{"title":"Physical layer security for confidential transmissions in frequency hopping-based downlink NOMA networks","authors":"Amani Benamor , Oussama Habachi , Jean-Pierre Cances , Vahid Meghdadi","doi":"10.1016/j.comnet.2024.110821","DOIUrl":null,"url":null,"abstract":"<div><div>Facing the exponential number of Internet of Things (IoT) devices and the scarcity of available resources, next-generation wireless networks have to meet very challenging performance targets in terms of providing massive access and ensuring higher spectral efficiency. In this vein, Non-Orthogonal Multiple Access (NOMA) has been widely recognized as one of the advantageous techniques to handle the proliferation of the IoT. Nevertheless, from a security standpoint, enabling a user to decode the signals of the other users, while using Successive Interference Cancellation (SIC), raises serious concerns regarding confidentiality and vulnerability to malicious attacks. Meanwhile, conventional security paradigms, such as upper-layer encryption and sophisticated authentication mechanisms, require high computational complexity and additional processing, which impose an overwhelming burden on energy-efficient IoT devices. Alternatively, Physical layer Security (PLS) has sparked a significant interest as a promising complement to cryptographic techniques. The key idea of PLS is to avail wireless communication properties to secure communications without adding complex encryption mechanisms at higher layers. In this paper, we propose a PLS approach based on a network coding technique to prevent eavesdroppers from decoding users’ information transmitted through a downlink-based NOMA system. This results in correlating the packets to be transmitted with each other, making the interception of a single packet useless. We demonstrate that the eavesdropper’s decoding complexity increases exponentially with the sequence length, making the task intractable for relatively long ones.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128624006534","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Facing the exponential number of Internet of Things (IoT) devices and the scarcity of available resources, next-generation wireless networks have to meet very challenging performance targets in terms of providing massive access and ensuring higher spectral efficiency. In this vein, Non-Orthogonal Multiple Access (NOMA) has been widely recognized as one of the advantageous techniques to handle the proliferation of the IoT. Nevertheless, from a security standpoint, enabling a user to decode the signals of the other users, while using Successive Interference Cancellation (SIC), raises serious concerns regarding confidentiality and vulnerability to malicious attacks. Meanwhile, conventional security paradigms, such as upper-layer encryption and sophisticated authentication mechanisms, require high computational complexity and additional processing, which impose an overwhelming burden on energy-efficient IoT devices. Alternatively, Physical layer Security (PLS) has sparked a significant interest as a promising complement to cryptographic techniques. The key idea of PLS is to avail wireless communication properties to secure communications without adding complex encryption mechanisms at higher layers. In this paper, we propose a PLS approach based on a network coding technique to prevent eavesdroppers from decoding users’ information transmitted through a downlink-based NOMA system. This results in correlating the packets to be transmitted with each other, making the interception of a single packet useless. We demonstrate that the eavesdropper’s decoding complexity increases exponentially with the sequence length, making the task intractable for relatively long ones.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.