Physical layer security in MIMO/NOMA in the multiple UEH relaying network with TAS/MRC

T Van Phu, HY Kong - 2019 25th Asia-Pacific Conference on …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the secrecy outage performance of the Non-orthogonal Multiple
Access system (NOMA) in an untrusted relaying energy harvesting (UEH) network with the …

Evaluating the performance of cooperative NOMA with energy harvesting under physical layer security

TA Le, HY Kong - Wireless Personal Communications, 2019 - Springer
In this paper, we consider a non-orthogonal multiple access system with imperfect
successive interference cancellation and physical layer security where the source node …

Secrecy-based energy-efficient mobile edge computing via cooperative non-orthogonal multiple access transmission

L Qian, W Wu, W Lu, Y Wu, B Lin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile edge computing (MEC) has been envisioned as a promising approach for enabling
the computation-intensive yet latency-sensitive mobile Internet services in future wireless …

Secrecy Outage Analysis for Secure DF Cooperative Networks Based Relay Selection Scheme with Non-linear Energy Harvester

Y Chen, F Gao - 2021 IEEE 21st International Conference on …, 2021 - ieeexplore.ieee.org
In this paper, the secrecy outage probability (SOP) for the proposed secure decode-and-
forward (DF) cooperative networks with non-linear energy harvester is investigated. The …

Rate-Splitting Multiple Access for Secure Communications Over CR MISO SWIPT Systems With Non-Linear EH Users

CE Garcia, MR Camana, J Querol… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this paper, we investigate a secure transmission for a rate-splitting multiple-access
(RSMA)-based multiple-input single-output (MISO) underlay cognitive radio (CR) system …

Secrecy rate maximization at near user in untrusted NOMA with trusted DF relay

I Amin, D Mishra, R Saini… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
In this paper, we consider a cooperative non-orthogonal multiple access (NOMA) system
with two untrusted users and a trusted decode-and-forward (DF) relay. We formulate two …

Secrecy outage probability of energy-harvesting cooperative NOMA transmissions with relay selection

A Salem, L Musavian, EA Jorswieck… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Three relay selection techniques, aiming at achieving secure non-orthogonal multiple
access in cooperative energy-harvesting (EH) communications, are proposed and …

Secure STBC-aided NOMA in cognitive IIOT networks

M Li, F El Bouanani, S Muhaidat… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) has been recognized as having the potential to offer
substantial benefit to a wide range of industrial sectors. However, the widespread …

On secure cognitive radio networks with NOMA: Design of multiple-antenna and performance analysis

NL Nguyen, HN Nguyen, NT Nguyen… - … and Techniques in …, 2020 - ieeexplore.ieee.org
This paper presents the secrecy performance of Cognitive Radio (CR) networks by enabling
non-orthogonal multiple access (NOMA) in downlink. The multiple-input and single output …

Secrecy analysis of a cooperative NOMA network using an EH untrusted relay

TA Le, HY Kong - International Journal of Electronics, 2019 - Taylor & Francis
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect
successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is …