Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same resource block to improve the spectral efficiency. Whereas due to the resource …

Secure transmission via beamforming optimization for NOMA networks

Y Cao, N Zhao, Y Chen, M Jin, Z Ding… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
Owing to the eminent performance gain, non-orthogonal multiple access (NOMA) has been
regarded as a promising approach to achieve high throughput and low latency for the next …

On the security enhancement of uplink NOMA systems with jammer selection

K Cao, B Wang, H Ding, L Lv, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We investigate physical layer security of an uplink NOMA system consisting of one base
station, multiple users and one eavesdropper. During each uplink transmission, two users …

Beamforming design and power allocation for secure transmission with NOMA

Y Feng, S Yan, Z Yang, N Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we propose a novel beamforming design to enhance physical layer security of
a non-orthogonal multiple access (NOMA) system with the aid of artificial noise (AN). The …

Secure transmission for NOMA systems with imperfect SIC

Z Xiang, X Tong, Y Cai - China Communications, 2020 - ieeexplore.ieee.org
This paper investigates secure transmission for non-orthogonal multiple access (NOMA)
systems where the imperfect successive interference cancellation (SIC) is considered at …

Performance of cooperative NOMA systems under passive eavesdropping

BM ElHalawany, R Ruby, T Riihonen… - 2018 IEEE global …, 2018 - ieeexplore.ieee.org
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with
better channel conditions have prior information about the messages of other users. The …

On the secrecy design of STAR-RIS assisted uplink NOMA networks

Z Zhang, J Chen, Y Liu, Q Wu, B He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates the secure transmission in a simultaneously transmitting and
reflecting reconfigurable intelligent surface (STAR-RIS) assisted uplink non-orthogonal …

Physical-layer security of NOMA systems under untrusted users

BM ElHalawany, K Wu - 2018 IEEE global communications …, 2018 - ieeexplore.ieee.org
One of the main characteristics of the power-domain non-orthogonal multiple access
(NOMA) technique is the possibility of users to decode the messages of the other paired …

Optimal relay selection for secure NOMA systems under untrusted users

K Cao, B Wang, H Ding, T Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same frequency band to improve the spectral efficiency. Whereas a security flaw emerges in …

Effective secrecy rate for a downlink NOMA network

W Yu, A Chorti, L Musavian, HV Poor… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, a novel approach is introduced to study the achievable delay-guaranteed
secrecy rate, by introducing the concept of the effective secrecy rate (ESR). This study …