Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Satrya, G. B. | - |
dc.contributor.author | Shin, S. Y. | - |
dc.date.available | 2020-04-24T10:25:13Z | - |
dc.date.created | 2020-03-31 | - |
dc.date.issued | 2019-04 | - |
dc.identifier.issn | 1874-4907 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/kumoh/handle/2020.sw.kumoh/182 | - |
dc.description.abstract | Non-orthogonal multiple access (NOMA) is a promising candidate among potential nominees for future radio access. NOMA adopts the principle of successive interference cancellation (SIC) algorithm at the receiver's side to segregate user's information. However, during SIC process, information of the user(s) with weaker channel gain is extracted by user(s) with stronger channel gain. It can raise major security concerns, e.g. session hijacking, eavesdropping, identity theft, and others, for users with weaker channel gains. Therefore, this research aims to analyze and verify a secure SIC algorithm for NOMA based systems. This research proposes and demonstrates the SIC scheme to enhance security on the user's side by making use of MAC address and IMEI that are devoted to a smartphone as distinctive keys. This research shown that the proposed scheme can improve security in terms of confidentiality time and secrecy capacity. (C) 2018 Elsevier B.V. All rights reserved. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.subject | PHYSICAL LAYER SECURITY | - |
dc.subject | WIRELESS NETWORKS | - |
dc.title | Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Shin, S. Y. | - |
dc.identifier.doi | 10.1016/j.phycom.2018.12.010 | - |
dc.identifier.scopusid | 2-s2.0-85059306078 | - |
dc.identifier.wosid | 000461179700003 | - |
dc.identifier.bibliographicCitation | PHYSICAL COMMUNICATION, v.33, pp.16 - 25 | - |
dc.relation.isPartOf | PHYSICAL COMMUNICATION | - |
dc.citation.title | PHYSICAL COMMUNICATION | - |
dc.citation.volume | 33 | - |
dc.citation.startPage | 16 | - |
dc.citation.endPage | 25 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | PHYSICAL LAYER SECURITY | - |
dc.subject.keywordPlus | WIRELESS NETWORKS | - |
dc.subject.keywordAuthor | SIC | - |
dc.subject.keywordAuthor | NOMA | - |
dc.subject.keywordAuthor | Users privacy | - |
dc.subject.keywordAuthor | MAC address | - |
dc.subject.keywordAuthor | IMEI | - |
dc.subject.keywordAuthor | Secrecy capacity | - |
dc.subject.keywordAuthor | Security analysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
350-27, Gumi-daero, Gumi-si, Gyeongsangbuk-do, Republic of Korea (39253)054-478-7170
COPYRIGHT 2020 Kumoh University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.