Performance Analysis of CR-NOMA Based on Untrusted Relay in IoT

Z Liang, E Li, Y Wang, M Zheng - 2023 IEEE 6th International …, 2023 - ieeexplore.ieee.org
… • We model the CR-NOMA network that uses the underlay mode. The secondary users
serve as relays to assist the primary users transmit signals, enhancing the QoS for the cellular-…

Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
NOMA-inspired jamming and relaying scheme to enhance the physical layer security of
untrusted relay … Scenarios of single-antenna and multiple-antenna relaying are both investigated. …

[PDF][PDF] Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir, F Li, Z Kong… - in IEEE Transactions on … - researchgate.net
… (NOMA)-inspired jamming and relaying scheme to enhance the physical layer security of
untrusted relay networks… performance, and the achievable data rate for decoding z is CR,z = log …

Physical layer security of NOMA with decode-and-forward relaying in underlay CR network

M Zhu, Z Yang, Y Feng - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
… -forward (AF) cooperative CRNOMA network, which confirms … CRNOMA network with a full
duplex (FD) multi-antenna relay … improve secrecy performance in MIMO-NOMA system. In [13]…

Secrecy performance of non-orthogonal multiple access cognitive untrusted relaying with friendly jamming

Z Mobini - AEU-International Journal of Electronics and …, 2020 - Elsevier
… In our cooperative CR NOMA system, ST acts as an untrusted relay and hence, the
instantaneous secrecy capacity C s can be expressed as(14) C S = 1 2 log 2 ( 1 + γ PD ) - 1 2 log 2 ( …

Exploiting adaptive jamming in secure cooperative NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
… with an untrusted relay for a cooperative non-orthogonal multiple access (NOMA) system,
where a base station (BS) serves a near user (NU) and a far user (FU) by the NOMA principle, …

Security-Reliability Analysis in CR-NOMA IoT Network Under I/Q Imbalance

H Nguyen, TN Nguyen, BV Minh, THT Pham… - IEEE …, 2023 - ieeexplore.ieee.org
… the design of IQI-aware CR-NOMA systems. Finally, the trade-… set, the secondary NOMA user
in CR-NOMA can be reached … an untrusted relay,’’ IEEE Wireless Commun. Lett., vol. 8, no. …

Ensemble Learning aided QPSO–Based Framework for Secrecy Energy Efficiency in FD CR-NOMA Systems

CE Garcia, MR Camana, I Koo - IEEE Transactions on Green …, 2022 - ieeexplore.ieee.org
… , encryption techniques become more untrustworthy. The main … the proposed FD cooperative
relay CR-NOMA network and the … a FD cooperative relay CRNOMA network consisting of a …

Outage probability minimization in secure NOMA cognitive radio systems with UAV relay: a machine learning approach

H Tran, VH Dang, D Niyato, DN Cuong… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
… multiple access (NOMA) cognitive radio (CR) system with an unmanned aerial vehicle relay
(UR… Therefore, in this paper, we consider NOMA CR with a UR with the aim of enhancing the …

Stackelberg game for secure CR-NOMA networks against internal eavesdropper

S Abidrabbu, A Abushattal… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… Usually an internal Eavesdropper (Eve) is an untrusted legitimate user that served from
the … In [22], the authors have discussed the energy efficiency in a two-way relay CR-NOMA