Covert and Secure Communications in NOMA Networks With Internal Eavesdropping

Qiang Li, Dongyang Xu, Keivan Navaie, Zhiguo Ding

Research output: Contribution to journalArticlepeer-review

13 Scopus citations

Abstract

This letter proposes a joint covert and secure transmission scheme in the non-orthogonal multiple access (NOMA) networks against internal eavesdropping and external monitoring. In the network, the strong user wiretaps the signals of the weak user while an external warden monitors the communication behaviors of the strong user. To address the issue, a random artificial noise (AN) based beamforming is adopted, which not only reduces the eavesdropping rate of the strong user but also confuses the warden. We consider the worst case, where the warden can minimize the detection error probability (DEP) by optimizing its detection threshold. Further, we characterize the closed-form expressions of the average minimum DEP of the warden, the connection outage probabilities of the NOMA users and the secrecy outage probability of the weak user under the imperfect successive interference cancellation (SIC). To improve the performance, an effective covert rate maximization problem is formulated, under the constraints of the covertness, reliability and secrecy, which is analytically solved. Numerical results validate the superiority of the proposed scheme. © 2012 IEEE.
Original languageAmerican English
Pages (from-to)2178-2182
Number of pages5
JournalIEEE Wireless Communications Letters
Volume12
Issue number12
DOIs
StatePublished - 2023

Keywords

  • Array processing
  • Beamforming
  • Security systems
  • Signal interference
  • Transmissions
  • Array signal processing
  • Covert communications
  • Eavesdropping
  • Interference cancellation
  • Internal eavesdropping
  • Multiple access
  • Non-orthogonal
  • Non-orthogonal multiple access
  • Resource management
  • Signal to noise ratio

Fingerprint

Dive into the research topics of 'Covert and Secure Communications in NOMA Networks With Internal Eavesdropping'. Together they form a unique fingerprint.

Cite this