Securing NOMA 6G Communications Leveraging Intelligent Omni-Surfaces Under Residual Hardware Impairments

In this manuscript, we introduce an efficient resource allocation strategy to enhance the security of an intelligent omni-surface (IOS) assisted secure Internet of Things (IoT) enabled nonorthogonal multiple access (NOMA) network under residual hardware impairments (RHIs) resulting from imperfect ha...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal 2024-07, Vol.11 (14), p.25326-25336
Hauptverfasser: Asif, Muhammad, Bao, Xu, Ihsan, Asim, Khan, Wali Ullah, Ahmed, Manzoor, Li, Xingwang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In this manuscript, we introduce an efficient resource allocation strategy to enhance the security of an intelligent omni-surface (IOS) assisted secure Internet of Things (IoT) enabled nonorthogonal multiple access (NOMA) network under residual hardware impairments (RHIs) resulting from imperfect hardware design. In particular, the goal is to maximize the sum secrecy rate of the considered multi-cluster based secure NOMA system assisted by an IOS node. This is achieved by optimizing both the active beamforming vectors of NOMA users within the transmission and reflection regions of the system, and the transmission and reflection coefficients of the IOS node, while adhering to Quality-of-Service, successive interference cancellation, power budget, and energy conservation constraints. Moreover, the presented alternating optimization framework tackles the significantly nonconvex optimization problem through a two-stage process: 1) the active beamforming vectors are obtained using successive convex approximation (SCA) and second-order conic programming (SOCP) techniques, and 2) based on the determined active beamforming vectors, the transmission and reflection coefficients of the IOS node are computed utilizing SCA and semi-definite relaxation (SDR) techniques, where rank-1 solution is achieved through Gaussian randomization method. Ultimately, the numerical simulations validate the efficacy of the suggested method over competing benchmarks, in terms of sum secrecy rate, showcasing its superiority in achieving fast convergence within a limited number of iterations.
ISSN:2327-4662
2327-4662
DOI:10.1109/JIOT.2024.3396073