Optimal power allocation for secure non-orthogonal multiple access transmission

W Lu, W Wu, L Qian, Y Wu, N Yu… - 2020 IEEE 92nd …, 2020 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has been considered as a promising scheme for
enabling ultra-high throughput transmission and massive-connectivity in next generation …

AN-aided transmission design for secure MIMO cognitive radio network with SWIPT

X Da, L Ni, H Niu, H Hu, S Yue… - IEICE Transactions on …, 2019 - search.ieice.org
In this work, we investigate a joint transmit beamforming and artificial noise (AN) covariance
matrix design in a multiple-input multiple-output (MIMO) cognitive radio (CR) downlink …

Throughput optimization for noma energy harvesting cognitive radio with multi-UAV-assisted relaying under security constraints

VH Dang, H Tran, TD Ho, C So-In… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
This paper investigates the throughput of a non-orthogonal multiple access (NOMA)-based
cognitive radio (CR) system with multiple unmanned aerial vehicle (UAV)-assisted relays …

Secrecy Analysis in UAV-aided CR-NOMA Networks with Artificial Noise

Y Fu, B Chen, C Liu, K Lin - 2023 9th International Conference …, 2023 - ieeexplore.ieee.org
In this article, physical layer security is investigated in a non-orthogonal multiple access
(NOMA) network with unmanned aerial vehicle (UAV) relay in the context of underlay …

Secrecy performance analysis for fixed-gain energy harvesting in an Internet of Things with untrusted relays

DD Tran, C So-In, H Tran - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of
Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the …

Secrecy capacity maximization for uav aided noma communication networks

LP Qian, W Zhang, H Zhang, Y Wu… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
With the rapid development of wireless communications, it is challenging to guarantee
secure wireless transmission and massive connectivity in the process of data collection. In …

Delay aware secure computation offloading in NOMA aided MEC for IoV networks

L He, Y Chen, M Wen, X Qi, Z Iqbal… - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
In this paper, we investigate a multi-vehicle multi-task non-orthogonal multiple access
(NOMA) based mobile edge computing (MEC) system with passive eavesdropping vehicles …

Power minimization for secure multi-user MISO NOMA system with energy harvesting

J Zhou, Y Sun, Q Cao, S Li, Z Sun… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has been deemed a promising technology to
achieve high spectral efficiency. This paper investigates transmit power optimization for a …

Optimal AI-Enabled Secured NOMA Among Untrusted Users

S Thapar, G Prasad, D Mishra… - 2022 IEEE 96th Vehicular …, 2022 - ieeexplore.ieee.org
To develop a cyber-physical artificial intelligence enabled wireless network, it is essential to
support unprecedented high throughput and efficient spectrum utilization in a practically …

Physical layer security in cognitive radio inspired NOMA network

Z Xiang, W Yang, G Pan, Y Cai… - IEEE Journal of Selected …, 2019 - ieeexplore.ieee.org
This paper investigates physical layer security (PLS) in cognitive radio inspired non-
orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary …