Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… and external eavesdroppers, we consider to use the AN which masks the superposed
information-bearing signal on external eavesdroppers while has no any effect on users of NOMA. …

Securing energy-constrained UAV communications against both internal and external eavesdropping

Y Gao, H Tang, B Li, X Yuan - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
… One category considers eavesdropping attacks from external eavesdroppers (Eves), which
we refer to as external eavesdropping in the following content. For example, secrecy rate …

IRS-aided secure NOMA networks against internal and external eavesdropping

H Han, Y Cao, M Sheng, N Zhao, J Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… the internal and external eavesdropping, respectively. First, to deal with an internal untrusted
… Furthermore, considering a worse scenario with both internal and external eavesdroppers, …

Covert and secure communications in NOMA networks with internal eavesdropping

Q Li, D Xu, K Navaie, Z Ding - IEEE Wireless Communications …, 2023 - ieeexplore.ieee.org
internal eavesdropping and external monitoring. In the network, the strong user wiretaps the
signals of the weak user while an external … not only reduces the eavesdropping rate of the …

Internal collusive eavesdropping of interference alignment networks

N Zhao, FR Yu, Y Chen, B Chen… - 2017 IEEE 85th …, 2017 - ieeexplore.ieee.org
external eavesdropping. However, when some users inside the network are cooperating to
eavesdrop … Thus, we concentrate on the eavesdropping attacks in this paper, and propose a …

Optimal power allocation for secure transmission with both internal and external eavesdroppers

Z Cheng, J Si, Z Li, J Shi - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
internal Eve and multiple external Eves coexist. In this paper, an internal Eve and multiple
external … injects AN towards both the internal and external Eves. Moreover, instantaneous CSI …

Secure transmission design for cooperative NOMA in the presence of internal eavesdropping

B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
external eavesdropping has been … internal eavesdropping has been investigated in [8]–[10].
Note that the above studies either consider cooperative NOMA with external eavesdropping […

Formal eavesdropping and its computational interpretation

M Abadi, J Jürjens - International Symposium on Theoretical Aspects of …, 2001 - Springer
… While the present work focuses on eavesdroppers and symmetric cryptosystems, we hope
… and Channelse, intuitively sets of internal (private) channels and external (public) channels. …

[图书][B] Eavesdropping: An intimate history

JL Locke - 2010 - books.google.com
Why we can't resist listening in on our neighbours Eavesdropping has a bad name. It is a form
of human communication in which the information gained is stolen, and where such words …

Physical Layer Security Algorithm for Multicast System Preventing Internal/External Eavesdroppers.

Z Wen, H Ji-hai, JI Jiang - Telecommunication Engineering, 2014 - search.ebscohost.com
… ) Abstract: To prevent the internal/ external eavesdroppers obtaining information in multicast
… of internal eavesdropper but add random interference to the received signal of external