Decoding Orders for Securing Untrusted NOMA

نویسندگان

چکیده

This letter focuses on exploring a new decoding order to resolve the secrecy issue among untrusted non-orthogonal multiple access users. In this context, firstly, we identify total number of possible orders analytically. Then, propose strategy ensuring positive rate for all users, and obtain feasible secure based proposed numerically. Thereafter, present suboptimal policy avoid computational complexity involved in finding best order. Numerical results illustrate that solution provides performance gain about 137% over relevant benchmark.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SiRiUS: Securing Remote Untrusted Storage

This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing. Key management and revocation is simple with minimal out-of-band communication. File system fres...

متن کامل

Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has be...

متن کامل

LEVEEFS : Securing Access to Untrusted Filesystems in Enclaved Execution

Enclaved execution techniques like Intel SGX guarantee secure execution of applications in presence of a compromised operating system. However, these techniques still rely on the underlying OS for services such as filesystem management. In this paper, we present attacks called syscall-abuse attacks on applications such as OpenSSL and ClamAV in presence of a compromised filesystem management ser...

متن کامل

On the (Im)Practicality of Securing Untrusted Computing Clouds with Cryptography

In a recent interview, Whitfield Diffie argued that “the whole point of cloud computing is economy” and while it is possible in principle for “computation to be done on encrypted data, [...] current techniques would more than undo the economy gained by the outsourcing and show little sign of becoming practical”. In this paper we aim to understand whether this is truly the case and quantify just...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE networking letters

سال: 2021

ISSN: ['2576-3156']

DOI: https://doi.org/10.1109/lnet.2021.3051757