eavesdropping

AU - Li, Qiang

AU - Xu, Dongyang

AU - Navaie, Keivan

AU - Ding, Zhiguo

PY - 2023/12/1

Y1 - 2023/12/1

N2 - This letter proposes a joint covert and secure transmission scheme in the non-orthogonal multiple access (NOMA) networks against internal eavesdropping and external monitoring. In the network, the strong user wiretaps the signals of the weak user while an external warden monitors the communication behaviors of the strong user. To address the issue, a random artificial noise (AN) based beamforming is adopted, which not only reduces the eavesdropping rate of the strong user but also confuses the warden. We consider the worst case, where the warden can minimize the detection error probability (DEP) by optimizing its detection threshold. Further, we characterize the closed-form expressions of the average minimum DEP of the warden, the connection outage probabilities of the NOMA users and the secrecy outage probability of the weak user under the imperfect successive interference cancellation (SIC). To improve the performance, an effective covert rate maximization problem is formulated, under the constraints of the covertness, reliability and secrecy, which is analytically solved. Numerical results validate the superiority of the proposed scheme.

AB - This letter proposes a joint covert and secure transmission scheme in the non-orthogonal multiple access (NOMA) networks against internal eavesdropping and external monitoring. In the network, the strong user wiretaps the signals of the weak user while an external warden monitors the communication behaviors of the strong user. To address the issue, a random artificial noise (AN) based beamforming is adopted, which not only reduces the eavesdropping rate of the strong user but also confuses the warden. We consider the worst case, where the warden can minimize the detection error probability (DEP) by optimizing its detection threshold. Further, we characterize the closed-form expressions of the average minimum DEP of the warden, the connection outage probabilities of the NOMA users and the secrecy outage probability of the weak user under the imperfect successive interference cancellation (SIC). To improve the performance, an effective covert rate maximization problem is formulated, under the constraints of the covertness, reliability and secrecy, which is analytically solved. Numerical results validate the superiority of the proposed scheme.

KW - Electrical and Electronic Engineering

KW - Control and Systems Engineering

U2 - 10.1109/lwc.2023.3312689

DO - 10.1109/lwc.2023.3312689

M3 - Journal article

VL - 12

SP - 2178

EP - 2182

JO - IEEE Wireless Communications Letters

JF - IEEE Wireless Communications Letters

SN - 2162-2337

IS - 12

M1 - 12

ER -