Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems

GB Satrya, SY Shin - Physical Communication, 2019 - Elsevier
… improve the secrecy performance of the large-scale networks where no … NOMA networks
can be improved and (2) the asymptotic secrecy outage probability is close to the exact secrecy

Artificial noise aided secure communications for cooperative NOMA networks

Z Cao, X Ji, J Wang, W Wang… - … and Networking, 2021 - ieeexplore.ieee.org
NOMA enabled wireless networks. As such, we consider a cooperative NOMA network, where
a source uses the NOMA … eavesdropping in this cooperative NOMA network, we propose a …

Secrecy at physical layer in NOMA with cooperative jamming

S Sharma, SD Roy, S Kundu - 2020 National Conference on …, 2020 - ieeexplore.ieee.org
… the NOMA technique. We analyzed the physical layer security of the network in terms of the
secrecy outage probability (SOP) where the two users have different target secrecy rates. A …

Enhancing the physical layer security of cooperative NOMA system

A Li - 2019 IEEE 3rd information technology, networking …, 2019 - ieeexplore.ieee.org
… Therefore, Based on the benefits of both relay networks and NOMA concept, this paper
investigates a new scheme adopting joint NOMA and two-stage relay selection. AF protocol and …

[HTML][HTML] NOMA-assisted multiple access scheme for IoT deployment: Relay selection model and secrecy performance improvement

DT Do, MS Van Nguyen, TA Hoang, M Voznak - Sensors, 2019 - mdpi.com
enhanced performance at NOMA receivers. In this scenario, we use the secrecy probability
to measure the secrecy performance of the system since the perfect secrecy rate is usually …

Physical layer security analysis for RIS-aided NOMA systems with non-colluding eavesdroppers

AT Le, TD Hieu, TN Nguyen, TL Le, SQ Nguyen… - Computer …, 2024 - Elsevier
… been on enhancing the security aspects of the NOMA network … centered on the downlink
NOMA network. We highlight two … selection and adjustment of secrecy performance for each user…

Secrecy performance analysis of relay selection in cooperative NOMA systems

Z Wang, Z Peng - IEEE Access, 2019 - ieeexplore.ieee.org
… Apart from enhancing the system performance, NOMA guarantees high fairness
requirements of multiple users through appropriate power allocation scheduling [9, 10]. …

NOMA-assisted secure short-packet communications in IoT

Z Xiang, W Yang, Y Cai, Z Ding… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
… 2, we plot the illustration of the NOMA network with short-packet communications. In Fig. 2,
multiple users are sorted by their channel gains, ie, |h1|2 >  > |hk|2 >  > |hK|2, where …

Covert and Secure Communications in NOMA Networks with Internal Eavesdropping

Q Li, D Xu, K Navaie, Z Ding - IEEE Wireless Communications …, 2023 - ieeexplore.ieee.org
… In the NOMA network, the sender transmitted the signals using the random transmit power
to confuse the adversary, which enhanced the covert rate of the NOMA user [12]. Even more …

Joint security enhancement and PAPR mitigation for OFDM-NOMA VLC systems

Y Wu, Y Hu, Z Wan, T Wang, Y Sun, Q Zhang - Optics Communications, 2022 - Elsevier
secrecy performance are provided. Expressions of the secrecy outage probability (SOP) is
derived for NOMA … ], which can serve as a benchmark of the secrecy performance. While in [8], …