Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… This section investigates secrecy-enhancing design for cooperative uplink NOMA transmission.
A new adaptive uplink cooperative jamming scheme is proposed to secure confidential …

Security enhancement and QoS provisioning for NOMA-based cooperative D2D networks

Q Li, P Ren, D Xu - IEEE Access, 2019 - ieeexplore.ieee.org
… However, the literatures [18]–[27] only tackled with the security issues of NOMA networks or
cooperative D2D networks. The security issue of NOMA enabled cooperative D2D networks

Security enhancement for NOMA-UAV networks

N Zhao, Y Li, S Zhang, Y Chen, W Lu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
… However, the security of NOMA-UAV systems remains a challenge due to … NOMA. In this
paper, we propose two schemes to guarantee the secure transmission in UAV-NOMA networks. …

Enhancing secrecy performance of cooperative NOMA-based IoT networks via multiantenna-aided artificial noise

R Ruby, QV Pham, K Wu, AA Heidari… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… performance of cooperative NOMA networks. For example, Li et … network with the cognitive
ability. This work also investigates the secrecy performance of a two-node cooperative NOMA

Secrecy enhancement of cooperative NOMA networks with two-way untrusted relaying

M Awad, SM Ibraheem, SA Napoleon, W Saad… - IEEE …, 2020 - ieeexplore.ieee.org
… next generation networks with limited spectal resources. In this paper, an enhanced secrecy
cooperative TWR scheme for cooperative non-orthogonal multiple access (NOMA) networks

Rank-based secrecy rate improvement using NOMA for ultra dense network

G Chopra, RK Jha, S Jain - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
… In recent times, Non-orthogonal multiple access (NOMA) technique … enhancement compared
to orthogonal multiple access (OMA). This motivates towards the applicability of the NOMA

Power optimization for enhancing secrecy of cooperative user relaying NOMA networks

Y Cao, S Wang, M Jin, N Zhao, C Xing… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
… For the eavesdropper, we consider that the inter-user interference caused by NOMA can
be used to confuse the eavesdropper and enhance secrecy performance. This is reasonable …

Security enhancement with a hybrid cooperative NOMA scheme for MEC system

B Li, W Wu, W Zhao, H Zhang - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
… mechanism between non-orthogonal multiple access (NOMA) user pairs to enhance the …
NOMA security (THCNS) scheme that utilizes the cooperative interference between NOMA user …

Enhancing secrecy for NOMA untrusted relay networks with user scheduling and jamming

B He, L Lv, L Yang, J Chen - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
… to validate the secrecy enhancement and the scheduling fairness … NOMA transmission.
Further, to reduce the impact of the jamming signal at the scheduled NU and enhance the secrecy

Enhancing physical layer security with artificial noise in large-scale NOMA networks

C Gong, X Yue, Z Zhang, X Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… 1) We examine the secrecy outage behaviors of an ANaided scheme in a downlink large-scale
NOMA network, where AN is generated by an FD nearby NOMA user to enhance the PLS…