Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir - … Forensics and Security, 2019 - ieeexplore.ieee.org
NOMA)-inspired jamming and relaying scheme to enhance the physical layer security of
untrusted relay networks… , with the application of the downlink NOMA principle, the source sends …

Secure and reliable transmission in mmWave NOMA relay networks with SWIPT

X Sun, W Yang, Y Cai - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
… or security of mmWave relay networks, we consider the impact of NOMA on the security of
mmWave relay networks, … -limited IoT devices, and the relay selection schemes to improve the …

Artificial noise aided secure communications for cooperative NOMA networks

Z Cao, X Ji, J Wang, W Wang… - … and Networking, 2021 - ieeexplore.ieee.org
… leakage of the wiretap cooperative NOMA network with an untrusted relay in [39]. Based on
… : 1) the NOMA protocol can improve the spectral efficiency of cooperative relay networks [11]-[…

Optimal relay selection for secure NOMA systems under untrusted users

K Cao, B Wang, H Ding, T Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… The performance of a multiple-relay assisted NOMA network with an external eavesdropper
… layer security of untrusted relay networks, a novel NOMA-inspired jamming and relaying

NOMA in cooperative communication systems with energy-harvesting nodes and wireless secure transmission

A Salem, L Musavian - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
… be beneficial for achieving secure communication. In this paper, we consider NOMA in
cooperative multiple antennas relaying systems, where the source and the relay both have fixed …

Security at physical layer in NOMA relaying networks with cooperative jamming

B Chen, R Li, Q Ning, K Lin, C Han… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… layer security in the downlink NOMA network with a HD relay in the presence of a passive
eavesdropper. A two-stage jamming scheme was proposed to guarantee secure transmission. …

Secrecy outage probability of relay selection based cooperative NOMA for IoT networks

H Li, Y Chen, M Zhu, J Sun, DT Do, VG Menon… - IEEE …, 2020 - ieeexplore.ieee.org
security performance for the cooperative non-orthogonal multiple access (NOMA) networks
for IoT, where the multi-relay … two-way relaying networks based on NOMA. The mathematical …

Secure communication for RF energy harvesting NOMA relaying networks with relay-user selection scheme and optimization

VL Nguyen, DB Ha, VT Truong, DD Tran… - Mobile Networks and …, 2022 - Springer
… In this paper, we study the physical layer security (PLS) of a radio frequency energy
harvesting (RF EH) non-orthogonal multiple access (NOMA) relaying network where relay-user …

New NOMA-based two-way relay networks

Z Fang, S Shen, J Liu, W Ni… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
relay networks [21]–[23]. The authors of [19] analyzed the error performance of a NOMA-based
diamond relaying network … ), where two relays were employed to relay the signal from a …

On security and throughput for energy harvesting untrusted relays in IoT systems using NOMA

C So-In, H Tran, DD Tran, S Heng… - IEEE …, 2019 - ieeexplore.ieee.org
NOMA-inspired relaying scheme using the AF technique to improve the PLS of untrusted relay
networks… , RF EH untrusted relays in MISO IoT system using NOMA have not been studied …