Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users

Hela Chamkhia, Abdullah Al-Ali, Amr Mohamed, Mohsen Guizani, Aiman Erbad, Ahmed Refaey

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal Multiple Access (NOMA) technique, where users can access other users' data. In fact, in NOMA-based IoT systems, communication is not only threatened by external eavesdroppers, but also by untrusted internal users. Therefore, it is necessary to adopt an encryption technique that guarantees IoT system communications. This paper presents a comparative study of secret key generation, where performance analysis of secure NOMA-enabled IoT network in the presence of untrusted users is detailed using different PLS key generation schemes.

Original languageEnglish
Title of host publication7th IEEE World Forum on Internet of Things, WF-IoT 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages633-638
Number of pages6
ISBN (Electronic)9781665444316
DOIs
Publication statusPublished - 14 Jun 2021
Event7th IEEE World Forum on Internet of Things, WF-IoT 2021 - New Orleans, United States
Duration: 14 Jun 202131 Jul 2021

Publication series

Name7th IEEE World Forum on Internet of Things, WF-IoT 2021

Conference

Conference7th IEEE World Forum on Internet of Things, WF-IoT 2021
Country/TerritoryUnited States
CityNew Orleans
Period14/06/2131/07/21

Keywords

  • Channel-based Key Generation
  • Internet of Things
  • Lightweight Communication
  • NOMA
  • Physical layer Security.

Fingerprint

Dive into the research topics of 'Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users'. Together they form a unique fingerprint.

Cite this