Abstract

Existing Physical Layer Security (PLS) schemes for NOMA are either based on cryptography-based approaches or are limited to approaches that require high processing complexity and key sharing. The conventional NOMA system suffers from security risks and weaknesses, such as being prone to external or internal eavesdropping. By sending NOMA messages to multiple users at the same time on the same resources, there is a risk that an unauthorized user could eavesdrop on or access multiple users' information if the NOMA transmission is successfully intercepted. The NOMA system is susceptible to internal interception when protecting confidential data in cases where untrusted users are present. Therefore, traditional methods of data exchange cannot provide the required level of secrecy for NOMA systems. The results. The work uses non-orthogonal access (NOMA) technology and security assessment of various wireless communication systems using NOMA, such as cognitive radio networks, systems with support for relaying the IoT mode, as well as the D2D mode. The results of the analysis of security characteristics and operation of the NOMA system in different modes are presented.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call