Q Li, P Ren, D Xu - IEEE Access, 2019 - ieeexplore.ieee.org
… However, the literatures [18]–[27] only tackled with the security issues of NOMAnetworks or cooperative D2D networks. The security issue of NOMA enabled cooperative D2D networks …
N Zhao, Y Li, S Zhang, Y Chen, W Lu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
… However, the security of NOMA-UAV systems remains a challenge due to … NOMA. In this paper, we propose two schemes to guarantee the secure transmission in UAV-NOMAnetworks. …
G Chopra, RK Jha, S Jain - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
… In recent times, Non-orthogonal multiple access (NOMA) technique … enhancement compared to orthogonal multiple access (OMA). This motivates towards the applicability of the NOMA …
… next generation networks with limited spectal resources. In this paper, an enhancedsecrecy cooperative TWR scheme for cooperative non-orthogonal multiple access (NOMA) networks …
R Ruby, QV Pham, K Wu, AA Heidari… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… performance of cooperative NOMAnetworks. For example, Li et … network with the cognitive ability. This work also investigates the secrecy performance of a two-node cooperative NOMA …
X Li, Y Zheng, M Zeng, Y Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… secrecy performance of OMA and NOMAnetwork users, we find that the secrecy performance of OMA-Un is superior to NOMA… with more power in the NOMA protocol than in OMA. Fig. 3 …
… Remark 3: Similarly, since the same parameters lead to the enhancement of SOP, this section presents the expressions of SPSC performance which relate to the similar system …
B Li, W Wu, W Zhao, H Zhang - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
… mechanism between non-orthogonal multiple access (NOMA) user pairs to enhance the … NOMA security (THCNS) scheme that utilizes the cooperative interference between NOMA user …
… For the eavesdropper, we consider that the inter-user interference caused by NOMA can be used to confuse the eavesdropper and enhance secrecy performance. This is reasonable …