Reinforcement learning-based NOMA power allocation in the presence of smart jamming

L Xiao, Y Li, C Dai, H Dai… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Nonorthogonal multiple access (NOMA) systems are vulnerable to jamming attacks,
especially smart jammers who apply programmable and smart radio devices such as …

[HTML][HTML] Secure transmission in backhaul NOMA systems: A physical layer security design with untrusted user and eavesdropper

CB Le, DT Do, M Voznak - Digital Communications and Networks, 2022 - Elsevier
In order to improve the Physical Layer Security (PLS) perspective, this paper aims to
empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access …

Secrecy analysis of ambient backscatter NOMA systems under I/Q imbalance

X Li, M Zhao, Y Liu, L Li, Z Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this correspondence, we investigate the reliability and the security of the ambient
backscatter (AmBC) non-orthogonal multiple access (NOMA) systems, where the source …

Exploiting Secure Multi-Hop Transmissions with NOMA Networks: Performance Analysis

Y Pramitarini, RHY Perdana, K Shim… - … Conference on Artificial …, 2024 - ieeexplore.ieee.org
In this paper, we analyze the secrecy performance of secure multi-hop transmission for the
NOMA system. More specifically, the multi-hop transmission can extend the coverage of …

Defeating jamming attacks in downlink pairwise noma using relaying

VL Dao, S Girs, E Uhlemann - 2023 IEEE 34th Annual …, 2023 - ieeexplore.ieee.org
This study explores an incremental relaying strategy in downlink pairwise Non-Orthogonal
Multiple Access (NOMA), which involves multiple pairs of nodes near and far from the …

Physical layer security in power-domain NOMA using improper Gaussian signals

M Sfredo, EMG Fernandez… - 2021 IEEE 94th Vehicular …, 2021 - ieeexplore.ieee.org
Spectrum sharing and successive interference cancellation (SIC) techniques used in power-
domain non-orthogonal multiple access (NOMA) systems impose secrecy challenges …

Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same resource block to improve the spectral efficiency. Whereas due to the resource …

Security performance analysis for power domain NOMA employing in cognitive radio networks

TA Hoang, CB Le, DT Do - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
The power domain non-orthogonal multiple access (NOMA) technique introduces one of the
fundamental characteristics and it exhibits the possibility of users to decode the messages of …

Exploiting adaptive jamming in secure cooperative NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
We study secure communications with an untrusted relay for a cooperative non-orthogonal
multiple access (NOMA) system, where a base station (BS) serves a near user (NU) and a …

Secrecy outage probability and fairness of packet transmission time in a NOMA system

TP Huu, TN Thi-Thanh, C Nguyen-Yen, H Tran… - IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we analyze the secrecy outage probability (SOP) and the fairness of average
packet transmission time for a non-orthogonal multiple access (NOMA) system which …