On the secrecy design of STAR-RIS assisted uplink NOMA networks

Z Zhang, J Chen, Y Liu, Q Wu, B He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates the secure transmission in a simultaneously transmitting and
reflecting reconfigurable intelligent surface (STAR-RIS) assisted uplink non-orthogonal …

Enhancing physical layer security with artificial noise in large-scale NOMA networks

C Gong, X Yue, Z Zhang, X Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates the secrecy outage performance for a large-scale downlink system
with full-duplex (FD) non-orthogonal multiple access (NOMA) transmission aided by artificial …

On secrecy analysis of UAV-enabled relaying NOMA systems

J Zhang, X Zheng, G Pan, Y Xie - Physical Communication, 2021 - Elsevier
In this paper, we analyze the secrecy outage performance for an unmanned aerial vehicle
(UAV)-enabled relaying non-orthogonal multiple access (NOMA) system, in which a source …

Optimal relay selection for secure NOMA systems under untrusted users

K Cao, B Wang, H Ding, T Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same frequency band to improve the spectral efficiency. Whereas a security flaw emerges in …

Opportunistic Scheduling Scheme to Improve Physical-Layer Security in Cooperative NOMA System: Performance Analysis and Deep Learning Design

Y Pramitarini, RHY Perdana, K Shim, B An - IEEE Access, 2024 - ieeexplore.ieee.org
In this paper, we propose a novel opportunistic scheduling-based antenna-user selection
(OBAUS) scheme to improve the secrecy performance of cooperative non-orthogonal …

Secrecy performance analysis of cooperative nonorthogonal multiple access in IoT networks

A Rauniyar, ON Østerbø, JE Håkegård… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
Differentsystemmodels utilizing nonorthogonal multiple access (NOMA) have been
successfully studied to meet the growing capacity demands of the Internet of Things IoT) …

Secrecy analysis of a cooperative NOMA network using an EH untrusted relay

TA Le, HY Kong - International Journal of Electronics, 2019 - Taylor & Francis
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect
successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is …

Physical layer security in N-pair NOMA-PLNC wireless networks

S Rajkumar, DNK Jayakody, R Alkanhel… - IEEE …, 2022 - ieeexplore.ieee.org
In this paper, the effective end-to-end secure communication of N-pair cellular network is
studied. Promising multiple access scheme known as non-orthogonal multiple access …

Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same resource block to improve the spectral efficiency. Whereas due to the resource …

Performance analysis of multi-phase cooperative NOMA systems under passive eavesdropping

R Ruby, T Riihonen, K Wu, Y Liu, BM ElHalawany - Signal Processing, 2021 - Elsevier
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with
better channel conditions have prior knowledge about the information of other weak users …