Home > Research > Publications & Outputs > Secure Transmission Design for Cooperative NOMA...

Electronic data

  • final version

    Rights statement: ©2022 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 232 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping

Research output: Contribution to Journal/MagazineLetterpeer-review

Published

Standard

Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping. / Su, Binbin; Yu, Wenjuan; Liu, Hongbo et al.
In: IEEE Wireless Communications Letters, Vol. 11, No. 5, 31.05.2022, p. 878-882.

Research output: Contribution to Journal/MagazineLetterpeer-review

Harvard

Su, B, Yu, W, Liu, H, Chorti, A & Poor, HV 2022, 'Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping', IEEE Wireless Communications Letters, vol. 11, no. 5, pp. 878-882. https://doi.org/10.1109/lwc.2021.3098935

APA

Su, B., Yu, W., Liu, H., Chorti, A., & Poor, H. V. (2022). Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping. IEEE Wireless Communications Letters, 11(5), 878-882. https://doi.org/10.1109/lwc.2021.3098935

Vancouver

Su B, Yu W, Liu H, Chorti A, Poor HV. Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping. IEEE Wireless Communications Letters. 2022 May 31;11(5):878-882. Epub 2022 Feb 25. doi: 10.1109/lwc.2021.3098935

Author

Su, Binbin ; Yu, Wenjuan ; Liu, Hongbo et al. / Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping. In: IEEE Wireless Communications Letters. 2022 ; Vol. 11, No. 5. pp. 878-882.

Bibtex

@article{213e9254d32b4df083768909f1750394,
title = "Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping",
abstract = "The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers. To address this potential security and reliability flaw, by assuming all users are untrusted, this letter investigates the effective secrecy throughput (EST) for a cooperative NOMA system, where a near user serves as an amplify-and-forward relay to help forward the information of a far user. Considering the inverse power allocation and SIC decoding order, a novel jamming strategy is proposed to enhance the security performance of the far user. Gauss-Chebyshev approximations of ESTs over Nakagami- m channels are derived. Asymptotic EST expressions are proposed to provide further insights. Numerical results demonstrate that the proposed jamming strategy and the inverse power allocation and SIC decoding order are both essential for achieving positive secrecy rates for both users.",
author = "Binbin Su and Wenjuan Yu and Hongbo Liu and Arsenia Chorti and Poor, {H. Vincent}",
note = "{\textcopyright}2022 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.",
year = "2022",
month = may,
day = "31",
doi = "10.1109/lwc.2021.3098935",
language = "English",
volume = "11",
pages = "878--882",
journal = "IEEE Wireless Communications Letters",
issn = "2162-2337",
publisher = "IEEE Communications Society",
number = "5",

}

RIS

TY - JOUR

T1 - Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping

AU - Su, Binbin

AU - Yu, Wenjuan

AU - Liu, Hongbo

AU - Chorti, Arsenia

AU - Poor, H. Vincent

N1 - ©2022 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PY - 2022/5/31

Y1 - 2022/5/31

N2 - The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers. To address this potential security and reliability flaw, by assuming all users are untrusted, this letter investigates the effective secrecy throughput (EST) for a cooperative NOMA system, where a near user serves as an amplify-and-forward relay to help forward the information of a far user. Considering the inverse power allocation and SIC decoding order, a novel jamming strategy is proposed to enhance the security performance of the far user. Gauss-Chebyshev approximations of ESTs over Nakagami- m channels are derived. Asymptotic EST expressions are proposed to provide further insights. Numerical results demonstrate that the proposed jamming strategy and the inverse power allocation and SIC decoding order are both essential for achieving positive secrecy rates for both users.

AB - The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers. To address this potential security and reliability flaw, by assuming all users are untrusted, this letter investigates the effective secrecy throughput (EST) for a cooperative NOMA system, where a near user serves as an amplify-and-forward relay to help forward the information of a far user. Considering the inverse power allocation and SIC decoding order, a novel jamming strategy is proposed to enhance the security performance of the far user. Gauss-Chebyshev approximations of ESTs over Nakagami- m channels are derived. Asymptotic EST expressions are proposed to provide further insights. Numerical results demonstrate that the proposed jamming strategy and the inverse power allocation and SIC decoding order are both essential for achieving positive secrecy rates for both users.

U2 - 10.1109/lwc.2021.3098935

DO - 10.1109/lwc.2021.3098935

M3 - Letter

VL - 11

SP - 878

EP - 882

JO - IEEE Wireless Communications Letters

JF - IEEE Wireless Communications Letters

SN - 2162-2337

IS - 5

ER -