Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices
Abstract
The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a non-orthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing the resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation (SIC), we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate an interesting observation that the conventional decoding order and assigning more power allocation to the weak device, as presumed in many works on NOMA, is not an optimal strategy from the secrecy fairness viewpoint. Also, the average percentage gain of about , , , and , respectively, is achieved by jointly optimized solution over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation).
Index Terms Non-orthogonal multiple access, physical layer security, secrecy fairness, imperfect SIC, joint optimization.
I Introduction
The adoption of the Internet of Things (IoT) in the industrial domain, i.e., the industrial IoT (IIoT), is rapidly becoming essential in creating hyper-connected cyber-physical networks in several verticals such as electricity, transportation, automation, healthcare, and manufacturing [1], [2]. IIoT is a network of industrial devices connected to the Internet using state-of-the-art information and communications technologies to create a system that can capture, analyze, monitor, and exchange real-time data. However, due to the constraints of the scarce spectrum, connecting billions of IIoT devices in a wireless network is a challenge. Also, due to the broadcast nature of wireless transmission, the security of confidential information associated with IIoT devices is a severe concern [3], [4].Consequently, there has been an increase in research interest in secure data transmission from academia and industry in various scenarios, including multiple input multiple output (MIMO), [5], non-orthogonal multiple access (NOMA) [6], intelligent reflecting surface [7], unmanned aerial vehicle assisted mobile edge computing networks [8], [9], etc.
As a favourable solution to realize massive connectivity over limited resources in IIoT, NOMA has recently drawn an increasing amount of research efforts [6]. It allows multiple devices to share the same resource block (i.e., same time, frequency, and code), alleviating the spectrum shortage problem. For information confidentiality in wireless transmissions, physical layer security (PLS) techniques are recently emerging as a promising solution. The basic concept of PLS is to exploit the randomness of wireless channels and interference to enhance the signal reception at legitimate devices while reducing the signal reception at eavesdropping devices [10], [11]. Thus, by incorporating NOMA and PLS, a spectrally-efficient and secure wireless communication network can be envisioned for IIoT.
I-A Related Works
Recently, many works have utilized NOMA to ensure massive connectivity requirements in different scenarios for IIoT [12], [13], [14]. However, because of the broadcast nature of the wireless transmission channel, potential adversaries can cause a security risk to communication in NOMA-enabled IIoT networks. Many existing works have considered PLS techniques to protect NOMA networks in different scenarios. For example, in [15], the authors optimized the resource allocation in terms of decoding order, power allocation, and data rate to protect the information associated with the intended device. In [16], the authors derived the optimal power allocation to maximize the achievable secrecy sum rate at devices for a single-input single-output NOMA network. In [17], a novel beamforming scheme that exploits artificial noise to improve the secrecy performance at devices in a multiple-input single-output network was proposed. In [18], a NOMA-assisted secure computation offloading was investigated under an eavesdropping attack, where a wireless user is paired with an edge-computing user to provide cooperative jamming to the eavesdropper while gaining the opportunity to transmit its data. In addition to eavesdropping, other attack modes like jamming were investigated in [19], where intelligent learning-based algorithms, such as Q-learning algorithms, were used to counter the intelligent attackers. Also, in [20], an artificial noise-aided beamforming approach was proposed to achieve secure communication in a large-scale NOMA network with randomly dispersed devices.
The studies cited above [15]-[20] were limited to the security issue of multiplexed NOMA devices against external eavesdropping devices. However, the multiplexed devices sharing the same resource block also can be potential eavesdroppers intercepting the confidential information of each other [21], [22]. Therefore, we should consider an antagonistic network in which each device is assumed to be untrusted. An untrusted scenario is a hostile but realistic situation in which no device trusts others and wants to safeguard its own confidential information. As a result, it becomes essential to allocate resources in the network in such a way that the secrecy of each device is ensured against the other multiplexed untrusted devices, which is a relatively more complex problem.
Assuming the strong device (with better channel gain) as trusted and the weak device (with poorer channel gain) as untrusted for a two-device NOMA network, the authors derived the secrecy outage probability (SOP) for the strong device in [21]. Similarly, [23] analyzed the sum secrecy rate of the strong devices against weak devices for a multiple-input single-output network. In [24], the SOP was investigated for the strong device against the untrusted weak device for a friendly jammer relay scenario. In contrast, [25] considered the strong device as untrusted, and analyzed the optimal power allocation for a secure NOMA network by adjusting the order of successive interference cancellation (SIC) and utilizing a cooperative jammer. Likewise, in [26], a directional demodulation based method was proposed to secure the data of the weak device against the strong device. Furthermore, to safeguard the data of each NOMA device from the other, the authors proposed a linear precoding approach in [27]. Similarly, to obtain a positive secrecy rate for each device against the other device in a two-device NOMA-enabled network, an optimal decoding order was explored in [22], and SOP and its optimization over power allocation were derived for each device. In [28], the ergodic secrecy rate performance was analyzed for each possible decoding order in an untrusted NOMA network, and then, the optimal decoding order was identified.
I-B Research Gap and Motivation
Notwithstanding the gainful results in handling secrecy issues among untrusted devices in NOMA-enabled networks, several works, e.g. [21], [23]-[27], over-optimistically considered that the devices could perform perfect SIC. According to this ideal setup, the interference from previously decoded devices is fully subtracted when the signal associated with the later devices is decoded. Thus, the decoded devices do not interfere with other devices. This strong assumption makes the system model simple and might not be realistic. In a practical scenario, the devices are resource-constrained to perform perfect SIC due to various practical implementation issues in IIoT networks, such as hardware limitation, inaccurate calibration, estimation error, multiple types of noise, and complexity scaling [29]. Consequently, imperfect SIC, where the residual interference (RI) from the formerly imperfectly decoded devices inevitably abides while decoding the signals of subsequent devices [29], should be taken at receivers while doing any investigation on NOMA.
In the literature of NOMA, some research works considered the RI as a particular constant value [30], [31], referred to as the Constant RI Model. In contrast, many other works took the RI as a linear function of the power assigned to the interfering signal [29], [32], referred to as the Linear RI Model. Nevertheless, there seem to be fewer studies that have considered the impact of RI while handling the secrecy issue in untrusted NOMA networks. The authors in [22] analyzed the secrecy performance of devices in an untrusted NOMA network with imperfect SIC but considered the constant RI model. However, the RI obtained from decoded devices may not be a constant value in practice. The constant RI is a strong and unrealistic assumption that over-simplifies the model and leads to prediction errors. In contrast, realistic influence of imperfect SIC may be observed with the linear RI model since decoders’ performance significantly depends on the interfering signal’s power. Motivated by this solid observation, in this work, we mainly focus on obtaining a secure NOMA-enabled IIoT network in the presence of untrusted devices, considering the effect of imperfect SIC at receivers with a linear RI model.
Note that [28] explored a secure NOMA network with a linear RI model, but the investigation was carried out for maximizing ergodic secrecy performance for each device. However, this article fills a significant gap in the literature by optimizing resources to maximize secrecy fairness among devices, which has not yet been studied in the literature. Note that fairness is an important performance metric in order to guarantee the achievable rates for weak devices, as considered in many works in the literature [22], [33]. It is because focusing exclusively on the sum rate may result in substantial rate loss for weak devices, as the system tends to allocate most of the communication resources to strong devices when the sum rate is maximized. The weak devices may even be unable to be served in some extreme cases. Thus, in this work, the fundamental basis for studying secrecy fairness is that weak devices may also obtain enough communication resources similar to strong devices so that there is no loss in the achievable secrecy rate performance for weak devices. Therefore, by following [22], [33], we in this work focus on maximizing secrecy fairness between devices, where we maximize the minimum secrecy rate between devices.
To optimize the network’s secrecy fairness performance, the decoding order and power allocation to the multiplexed devices are the two key parameters. In the literature, many research works are limited to the conventional decoding order of NOMA. However, we may change the decoding sequence for each device [22], [28], [34]. The fact is that SIC is a physical layer capability that allows receiving ends to extract the superimposed signal. Thus, any device can decode a signal of itself or others at any stage resulting in various decoding orders. Besides, most existing literature assumes that NOMA is based on more power allocation to the device with weaker channel conditions, which is not true [35]. Therefore, it would be interesting to investigate if the conventional approach of decoding order and power allocation is optimal from the secrecy fairness viewpoint. Encouraged by these substantial observations, in this work, we jointly optimize the resources, such as decoding order and power allocation, for maximizing the secrecy fairness between devices.
I-C Main Contributions
The key contributions of this paper are summarized below:
-
•
We focus on achieving a secure NOMA-enabled IIoT network in the presence of untrusted devices, considering the real effect of imperfect SIC with a linear RI model. In this respect, we first find out the feasible power allocation condition to obtain a positive secrecy rate for each device in all possible decoding orders. This way, we identify the feasible secure decoding orders that can provide a positive secrecy rate for each device.
-
•
We focus on optimizing the resources, such as secure decoding order and transmission power allocated to devices, from the perspective of secrecy fairness. Under the secrecy fairness criterion, we formulate and solve a joint optimization problem of maximizing the minimum secrecy rate between devices over a set of secure decoding orders and transmission power allocation. The formulated problem is combinatorial and non-convex. Therefore, we first find the optimal secure decoding order and then solve it over power allocation by obtaining candidates of optimal solution with Karush-Kuhn-Tucker (KKT) conditions. Thus, we provide the closed-form global-optimal solution to the formulated problem.
-
•
Lastly, we present numerical results to confirm the accuracy of the analysis, provide insightful discussion into the impact of network parameters on the optimal performance, and show the performance gains achieved by the optimal results over different benchmarks.
Notations: Bold uppercase and lowercase letters, respectively, are used to refer to matrices and column vectors. We denote the -th entries of matrix A by . The -th entry of vector a is indicated by .
II NOMA-enabled IIoT with Untrusted Devices
In this section, firstly, we describe the network model. Then, we explain the fundamental principle of NOMA transmission. Further, we discuss all possible decoding orders for a NOMA-enabled network in the presence of untrusted devices. Lastly, we present the mathematical definition of the achievable secrecy rate for a device against the other untrusted device.
II-A Network Model
We consider a NOMA-enabled IIoT network, where the base station communicates with two devices, as depicted in Fig. 1. In the network, both devices are assumed to be untrusted. The -th device of the network is symbolized by , where . All nodes in the network are assumed to have one antenna. All the channels from the base station to devices are assumed to be Rayleigh faded. The channel gain coefficient from the base station to is represented by . As a result, the channel power gain, denoted by , follows an exponential distribution having mean parameter , where indicates path loss constant, stands for the distance of from the base station, and refer to the path loss exponent. Without any loss of generality, we presume that the channel power gains are arranged as . Thus, based on the channel power gain conditions, and could be referred to as strong device and weak device, respectively. The transmission power broadcasted from the base station to both devices is denoted by . The fraction of transmission power allocated to is indicated by a power allocation coefficient , where . The remaining fraction is allocated to .
Remark 1
Asking all devices in the network to participate in NOMA jointly is not a good choice due to two reasons: first, sharing the same resource block among multiple devices in NOMA causes strong co-channel interference at receivers; and second, due to superposition coding and multiple SIC, long delays and high implementation complexity occur at both the transmitting and receiving ends with more devices. Therefore, the devices of the network are divided into multiple groups, where NOMA is implemented within each group [36], [37]. Please note that the grouping/pairing of two devices to perform NOMA has been extensively studied in the literature in order to maintain implementation complexity and system performance. Therefore, for the purpose of our analytical study, we consider two devices performing NOMA in one resource block, in our manuscript. However, it is possible to increase the number of devices in a group.

II-B NOMA Transmission Principle
The base station first superposes all the message signals dedicated for devices and then transmits the superposed signal to each device. Thus, the broadcasted signal from the base station to both devices can be expressed as
(1) |
where and , respectively, signify the message signals with unit power dedicated for and . Then, the received signal for , where , can be given as
(2) |
where represents the additive white Gaussian noise (AWGN) for . Without loss of generality, we assume that has a mean equal to zero and variance equal to .
After obtaining the superposed signal, receivers apply SIC to remove the inter-device interference imposed by the superposition and get the desired signal. During SIC, each device decodes its own and other devices’ signals in a particular sequence. The collection of these sequences abide by devices is referred to as a decoding order of the network. According to the conventional decoding order of NOMA, the strong device considers ’s signal as interference. Therefore, it decodes ’s signal at the first stage, applies SIC to cancel its interference, and then decodes its own signal at the second stage. Conversely, the weak device decodes its own signal at the first stage by considering the signal associated with as noise. Thus, a mutual trust is assumed between the devices that they will not intercept each other’s information.
II-C Decoding Orders in NOMA with Untrusted Devices
An IIoT network with untrusted devices is an antagonistic but realistic circumstance in which devices do not trust each other and always want to safeguard their data from other devices. Therefore, practically, we should consider the possibility that each device may attempt to decode the signal of itself or other device at any stage [22], [28], [34]. Thus, in a two-device network, each device has two stages of decoding the signal of itself and the other device. As a result, four decoding orders exist based on the concept of permutation. We depict the -th decoding order as a matrix of size . The -th column of matrix is expressed by a column vector , which shows the sequence of SIC followed by , where . Specifically, defines that signal of the device is decoded by the device at -th stage, where and . Thus, a decoding order of the network can be represented as . All decoding orders can be expressed as , , , and . We define the set of these four decoding orders as .
II-D Achievable Data Rates and Secrecy Rates at Devices
For a given decoding order , the data rate achieved at when is decoded by , for all combinations of with Shannon’s formula can be expressed as
(3) |
where denotes the received signal to interference plus noise ratio (SINR) at , when is decoded by , and it can be given as
(4) |
where is the base station transmit signal-to-noise ratio (SNR). The parameters and required to define for each combination of in all decoding orders are given in Table I. Note that in Table I indicates the SINR achieved by the legitimate device when decoding its own data, namely , resulting which we obtain using (3). In Table I, is the RI factor indicating the fraction of the residual error from the previous decoding stage, i.e., when imperfectly decodes , where and . Note that . Here and , respectively, indicates perfect SIC and absolutely imperfect SIC [29], [32].
Next, in order to ensure secure communication, we utilize the concept of PLS. According to PLS, the secrecy rate of a legitimate device can be measured by the difference between the rate achieved at the legitimate device when decoding its own data and the rate achieved at another device when decoding the data of the legitimate device. Accordingly, the secrecy rate for against , where can be expressed as [10], [11]
(5) |
where and . To get a positive secrecy rate for a device, the rate of the main communication link must be greater than the rate of the eavesdropper’s link, i.e., for obtaining , the condition , simplified to using (3), needs to be satisfied. indicates that negative secrecy rates are considered to be zero.
1 | 1 | , | ||
, | ||||
2 | , | |||
, | ||||
2 | 1 | , | ||
, | ||||
2 | , | |||
, |
III Secure Decoding Orders
As mentioned in Section II-C, four decoding orders are possible in the case of NOMA with two untrusted devices. Our motive is to protect each device’s data from another device. Therefore, this section investigates which decoding orders are feasible in ensuring a positive secrecy rate for each device.
III-A Infeasibility of Conventional Decoding Order
With the conventional decoding order in untrusted environment, a weak device may try to decode the signal of after cancelling the signal of itself through SIC [21]. Thus, the decoding order can be written as . Below in Proposition 1, we first prove that is not efficient to achieve a secure NOMA network.
Proposition 1
With decoding order , the data of the strong device can be secured from the weak device with a constraint on power allocation, while the data of the weak device is not secured against the strong device.
Proof:
For , the achievable SINRs , when decodes the signal of , where , with linear RI model, can be given as per Table I as and . To get positive secrecy rate for , we solve the required condition as explained in Section II-D and get a feasible condition on as
(6) |
Note that gives , and hence, infeasible. As a result, a positive secrecy rate can be obtained for strong device against with a constraint on power allocation as
(7) |
On the other hand, the condition to get positive secrecy rate for gives , which is infeasible since we assume that (Refer Section II-A). Hence, we cannot obtain a positive secrecy rate for . ∎
Thus, it can be concluded that is not a feasible decoding order in achieving a positive secrecy rate to both devices.
III-B Feasibility Check for Other Possible Decoding Orders
Now we check the feasibility of decoding orders , , and , one by one, in achieving secure NOMA transmission.
III-B1 Feasibility Check for
A key result on the feasibility of is provided below in Proposition 2.
Proposition 2
The decoding order is feasible in achieving a secure NOMA communication in untrusted scenario as we can get a positive secrecy rate for both devices with a constraint on power allocation as
(8) |
Proof:
According to , each device first decodes the signal of other device, and then decodes its own signal after performing SIC. As a result, the received SINRs as per Table I are given as and The condition to obtain positive secrecy rate for leads to a feasible condition as
(9) |
Note that (Refer Section II-A) and (Refer Section II-D). Also, gives . Hence, the condition on power allocation to get a positive secrecy rate for the strong device will be .
Similarly, for gives a condition as
(10) |
Here also due to three conditions, i.e., (Refer Section II-A), (Refer Section II-D), and with , the feasible power allocation condition for will be .
From the analysis mentioned above, we see that a positive secrecy rate can be acquired for each device against the other device in an untrusted scenario if decoding orders is followed, with suitable power allocation constraints. Thus, jointly, the power allocation condition providing secrecy to both devices can be written as given in (8). ∎
Similar to the above analysis, we can check the feasibility of and in achieving a secure NOMA network.
III-B2 Feasibility Check of
Below a key result on feasibility of is provided in Proposition 3.
Proposition 3
Decoding order is infeasible for achieving secure NOMA communication among untrusted devices as only the data of strong device can be secured from the weak device with a constraint on power allocation as
(11) |
Proof:
The proof is given in Appendix A. ∎
III-B3 Feasibility Check for
Now we present a key result on the feasibility of via Proposition 4.
Proposition 4
The decoding order is a feasible secure decoding order because it is efficient in providing positive secrecy rate for both devices in an untrusted NOMA network with a constraint on power allocation as
(12) |
Proof:
The proof is provided in Appendix B. ∎
Remark 2
In the case of , there exists a special condition, i.e., when , then on solving , we find an infeasible condition, which shows that a positive secrecy rate cannot be acquired for the weak device. Thus, if , only then is a feasible decoding order for secure NOMA transmission.
Remark 3
From Propositions 1-4, we observe that a positive secrecy rate can be received for each device with a suitable constraint on power allocation in decoding orders and . Therefore, we refer to and as secure decoding orders. For further analysis, we define the set of these two secure decoding orders as .
IV Secrecy Fairness Maximization
In this section, we aim to optimize resources, such as decoding order and power allocation, from the perspective of secrecy fairness. A secrecy fairness viewpoint means that network resources should be allocated to devices in such a way that the secrecy rate performance of each device is ensured. Note that since NOMA primarily pairs or groups devices with significantly different channel gains, the fundamental basis for examining secrecy fairness is that weak devices can also obtain sufficient communication resources in the same manner as strong devices so no loss of secrecy rate performance occurs for weak devices. Under the secrecy fairness criterion, we focus on maximizing the minimum secrecy rate between devices. In this regard, we first formulate the optimization problem, then provide a solution methodology, followed by its closed-from optimal solution.
IV-A Problem Formulation
As we obtained in Section III that there are two secure decoding orders and that can ensure a positive secrecy rate for each device, we will optimize the decoding order over set of secure decoding orders (Refer Remark 3). Also, since and , is a function of both decoding order and , we formulate a joint optimization problem as maximizing the minimum secrecy rate between devices over a set of secure decoding orders and power allocation coefficient as
s.t. |
where refers to the constraint on power allocation coefficient (Refer Section II-A), and and denote the positive secrecy rate conditions for and , respectively.
IV-B Solution Methodology
We observe that is a combinatorial optimization problem because there are two secure decoding orders, and the secrecy rate depends on in each secure decoding order. Therefore, to reduce the computational complexity in determining the joint optimal solution of decoding order and power allocation, we solve the joint optimization problem in two steps as described below.
-
•
In the first step, ignoring the power allocation constraint, we optimize the decoding order over a set of secure decoding orders for maximizing the minimum secrecy rate between the devices. This way we find the optimal secure decoding order for maximizing the minimum secrecy rate between devices. (Refer Section IV-C1)
-
•
In the second step, to complete joint optimization, we obtain the optimal power allocation solution in closed form for only optimal secure decoding order obtained in the first step. (Refer Section IV-C2)
IV-C Solution of Joint Optimization Problem
IV-C1 Optimal Secure Decoding Order
Following the solution methodology’s first step, an investigation of optimal secure decoding order is presented through Lemma 1.
Lemma 1
The optimal secure decoding order that maximizes the minimum secrecy rate between devices is , where is the index of optimal secure decoding order.
Proof:
Here, considering the set of secure decoding orders, we compare secrecy rates obtained with decoding orders and . The secrecy rate is in the form of . In case of , for , and for . Coming to , we have for , and for . The other parameters are the same in both secure decoding orders. Here, in the case of secrecy rate for , is lower in than in since . Thus, ensures more secrecy rate for than . Similarly, we observe that in the case of , again ensures more secrecy rate for than since is higher in as compared to , since . Thus, since ensures more secrecy for each device than , it will be optimal for maximizing the minimum secrecy rate between devices. Hence, is an optimal secure decoding order for secrecy fairness maximization between devices. ∎
IV-C2 Optimal Power Allocation
We already have solved over the set of secure decoding orders by obtaining the optimal secure decoding order in Section IV-C1. Therefore, to complete the joint optimization, we can now solve over for only . In this regard, considering as the index of optimal secure decoding order, can be restated as
s.t. |
where and are positive secrecy rate conditions for and , respectively, in optimal secure decoding order .
Following Lemma 1, . Thus, can be restated as
s.t. |
where refers to the constraint on power allocation coefficient , which is obtained in (8) by solving , , and for (Refer Proposition 2 in Section III-B1).
Further, using , can be written as
s.t. |
where and comes from the definition of .
Note that is a non-convex problem because of the presence of non-convex constraints and . That is why finding the optimal solution of power allocation is challenging. Therefore, we solve the optimization problem by obtaining all possible optimal points with KKT conditions, which are the candidates for the global-optimal solution [38]. After obtaining candidate optimal points, we can select the global-optimal solution as the feasible optimal point that maximizes the minimum secrecy rate between devices. The global-optimal power allocation solution of is given by Lemma 2.
Lemma 2
The global-optimal power allocation solution, denoted by , of , is the feasible candidate from the obtained candidates that maximizes the minimum secrecy rate between devices and can be given as
(13) |
where are the candidate optimal points and each of them is obtained in the closed-form as described in the proof.
Proof:
To solve , we keep the boundary constraint on power allocation coefficient, i.e., , implicit and connect Lagrange multipliers with and with . Thus, we can define the Lagrangian function as
(14) |
There are 4 KKT conditions. The primal feasibility conditions are given by and . The dual feasibility conditions are and . The subgradient conditions are given as
(15a) | ||||
(15b) |
The two complementary slackness conditions are expressed as
(16a) | |||
(16b) |
Each of the Lagrange multipliers, i.e., and , could be either equal to or greater than zero. Thus, 4 cases exist, which are discussed in the following.
Case 1: , : This implies . However, as given in (15a), . Thus, this is an infeasible case.
Case 2: , : This case, using (15b), implies . On solving , we obtain a quadratic equation solving which on , we get two roots, denoted by and , as given in (17) on the top of next page. We observe that is infeasible. The reason is that for , the required condition is , which is true since and . As a result, is negative, which is infeasible. Therefore, we consider the root as the candidate for the optimal power allocation solution.
(17) |
Case 3: , : In the third case, using (15b), is obtained. Similar to the case 2, here also leads to a quadratic equation in terms of which gives two roots and , as given in (18) on the next page. These roots also are the candidates for the optimal solution.
(18) |
Case 4: , : Using (16a) and (16b), this case implies , which indicates equal secrecy rate for both devices. Thus, using (3), (4), (5), and Table I, we solve for decoding order , which can be given as
(19) |
After some algebric simplifications in (19), a cubic equation in the form of is resulted with coefficients and , where , , , and with , , , , , , , , and . Thus, in this case, three roots exist, i.e., candidate optimal points denoted as , and .
The above analysis shows six candidates for optimal solution. Therefore, the global-optimal power allocation solution of is the feasible candidate for which the minimum secrecy rate between the strong and weak devices is maximum, as given in (13). ∎
V Numerical Results
This section provides numerical results to validate the derived results and present key insights on the optimized solution. The default network parameters are considered as: , , , and . Small-scale fading is supposed to follow an exponential distribution having a mean value equal to 1 at each link [21]. We average the simulations over randomly generated channel gain realizations with Rayleigh distribution for each link. Simulation and analytical results, respectively, are marked as ‘Sim’ and ‘Ana’.



V-A Validation of Optimal Results
Firstly, Fig. 2 is plotted to validate the accuracy of Lemma 1, stating that the optimal secure decoding order maximizing the minimum secrecy rate between devices is . Here, through Fig. 2(a) and Fig. 2(b), the variation in secrecy rates and for and , respectively, with for all four decoding orders is shown. The results confirm that for all values, provides more secrecy rate for each device than other decoding orders. Hence, to maximize the minimum secrecy rate, the optimal secure decoding order is .
Further, to validate optimal power allocation solution (Refer Lemma 2) for optimal secure decoding order , Fig. 3 is plotted. Here, we show the variation of with for different values of and . Results indicate that there exists a unique global-optimal solution for in terms of . The perfect match between the simulation and analytical results confirms the accuracy of the analysis. We also observe from the results that the optimal power allocation can be greater than 0.5. It means providing lesser power to the strong device than the power allocated to the weak device, as presumed in many works in the NOMA literature, is not always necessary. Thus, we conclude that the power allocation associated with devices in a NOMA-enabled IIoT network should be decided based on the given network parameters.
V-B Impact of Network Parameters on Optimal Solution
Through the results presented in Fig. 4, we study the impact of and different values of far device’s distance on the average optimal secrecy rate performance of the network. is set to as meters. We observe that average optimal secrecy rate increases by increasing . The reason is that the achievable data rates for devices increase with an increase in SNR. Here we also notice that the average optimal secrecy rate performance decreases with an increase in distance . The reason is that increasing the distance results in a decrease in the achievable data rate of , and consequently, an increase in secrecy rate for and a decrease in secrecy rate for is obtained. Through simulations, we notice that less secrecy rate is obtained for for most channel realizations. Therefore, while calculating the average max min secrecy rate, the secrecy rate for is dominant for given network parameters, which decreases by increasing . Therefore, the results show that average performance degrades with an increase in .
V-C Performance Comparison
Through Fig. 5, we demonstrate that the joint optimal solution, i.e., optimal decoding order and optimal power allocation, is capable of improving the average secrecy rate over different benchmarks. In this regard, the joint optimal solution is compared with four different benchmarks to evaluate its performance in terms of average secrecy rate, and the percentage gain is calculated. Four different benchmarks are considered: (i) ODEP: optimal decoding order and equal power allocation, (ii) ODFP: optimal decoding order and fixed power allocation, (iii) FDEP: fixed decoding order and equal power allocation, and (iv) FDFP: fixed decoding order and fixed power allocation. The optimal and fixed decoding orders are and , respectively. For the equal power allocation, is assumed, which is considered to examine the case in which both devices are assigned with equal power. However, in a fixed power allocation scheme, is taken, which means is allocated to and the remaining fraction is allocated to . Taking is intended to examine the situation in which a weak device is assigned more power than a strong one, as considered in many works in the literature. Results show that the joint optimal solution provides an average percentage gain in secrecy fairness performance over benchmarks ODEP, ODFP, FDEP, and FDFP, of around , , , and , respectively. In this way, we observe that the result achieved by FDFP actually differs greatly from the joint optimal solution obtained.


Through Fig. 6, we demonstrate a variation in with for conventional decoding order and optimal decoding order. Note that the conventional and optimal secure decoding order, respectively, are and . Results indicate that for all values, ensures secrecy fairness between devices and gives a significant secrecy rate. Also, there exists a unique global-optimal solution for in terms of for . However, in the case of conventional decoding order , maximizing minimum secrecy rates between devices, i.e., will always result in zero secrecy rates. The reason is that if conventional decoding order is followed, a positive secrecy rate cannot be achieved for weak devices (Refer proposition 1), resulting in . Thus, from the secrecy fairness viewpoint, we can conclude that is not a feasible decoding order.
VI Concluding Remarks
We focused on obtaining a secure NOMA-enabled IIoT network with untrusted devices. We considered the RI at receivers with the linear model to observe the practical impact of imperfect SIC on the network’s performance. We first obtained feasible secure decoding orders to achieve a positive secrecy rate for each device. Under each device’s positive secrecy rate constraint, we jointly optimized the secure decoding order and power allocation to maximize the minimum secrecy rate between devices and provided the closed-form solution. Lastly, we presented numerical results to validate the accuracy of the theoretical analysis and provide insights into the optimal results and performance gain over benchmarks. Future work could analyze resource allocation for secrecy fairness maximization in a MIMO NOMA network with multiple devices.
Appendix A Proof of Proposition 3
In case of , both devices and first decode their own signals, perform SIC, and then decode the signal of other multiplexed device. Following Table I, we obtain the SINRs as , , , . Here, the condition for gives a feasible condition as , which shows that strong device can be secured from the . However, the required condition for leads to , which is not a feasible condition. Thus, the data of is not secured against . Hence, the decoding order is infeasible.
Appendix B Proof of Proposition 4
In , using Table I, the SINRs can be given as , , , . To get for , we solve , and get a feasible condition . This shows that positive secrecy rate can be obtained for if , since gives . Similarly, to get , the condition gives a feasible condition . Thus, positive secrecy rate can be obtained for with a constraint on as since gives . Thus, to get a positive secrecy rate for both devices, the joint constraint on power allocation can be given as in (12).
References
- [1] L. D. Xu, W. He, and S. Li, “Internet of things in industries: A survey,” IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233–2243, Nov. 2014.
- [2] A. Mahmood, L. Beltramelli, S. Fakhrul Abedin, S. Zeb, N. I. Mowla, S. A. Hassan, E. Sisinni, and M. Gidlund, “Industrial IoT in 5G-and-beyond networks: Vision, architecture, and design trends,” IEEE Trans. Ind. Informat., vol. 18, no. 6, pp. 4122–4137, June 2022.
- [3] M. Gidlund, G. P. Hancke, M. H. Eldefrawy, and J. Åkerberg, “Guest editorial: Security, privacy, and trust for industrial internet of things,” IEEE Trans. Ind. Informat., vol. 16, no. 1, pp. 625–628, Jan. 2020.
- [4] T. Gebremichael, L. P. I. Ledwaba, M. H. Eldefrawy, G. P. Hancke, N. Pereira, M. Gidlund, and J. Akerberg, “Security and privacy in the industrial internet of things: Current standards and future challenges,” IEEE Access, vol. 8, pp. 152 351–152 366, Aug. 2020.
- [5] J. Tang, L. Jiao, K. Zeng, H. Wen, and K.-Y. Qin, “Physical layer secure MIMO communications against eavesdroppers with arbitrary number of antennas,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 466–481, 2021.
- [6] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. K. Bhargava, “A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2181–2195, Oct. 2017.
- [7] M. Wijewardena, T. Samarasinghe, K. T. Hemachandra, S. Atapattu, and J. S. Evans, “Physical layer security for intelligent reflecting surface assisted two–way communications,” IEEE Commun. Lett., vol. 25, no. 7, pp. 2156–2160, July 2021.
- [8] W. Lu, Y. Mo, Y. Feng, Y. Gao, N. Zhao, Y. Wu, and A. Nallanathan, “Secure transmission for multi-UAV-assisted mobile edge computing based on reinforcement learning,” IEEE Trans. Netw. Sci. Eng., pp. 1–12, June 2022.
- [9] Y. Ding, Y. Feng, W. Lu, S. Zheng, N. Zhao, L. Meng, A. Nallanathan, and X. Yang, “Online edge learning offloading and resource management for UAV-assisted MEC secure communications,” IEEE J. Sel. Topics Signal Process., vol. 17, no. 1, pp. 54–65, Jan. 2023.
- [10] A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, 1975.
- [11] J. M. Hamamreh, H. M. Furqan, and H. Arslan, “Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey,” IEEE Commun. Surveys Tuts., vol. 21, no. 2, pp. 1773–1828, Oct. 2018.
- [12] X. Liu and X. Zhang, “NOMA-based resource allocation for cluster-based cognitive industrial internet of things,” IEEE Trans. Ind. Informat., vol. 16, no. 8, pp. 5379–5388, Aug. 2020.
- [13] M. W. Akhtar, S. A. Hassan, A. Mahmood, H. Jung, H. K. Qureshi, and M. Gidlund, “Q2A-NOMA: A Q-learning-based QoS-aware NOMA system design for diverse data rate requirements,” IEEE Trans. Ind. Informat., vol. 18, no. 11, pp. 7549–7559, Jan. 2022.
- [14] X. Liu, X. B. Zhai, W. Lu, and C. Wu, “QoS-guarantee resource allocation for multibeam satellite industrial internet of things with NOMA,” IEEE Trans. Ind. Informat., vol. 17, no. 3, pp. 2052–2061, Mar. 2021.
- [15] B. He, A. Liu, N. Yang, and V. K. Lau, “On the design of secure non-orthogonal multiple access systems,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2196–2206, Oct. 2017.
- [16] Y. Zhang, H.-M. Wang, Q. Yang, and Z. Ding, “Secrecy sum rate maximization in non-orthogonal multiple access,” IEEE Commun. Lett., vol. 20, no. 5, pp. 930–933, May 2016.
- [17] L. Lv, Z. Ding, Q. Ni, and J. Chen, “Secure MISO-NOMA transmission with artificial noise,” IEEE Trans. Vehicular Technol., vol. 67, no. 7, pp. 6700–6705, July 2018.
- [18] Y. Wu, G. Ji, T. Wang, L. Qian, B. Lin, and X. Shen, “Non-orthogonal multiple access assisted secure computation offloading via cooperative jamming,” IEEE Trans. Veh. Technol., vol. 71, no. 7, pp. 7751–7768, July 2022.
- [19] L. Xiao, Y. Li, C. Dai, H. Dai, and H. V. Poor, “Reinforcement learning-based NOMA power allocation in the presence of smart jamming,” IEEE Trans. Veh. Technol., vol. 67, no. 4, pp. 3377–3389, Apr. 2018.
- [20] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656–1672, Jan. 2017.
- [21] B. M. ElHalawany and K. Wu, “Physical-layer security of NOMA systems under untrusted users,” in Proc. IEEE GLOBECOM, United Arab Emirates, Dec. 2018, pp. 1–6.
- [22] S. Thapar, D. Mishra, and R. Saini, “Novel outage-aware NOMA protocol for secrecy fairness maximization among untrusted users,” IEEE Trans. Veh. Technol., vol. 69, no. 11, pp. 13 259–13 272, Sep. 2020.
- [23] Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin, “Secure beamforming in downlink MISO nonorthogonal multiple access systems,” IEEE Trans. Veh. Technol., vol. 66, no. 8, pp. 7563–7567, Aug. 2017.
- [24] M. Abolpour, S. Aïssa, M. Mirmohseni, and M. R. Aref, “Secrecy performance of friendly jammer assisted cooperative NOMA systems with internal eavesdroppers,” in Proc. IEEE PIMRC, London, United Kingdom, Aug. 2020, pp. 1–6.
- [25] C. Zhang, F. Jia, Z. Zhang, J. Ge, and F. Gong, “Physical layer security designs for 5G NOMA systems with a stronger near-end internal eavesdropper,” IEEE Trans. Veh. Technol., vol. 69, no. 11, pp. 13 005 – 13 017, Aug. 2020.
- [26] R. M. Christopher and D. K. Borah, “Physical layer security for weak user in MISO NOMA using directional modulation (NOMAD),” IEEE Commun. Lett., vol. 24, no. 5, pp. 956–960, Feb. 2020.
- [27] Y. Qi and M. Vaezi, “Secure transmission in MIMO-NOMA networks,” IEEE Commun. Lett., vol. 24, no. 12, pp. 2696–2700, Aug. 2020.
- [28] P. K. Hota, S. Thapar, D. Mishra, R. Saini, and A. Dubey, “Ergodic performance of downlink untrusted NOMA system with imperfect SIC,” IEEE Commun. Lett., vol. 26, no. 1, pp. 23–26, Jan. 2022.
- [29] H. Sun, B. Xie, R. Q. Hu, and G. Wu, “Non-orthogonal multiple access with SIC error propagation in downlink wireless MIMO networks,” in Proc. IEEE VTC-Fall, Montreal, Canada, Sep. 2016, pp. 1–5.
- [30] X. Yue, Z. Qin, Y. Liu, S. Kang, and Y. Chen, “A unified framework for non-orthogonal multiple access,” IEEE Transactions on Communications, vol. 66, no. 11, pp. 5346–5359, May 2018.
- [31] B. T. F.T. Miandoab, “NOMA performance enhancement-based imperfect SIC minimization using a novel user pairing scenario involving three users in each pair,” Wireless Networks, vol. 26, no. 5, pp. 3735–3748, Mar. 2020.
- [32] X. Wang, R. Chen, Y. Xu, and Q. Meng, “Low-complexity power allocation in NOMA systems with imperfect SIC for maximizing weighted sum-rate,” IEEE Access, vol. 7, pp. 94 238–94 253, July 2019.
- [33] R. Jiao, L. Dai, W. Wang, F. Lyu, N. Cheng, and X. Shen, “Max-min fairness for beamspace MIMO-NOMA: From single-beam to multi-beam,” IEEE Trans. Wireless Commun., vol. 21, no. 2, pp. 739–752, Feb. 2022.
- [34] X. Chen, A. Beiijebbour, A. Li, H. Jiang, and H. Kayama, “Consideration on successive interference canceller (SIC) receiver at cell-edge users for non-orthogonal multiple access (NOMA) with SU-MIMO,” in Proc. IEEE PIMRC, Hong Kong, China, Aug. 2015, pp. 522–526.
- [35] M. Vaezi, R. Schober, Z. Ding, and H. V. Poor, “Non-orthogonal multiple access: Common myths and critical questions,” IEEE Wireless Commun., vol. 26, no. 5, pp. 174–180, Oct. 2019.
- [36] Z. Ding, P. Fan, and H. V. Poor, “Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6010–6023, Aug. 2016.
- [37] N. Li, M. Xiao, L. K. Rasmussen, X. Hu, and V. C. M. Leung, “On resource allocation of cooperative multiple access strategy in energy-efficient industrial internet of things,” IEEE Trans. Ind. Informat., vol. 17, no. 2, pp. 1069–1078, Feb. 2021.
- [38] A. Ravindran, G. V. Reklaitis, and K. M. Ragsdell, Engineering optimization: methods and applications. John Wiley & Sons, 2006.
![]() |
Sapna Thapar (Student Member, IEEE) received the B.Tech. degree in electronics and communication engineering from the Rajasthan Technical University, Rajasthan, India, in 2013, and the M.Tech. degree in electronics and communication engineering from the LNMIIT Jaipur, Rajasthan, India, in 2016. She is currently working toward a PhD degree in electrical engineering from the Indian Institute of Technology (IIT) Jammu, Jammu and Kashmir, India. She has also been a Visiting Researcher at the University of Tokyo, Tokyo, Japan, in 2022. She has also worked at the Lovely Professional University, Punjab, India, as an Assistant Professor, from 2016 to 2017. She is a recipient of the TCS RSP Fellowship (2019-2023). She was also selected as an Exemplary Reviewer of IEEE WIRELESS COMMUNICATIONS LETTERS in 2021. Her research interests include non-orthogonal multiple access and physical layer security. |
![]() |
Deepak Mishra (Senior Member, IEEE) received a PhD degree in electrical engineering from the Indian Institute of Technology (IIT) Delhi in 2017. Currently, he is an Australian Research Council (ARC) Discovery Early Career Researcher Award (DECRA) fellow with the School of Electrical Engineering and Telecommunications at UNSW Sydney, where he joined in August 2019 as a Senior Research Associate. Before that, he was a Post-Doctoral Researcher at Linköping University, Sweden, from August 2017 to July 2019. He has also been a Visiting Researcher at the Northeastern University (USA), University of Rochester (USA), Huawei Technologies (France), and Southwest Jiaotong University (China). He serves as an Associate Editor of IEEE WIRELESS COMMUNICATIONS LETTERS, IEEE ACCESS, and Communication Theory track of Frontiers in Communications and Networks. His research interests include energy harvesting cooperative communication networks, MIMO, backscattering, physical layer security, as well as signal processing and energy optimization schemes for the uninterrupted operation of wireless networks. |
![]() |
Ravikant Saini (Member, IEEE) received B.Tech. degree in electronics and communication Engineering, and M.Tech. degree in communication systems from the Indian Institute of Technology Roorkee, India, in 2001 and 2005, respectively. After completing his PhD from the Indian Institute of Technology Delhi, India, in 2016, he worked as an Assistant Professor at Shiv Nadar University, Greater Noida, India, till Dec. 2017. Since then, he has been working as an Assistant Professor in the Electrical Engineering Department at the Indian Institute of Technology (IIT) Jammu, India. |