Decoding Orders for Securing Untrusted NOMA
نویسندگان
چکیده
This letter focuses on exploring a new decoding order to resolve the secrecy issue among untrusted non-orthogonal multiple access users. In this context, firstly, we identify total number of possible orders analytically. Then, propose strategy ensuring positive rate for all users, and obtain feasible secure based proposed numerically. Thereafter, present suboptimal policy avoid computational complexity involved in finding best order. Numerical results illustrate that solution provides performance gain about 137% over relevant benchmark.
منابع مشابه
SiRiUS: Securing Remote Untrusted Storage
This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing. Key management and revocation is simple with minimal out-of-band communication. File system fres...
متن کاملSecret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks
This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has be...
متن کاملLEVEEFS : Securing Access to Untrusted Filesystems in Enclaved Execution
Enclaved execution techniques like Intel SGX guarantee secure execution of applications in presence of a compromised operating system. However, these techniques still rely on the underlying OS for services such as filesystem management. In this paper, we present attacks called syscall-abuse attacks on applications such as OpenSSL and ClamAV in presence of a compromised filesystem management ser...
متن کاملOn the (Im)Practicality of Securing Untrusted Computing Clouds with Cryptography
In a recent interview, Whitfield Diffie argued that “the whole point of cloud computing is economy” and while it is possible in principle for “computation to be done on encrypted data, [...] current techniques would more than undo the economy gained by the outsourcing and show little sign of becoming practical”. In this paper we aim to understand whether this is truly the case and quantify just...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE networking letters
سال: 2021
ISSN: ['2576-3156']
DOI: https://doi.org/10.1109/lnet.2021.3051757