Physical layer security for confidential transmissions in frequency hopping-based downlink NOMA networks

IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Amani Benamor , Oussama Habachi , Jean-Pierre Cances , Vahid Meghdadi
{"title":"Physical layer security for confidential transmissions in frequency hopping-based downlink NOMA networks","authors":"Amani Benamor ,&nbsp;Oussama Habachi ,&nbsp;Jean-Pierre Cances ,&nbsp;Vahid Meghdadi","doi":"10.1016/j.comnet.2024.110821","DOIUrl":null,"url":null,"abstract":"<div><div>Facing the exponential number of Internet of Things (IoT) devices and the scarcity of available resources, next-generation wireless networks have to meet very challenging performance targets in terms of providing massive access and ensuring higher spectral efficiency. In this vein, Non-Orthogonal Multiple Access (NOMA) has been widely recognized as one of the advantageous techniques to handle the proliferation of the IoT. Nevertheless, from a security standpoint, enabling a user to decode the signals of the other users, while using Successive Interference Cancellation (SIC), raises serious concerns regarding confidentiality and vulnerability to malicious attacks. Meanwhile, conventional security paradigms, such as upper-layer encryption and sophisticated authentication mechanisms, require high computational complexity and additional processing, which impose an overwhelming burden on energy-efficient IoT devices. Alternatively, Physical layer Security (PLS) has sparked a significant interest as a promising complement to cryptographic techniques. The key idea of PLS is to avail wireless communication properties to secure communications without adding complex encryption mechanisms at higher layers. In this paper, we propose a PLS approach based on a network coding technique to prevent eavesdroppers from decoding users’ information transmitted through a downlink-based NOMA system. This results in correlating the packets to be transmitted with each other, making the interception of a single packet useless. We demonstrate that the eavesdropper’s decoding complexity increases exponentially with the sequence length, making the task intractable for relatively long ones.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128624006534","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

Facing the exponential number of Internet of Things (IoT) devices and the scarcity of available resources, next-generation wireless networks have to meet very challenging performance targets in terms of providing massive access and ensuring higher spectral efficiency. In this vein, Non-Orthogonal Multiple Access (NOMA) has been widely recognized as one of the advantageous techniques to handle the proliferation of the IoT. Nevertheless, from a security standpoint, enabling a user to decode the signals of the other users, while using Successive Interference Cancellation (SIC), raises serious concerns regarding confidentiality and vulnerability to malicious attacks. Meanwhile, conventional security paradigms, such as upper-layer encryption and sophisticated authentication mechanisms, require high computational complexity and additional processing, which impose an overwhelming burden on energy-efficient IoT devices. Alternatively, Physical layer Security (PLS) has sparked a significant interest as a promising complement to cryptographic techniques. The key idea of PLS is to avail wireless communication properties to secure communications without adding complex encryption mechanisms at higher layers. In this paper, we propose a PLS approach based on a network coding technique to prevent eavesdroppers from decoding users’ information transmitted through a downlink-based NOMA system. This results in correlating the packets to be transmitted with each other, making the interception of a single packet useless. We demonstrate that the eavesdropper’s decoding complexity increases exponentially with the sequence length, making the task intractable for relatively long ones.
基于跳频的下行链路 NOMA 网络中保密传输的物理层安全性
面对物联网(IoT)设备的指数级增长和可用资源的稀缺,下一代无线网络必须在提供大规模接入和确保更高的频谱效率方面达到极具挑战性的性能目标。因此,非正交多址接入(NOMA)被广泛认为是应对物联网激增的有利技术之一。然而,从安全角度来看,在使用连续干扰消除(SIC)技术的同时,使用户能够解码其他用户的信号,会引发保密性和易受恶意攻击的严重问题。同时,传统的安全模式,如上层加密和复杂的认证机制,需要很高的计算复杂度和额外的处理,这给高能效物联网设备带来了沉重的负担。另外,物理层安全(PLS)作为加密技术的一种有前途的补充,也引发了人们的极大兴趣。物理层安全的主要理念是利用无线通信特性确保通信安全,而无需在更高层添加复杂的加密机制。在本文中,我们提出了一种基于网络编码技术的 PLS 方法,以防止窃听者破解通过基于下行链路的 NOMA 系统传输的用户信息。这样,要传输的数据包之间就会相互关联,从而使单个数据包的截获变得毫无用处。我们证明,窃听者的解码复杂度随序列长度呈指数级增长,因此对于相对较长的序列来说,这项任务是难以完成的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computer Networks
Computer Networks 工程技术-电信学
CiteScore
10.80
自引率
3.60%
发文量
434
审稿时长
8.6 months
期刊介绍: Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信