Analysis of uplink NOMA in cellular IoT: A physical layer security perspective

S Zhang, X Xu, J Peng, Y Chen… - 2018 IEEE 88th Vehicular …, 2018 - ieeexplore.ieee.org
… In this paper, we analyze the physical layer security performances of uplink NOMA transmission
in IoT. We consider the uplink transmission scenario where UEs are located around the …

Interference-based and Deep-Learning-Aided Physical Layer Security Enhancement in Uplink NOMA under Cooperative Eavesdropping

FM Caceres, S Kandeepan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
… Each NOMA user is subject to an individual minimum bit rate requirement, whereas multiple
… a secure decoding order. The idea is to take advantage of the inherent NOMA characteristic …

Jamming-aided secrecy performance in secure uplink NOMA system

K Jiang, W Zhou, L Sun - IEEE access, 2020 - ieeexplore.ieee.org
… Recently, physical-layer security towards NOMA has been received a … in NOMA-enabled
mobile edge computing (MEC) networks. Physical-layer security was applied in that UL NOMA

Physical layer security for NOMA systems: Requirements, issues, and recommendations

S Pakravan, JY Chouinard, X Li, M Zeng… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
NOMA, we will first discuss the technical difference between the PLS in uplink NOMA and the
PLS in the downlink NOMA. … between uplink NOMA and downlink NOMA in terms of PLS. In …

Security at physical layer in NOMA relaying networks with cooperative jamming

B Chen, R Li, Q Ning, K Lin, C Han… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… physical layer security in the downlink NOMA network with a HD relay in the presence of
a passive eavesdropper. A two-stage jamming scheme was proposed to guarantee secure

NOMA-assisted secure short-packet communications in IoT

Z Xiang, W Yang, Y Cai, Z Ding… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
… Physical layer security can be employed without the constraints of packet length and number
… Short-Packet Communications: In our proposed downlink and uplink NOMA schemes, both …

On the secrecy design of STAR-RIS assisted uplink NOMA networks

Z Zhang, J Chen, Y Liu, Q Wu, B He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… the STAR-RIS assisted NOMA network, where a two-layer iterative algorithm was developed
… 23] studied the secure transmission problems of the RIS assisted NOMA networks under the …

Improving physical layer security for reconfigurable intelligent surface aided NOMA 6G networks

Z Zhang, C Zhang, C Jiang, F Jia, J Ge… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
layer security (PLS) for a RIS-aided NOMA 6G networks is investigated, in which a RIS is
deployed to assist the two “dead zone” NOMA … In [29], an RISassisted uplink NOMA system was …

Resource allocation for enhancing offloading security in NOMA-enabled MEC networks

W Wu, X Wang, F Zhou, KK Wong, C Li… - IEEE Systems …, 2020 - ieeexplore.ieee.org
… the first work introducing physical layer security into the task … –min AEA problem for an uplink
NOMA-enabled MEC networks … for UAV-enabled uplink NOMA MEC systems, optimizing the …

Secrecy performance analysis of uplink NOMA in IoT networks

Z Xiang, W Yang, Y Cai, Y Cheng… - 2018 IEEE/CIC …, 2018 - ieeexplore.ieee.org
… Abstract—This paper investigates physical layer security (PLS) of uplink non-orthogonal
multiple access (NOMA) in Internet of Things (IoT) networks, where two devices transmit secret …