Physical Layer Security for NOMA Systems: Requirements, Issues, and Recommendations
نویسندگان
چکیده
Non-orthogonal multiple access (NOMA) has been viewed as a potential candidate for the upcoming generation of wireless communication systems. Comparing to traditional orthogonal (OMA), multiplexing users in same time-frequency resource block can increase number served and improve efficiency systems terms spectral efficiency. Nevertheless, from security view-point, when are utilizing resource, there may be concerns regarding keeping information confidential. In this context, physical layer (PLS) introduced supplement protection conventional encryption techniques by making use random nature transmission media ensuring secrecy. The recent years have seen significant interests PLS being applied NOMA networks. Numerous scenarios investigated assess systems, including active passive eavesdroppers present, well these combined with relay reconfigurable intelligent surfaces (RIS). Additionally, ambient backscatter (AmB)-NOMA other issues that lately drawn lot attention. paper, thorough analysis PLS-assisted research state-of-the-art is presented. regard, we begin outlining foundations PLS, respectively. Following that, discuss performances four categories depending on type eavesdropper, existence relay, RIS, AmB different conditions. Finally, explanation most given.
منابع مشابه
Physical Layer Security Issues
Conventional wired networks are subject to being tapped by a variety of means, whether copper or fiber connections are used. In addition, methods of network snooping exist that make such eavesdropping minimally invasive, but no less significant. Wireless networking has additional characteristics that also decrease physical network security. As new technologies emerge, the potential for loss of ...
متن کاملUplink NOMA in Large-Scale Systems: Coverage and Physical Layer Security
In this paper, the physical layer security of uplink non-orthogonal multiple access (NOMA) in large-scale networks is analyzed. An stochastic geometry approach is applied to derive new analytical expressions for the coverage probability and the effective secrecy throughput (EST) of the kth NOMA user, which may use a fixed or an adaptive transmission rate. We consider a protected zone around the...
متن کاملIntelligent Vehicle Highway Systems (Ivhs) Issues and Recommendations
Intelligent Vehicle Highway Systems (IVHS) is the integration of various pieces of information and computer technologies to the transportation elements in order to obtain a more productive transportation system. The five major components of IVHS are the Advanced Traffic Management Systems (ATMS), Advanced Vehicle Control Systems (AVCS), and Advanced Public Transportation systems (APTS). This pa...
متن کاملSecurity Issues and Requirements for Internet-Scale Publish-Subscribe Systems
Publish-subscribe is a communication paradigm that supports dynamic, many-to-many communications in a distributed environment. Content-based pub-sub systems are often implemented on a peer-to-peer infrastructure that enables information dissemination from information producers (publishers) to consumers (subscribers) through a subscription mechanism. In a wide-area pubsub network, the pub-sub se...
متن کاملSecurity for Mobile Agents: Issues and Requirements
Mobile agents are processes which can autonomously migrate to new hosts. Despite its many practical bene ts, mobile agent technology results in signi cant new security threats frommalicious agents and hosts. The primary added complication is that, as an agent traverses multiple hosts that are trusted to di erent degrees, its state can change in ways that adversely impact its functionality. In t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2023
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2023.3296319