Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/878
Full metadata record
DC FieldValueLanguage
dc.rights.licenseAll Open Access, Green-
dc.contributor.authorThapar S.en_US
dc.contributor.authorMishra D.en_US
dc.contributor.authorSaini R.en_US
dc.date.accessioned2023-11-30T08:54:57Z-
dc.date.available2023-11-30T08:54:57Z-
dc.date.issued2023-
dc.identifier.issn1551-3203-
dc.identifier.otherEID(2-s2.0-85153383700)-
dc.identifier.urihttps://dx.doi.org/10.1109/TII.2023.3263276-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/878-
dc.description.abstractThe security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a non-orthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing the resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation (SIC), we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate an interesting observation that the conventional decoding order and assigning more power allocation to the weak device, as presumed in many works on NOMA, is not an optimal strategy from the secrecy fairness viewpoint. Also, the average percentage gain of about <inline-formula><tex-math notation="LaTeX">$22.75\%$</tex-math></inline-formula>, <inline-formula><tex-math notation="LaTeX">$50.58\%$</tex-math></inline-formula>, <inline-formula><tex-math notation="LaTeX">$94.59\%$</tex-math></inline-formula>, and <inline-formula><tex-math notation="LaTeX">$98.16\%$</tex-math></inline-formula>, respectively, is achieved by jointly optimized solution over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation). IEEEen_US
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.sourceIEEE Transactions on Industrial Informaticsen_US
dc.subjectDecodingen_US
dc.subjectimperfect SICen_US
dc.subjectIndustrial Internet of Thingsen_US
dc.subjectJammingen_US
dc.subjectjoint optimizationen_US
dc.subjectNOMAen_US
dc.subjectNon-orthogonal multiple accessen_US
dc.subjectPerformance evaluationen_US
dc.subjectphysical layer securityen_US
dc.subjectResource managementen_US
dc.subjectsecrecy fairnessen_US
dc.subjectWireless communicationen_US
dc.titleSecure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devicesen_US
dc.typeJournal Articleen_US
Appears in Collections:Journal Article

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.