… The analysis is given both from a connection level perspective and from a physical layer security viewpoints. We provide new analytical expressions for UL NOMA at the BS with multiple …
… In this paper, the physical layersecurity of uplink non-orthogonal multiple access (NOMA) in … the effective secrecy throughput (EST) of the kth NOMA user, which may use a fixed or an …
S Zhang, X Xu, H Wang, J Peng, D Zhang… - IEEE Access, 2018 - ieeexplore.ieee.org
… Based on the proposed model, we provide a physical layersecurity characterization of uplink NOMA in IoT. As the inter-cell interference in IoT can be quite severe, the influence of inter-…
K Cao, B Wang, H Ding, L Lv, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… contributions on the physical layersecurity of CJ aided uplinkNOMA transmission in the … an uplinkNOMA system with multiuser. To mitigate strong inter-user interference of NOMA …
Y Masuda, E Okamoto, K Ito… - 2019 International …, 2019 - ieeexplore.ieee.org
… uplinkNOMA has not been considered yet. Therefore, in this paper, we propose an uplink chaos NOMA (UL-C-NOMA) … and realizes the physical layersecurity in UL-NOMA, by utilizing …
… NOMA network in the downlink and uplink scenario with a pernicious eavesdropper. Moreover, we investigated the physical layersecurity (PLS… the superiority of NOMA to the traditional …
… NOMA flavors and basic principles to explain security concerns more clearly. This is followed by security … While uplinkNOMA [6] has also been studied, more focus is given to downlink …
X Zhao, J Sun - IEEE Access, 2020 - ieeexplore.ieee.org
… [30] can also be utilized in PLS for NOMA systems. Not like PLS in VLC systems only … in NOMA systems can also be applicable to uplink communication [31]. Moreover, PLS in NOMA …
… PD-NOMA In this section, a brief overview of the downlink and uplink in PD-NOMA system models … In this work, both of the uplink and downlink NOMA schemes are designed to provide …