Security Performance Analysis of a Health System using Hybrid NOMA-OMA based IoT System

H. Chamkhia, A. Erbad, A. Al-Ali, Amr Mohamed, A. Refaey, M. Guizani
{"title":"Security Performance Analysis of a Health System using Hybrid NOMA-OMA based IoT System","authors":"H. Chamkhia, A. Erbad, A. Al-Ali, Amr Mohamed, A. Refaey, M. Guizani","doi":"10.1109/GCWkshps52748.2021.9682100","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) systems have been playing a significant role in improving the quality of various applications and services. With the expansion increase of loT devices and users, different Multiple Access (MA) techniques have been proposed to overcome the spectrum scarcity and the high latency. However, in MA-based loT systems, communication is not only threatened by external eavesdroppers but also by untrusted internal users. Therefore, proposing secured MA-based loT systems is of high importance. This paper proposes a hybrid Non Orthogonal Multiple Access (NOMA) I Orthogonal Multiple Access (OMA)-based loT system to improve the data transmission security. The proposed scheme exploits the advantages of the two different MA techniques as well as the Physical Layer Security (PLS). We first describe the system model and then we detail the proposed scheme and the relevant performance analysis. Finally, our simulation results verify the accuracy of the derived expressions and evaluate the advantage of the proposed scheme, when compared to the pure NOMA and pure OMA-based loT systems.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCWkshps52748.2021.9682100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Internet of Things (IoT) systems have been playing a significant role in improving the quality of various applications and services. With the expansion increase of loT devices and users, different Multiple Access (MA) techniques have been proposed to overcome the spectrum scarcity and the high latency. However, in MA-based loT systems, communication is not only threatened by external eavesdroppers but also by untrusted internal users. Therefore, proposing secured MA-based loT systems is of high importance. This paper proposes a hybrid Non Orthogonal Multiple Access (NOMA) I Orthogonal Multiple Access (OMA)-based loT system to improve the data transmission security. The proposed scheme exploits the advantages of the two different MA techniques as well as the Physical Layer Security (PLS). We first describe the system model and then we detail the proposed scheme and the relevant performance analysis. Finally, our simulation results verify the accuracy of the derived expressions and evaluate the advantage of the proposed scheme, when compared to the pure NOMA and pure OMA-based loT systems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于混合NOMA-OMA物联网系统的卫生系统安全性能分析
物联网(IoT)系统在提高各种应用和服务质量方面发挥着重要作用。随着loT设备和用户的不断增加,人们提出了不同的多址(MA)技术来克服频谱的稀缺性和高时延。然而,在基于ma的loT系统中,通信不仅会受到外部窃听者的威胁,还会受到不可信的内部用户的威胁。因此,提出安全的基于ma的loT系统是非常重要的。为了提高数据传输的安全性,本文提出了一种基于非正交多址(NOMA)和正交多址(OMA)的混合loT系统。该方案利用了两种不同MA技术的优点以及物理层安全性(PLS)。本文首先描述了系统模型,然后详细介绍了所提出的方案和相关的性能分析。最后,我们的仿真结果验证了推导表达式的准确性,并与纯NOMA和纯基于oma的loT系统相比,评估了所提方案的优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Blockchain-based Approach for Optimal Energy Dispatch and Fault Reporting in P2P Microgrid Joint Beamforming and BS Selection for Energy-Efficient Communications via Aerial-RIS Security and privacy issues of data-over-sound technologies used in IoT healthcare devices Joint Deployment Design and Power Control for UAV-enabled Covert Communications Leveraging Machine Learning and SDN-Fog Infrastructure to Mitigate Flood Attacks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1