{"id":"https://openalex.org/W4361029830","doi":"https://doi.org/10.1109/jiot.2023.3262512","title":"User Pairing and Power Allocation in Untrusted Multiuser NOMA for Internet of Things","display_name":"User Pairing and Power Allocation in Untrusted Multiuser NOMA for Internet of Things","publication_year":2023,"publication_date":"2023-03-28","ids":{"openalex":"https://openalex.org/W4361029830","doi":"https://doi.org/10.1109/jiot.2023.3262512"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3262512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3262512","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063090253","display_name":"Chaoying Yuan","orcid":"https://orcid.org/0000-0001-8825-976X"},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chaoying Yuan","raw_affiliation_strings":["Security Technology Research Institute, China Telecom Research Institute, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-8825-976X","affiliations":[{"raw_affiliation_string":"Security Technology Research Institute, China Telecom Research Institute, Shanghai, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101544825","display_name":"Wei Ni","orcid":null},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wei Ni","raw_affiliation_strings":["Data61, CSIRO, Marsfield, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0002-4933-594X","affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Marsfield, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101478583","display_name":"Kezhong Zhang","orcid":"https://orcid.org/0000-0001-5063-7446"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kezhong Zhang","raw_affiliation_strings":["Key Laboratory of Universal Wireless Communications, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Universal Wireless Communications, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067310940","display_name":"Jingpeng Bai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingpeng Bai","raw_affiliation_strings":["Security Technology Research Institute, China Telecom Research Institute, Guangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Security Technology Research Institute, China Telecom Research Institute, Guangzhou, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100677965","display_name":"Jun Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Shen","raw_affiliation_strings":["Security Technology Research Institute, China Telecom Research Institute, Guangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Security Technology Research Institute, China Telecom Research Institute, Guangzhou, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086268677","display_name":"Abbas Jamalipour","orcid":"https://orcid.org/0000-0002-1807-7220"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Abbas Jamalipour","raw_affiliation_strings":["School of Electrical and Information Engineering, The University of Sydney, Camperdown, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0002-1807-7220","affiliations":[{"raw_affiliation_string":"School of Electrical and Information Engineering, The University of Sydney, Camperdown, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5063090253"],"corresponding_institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"],"apc_list":null,"apc_paid":null,"fwci":1.6608,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.83565642,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"10","issue":"15","first_page":"13155","last_page":"13167"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10851","display_name":"Optical Wireless Communication Technologies","score":0.9465000033378601,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8196995258331299},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.6644635200500488},{"id":"https://openalex.org/keywords/noma","display_name":"Noma","score":0.6450528502464294},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6046903133392334},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.4837391674518585},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.48076626658439636},{"id":"https://openalex.org/keywords/relaxation","display_name":"Relaxation (psychology)","score":0.4662095010280609},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.4232778251171112},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4229556620121002},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39989128708839417},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3597153425216675},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.29424649477005005},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16072037816047668},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1506560742855072},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13971096277236938},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.11478221416473389}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8196995258331299},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.6644635200500488},{"id":"https://openalex.org/C2775918612","wikidata":"https://www.wikidata.org/wiki/Q994794","display_name":"Noma","level":3,"score":0.6450528502464294},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6046903133392334},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.4837391674518585},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.48076626658439636},{"id":"https://openalex.org/C2776029896","wikidata":"https://www.wikidata.org/wiki/Q3935810","display_name":"Relaxation (psychology)","level":2,"score":0.4662095010280609},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.4232778251171112},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4229556620121002},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39989128708839417},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3597153425216675},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.29424649477005005},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16072037816047668},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1506560742855072},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13971096277236938},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.11478221416473389},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3262512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3262512","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W151604921","https://openalex.org/W203023637","https://openalex.org/W404764422","https://openalex.org/W1565176535","https://openalex.org/W1968154520","https://openalex.org/W1976293824","https://openalex.org/W1999314897","https://openalex.org/W2021361347","https://openalex.org/W2027982384","https://openalex.org/W2129732816","https://openalex.org/W2296318261","https://openalex.org/W2382354666","https://openalex.org/W2506156813","https://openalex.org/W2522847968","https://openalex.org/W2528305756","https://openalex.org/W2752182365","https://openalex.org/W2762586323","https://openalex.org/W2794157223","https://openalex.org/W2892214116","https://openalex.org/W2898104747","https://openalex.org/W2909746507","https://openalex.org/W2917997479","https://openalex.org/W2957915633","https://openalex.org/W2964345771","https://openalex.org/W2998608373","https://openalex.org/W3004775202","https://openalex.org/W3011949521","https://openalex.org/W3027379320","https://openalex.org/W3028414831","https://openalex.org/W3044396840","https://openalex.org/W3080920314","https://openalex.org/W3085560976","https://openalex.org/W3101450547","https://openalex.org/W3120545056","https://openalex.org/W3180641418","https://openalex.org/W3196422707","https://openalex.org/W3197670830","https://openalex.org/W3208817945","https://openalex.org/W3211657713","https://openalex.org/W4213272153","https://openalex.org/W4231186596","https://openalex.org/W4234202348","https://openalex.org/W4235479324","https://openalex.org/W4244565703","https://openalex.org/W4246182238","https://openalex.org/W4248876767","https://openalex.org/W4250589301","https://openalex.org/W4255863451","https://openalex.org/W4256451726","https://openalex.org/W4312258136","https://openalex.org/W4312269929"],"related_works":["https://openalex.org/W3165611029","https://openalex.org/W2795815818","https://openalex.org/W2370038111","https://openalex.org/W3191669748","https://openalex.org/W2510978767","https://openalex.org/W2900836405","https://openalex.org/W2951619176","https://openalex.org/W2793190854","https://openalex.org/W1498238661","https://openalex.org/W3156595664"],"abstract_inverted_index":{"In":[0],"the":[1,66,73,118,134],"Internet":[2],"of":[3],"Things":[4],"(IoT),":[5],"massive":[6],"sensitive":[7],"and":[8,77,98,107,138],"confidential":[9],"information":[10],"is":[11,20,56,62],"transmitted":[12],"wirelessly,":[13],"making":[14,33],"security":[15],"a":[16,95],"serious":[17],"concern.":[18],"This":[19,43],"particularly":[21],"true":[22],"when":[23],"technologies,":[24],"such":[25],"as":[26],"nonorthogonal":[27],"multiple":[28],"access":[29,39],"(NOMA),":[30],"are":[31,112],"used,":[32],"it":[34,90],"possible":[35],"for":[36],"users":[37],"to":[38,64],"each":[40,54],"other\u2019s":[41],"data.":[42],"article":[44],"studies":[45],"secure":[46],"communications":[47],"in":[48,133],"multiuser":[49],"NOMA":[50],"downlink":[51],"systems,":[52],"where":[53],"user":[55,99],"potentially":[57],"an":[58],"eavesdropper.":[59],"Resource":[60],"allocation":[61,93],"formulated":[63],"achieve":[65],"maximum":[67],"sum":[68,135],"secrecy":[69,136],"rate,":[70],"meanwhile":[71],"satisfying":[72],"users\u2019":[74],"data":[75],"requirements":[76],"power":[78,92],"constraint.":[79],"We":[80],"solve":[81],"this":[82],"nontrivial,":[83],"mixed-integer":[84],"nonlinear":[85],"programming":[86,105],"problem":[87],"by":[88],"decomposing":[89],"into":[91],"with":[94,117],"closed-form":[96],"solution,":[97],"pairing":[100],"obtained":[101],"effectively":[102],"using":[103],"linear":[104],"relaxation":[106],"barrier":[108],"algorithm.":[109],"These":[110],"subproblems":[111],"solved":[113],"iteratively":[114],"until":[115],"convergence,":[116],"convergence":[119],"rate":[120,137],"rigorously":[121],"analyzed.":[122],"Simulations":[123],"demonstrate":[124],"that":[125],"our":[126],"approach":[127],"outperforms":[128],"its":[129],"existing":[130],"alternatives":[131],"significantly":[132],"computational":[139],"complexity.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
