Secure transmission in MIMO-NOMA networks

Y Qi, M Vaezi - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
… In this letter, we show that the above secure MIMONOMA channel can be seen as two
interwoven MIMO wiretap channels. In one wiretap channel, user 1 is viewed as a legitimate user, …

Secure transmission via beamforming optimization for NOMA networks

Y Cao, N Zhao, Y Chen, M Jin, Z Ding… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… to secure transmission in NOMA systems. Hence, in this article, secure transmission schemes
… external eavesdropping for downlink multi-input single-output NOMA networks. Using the …

Secure transmission design in HARQ assisted cognitive NOMA networks

Z Xiang, W Yang, Y Cai, Z Ding… - … Forensics and Security, 2020 - ieeexplore.ieee.org
… It is worth noting that we provide a lightweight secure transmission scheme compared with
[24] and [25]. Lightweight PLS mechanisms are urgently required for IoT networks and our …

Secure transmission in a NOMA-assisted IoT network with diversified communication requirements

Z Xiang, W Yang, Y Cai, J Xiong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… access (NOMA) scheme which pairs two types of typical users, ie, delay-sensitive user (DSU)
and security-… We focus on the investigation of the secure transmission for the SRU while …

NOMA in cooperative communication systems with energy-harvesting nodes and wireless secure transmission

A Salem, L Musavian - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
transmissions in two-user NOMA networks, where SWIPT was adopted at the near users to
recharge their batteries was studied in [11]. On the other hand, a cooperative NOMA network

Securing aerial-ground transmission for NOMA-UAV networks

X Chen, D Li, Z Yang, Y Chen, N Zhao, Z Ding… - … Network, 2020 - ieeexplore.ieee.org
… Channel Models: In this article, the secure transmission of NOMA-UAV networks is based
on LoS channels with Rician fading. However, the practical air-to-ground channels are more …

Robust and secure communications in intelligent reflecting surface assisted NOMA networks

Z Zhang, L Lv, Q Wu, H Deng… - IEEE Communications …, 2020 - ieeexplore.ieee.org
… of NOMA increases the design complexity of the transmissionsecure transmission in an
IRS assisted NOMA network with … scheme to secure IRS assisted NOMA transmission, where …

Secure transmission for NOMA systems with imperfect SIC

Z Xiang, X Tong, Y Cai - China Communications, 2020 - ieeexplore.ieee.org
… Considering the imperfect SIC is practical and important in NOMA systems. PLS exploits
the characteristics of wireless channels and interference to ensure secure transmissions by …

Security enhancement for NOMA-UAV networks

N Zhao, Y Li, S Zhang, Y Chen, W Lu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
… -ground channels and higher transmission power of weaker users in NOMA. In this paper…
secure transmission in UAV-NOMA networks. When only one user requires secure transmission

Robust resource allocation for lightweight secure transmission in multicarrier NOMA-assisted full duplex IoT networks

Y Zhang, X Zhao, Z Zhou, P Qin, S Geng… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… cannot be used in FD MC-NOMA systems. Different from the aforementioned research, we
investigate secure transmission in an MC-NOMA-assisted FD IoT network in which the FD GW …