Jamming-aided secrecy performance in secure uplink NOMA system

K Jiang, W Zhou, L Sun - IEEE access, 2020 - ieeexplore.ieee.org
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with
cooperative jammer (s) to improve secrecy performance is studied in this work. We first …

SIC-based secrecy performance in uplink NOMA multi-eavesdropper wiretap channels

K Jiang, T Jing, Y Huo, F Zhang, Z Li - IEEE Access, 2018 - ieeexplore.ieee.org
A new paradigm of uplink non-orthogonal multiple access along with multiple
eavesdroppers to achieve secrecy transmission is studied in this paper. We investigate the …

Exploiting secrecy performance of uplink NOMA in cellular networks

MS Van Nguyen, DT Do, F Afghah, SMR Islam… - IEEE …, 2021 - ieeexplore.ieee.org
We study the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with
single antenna and multi-antenna users in presence of an eavesdropper. Two phases are …

Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We investigate a secrecy-enhancing design for cooperative downlink and uplink non-
orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …

Secure transmission for NOMA systems with imperfect SIC

Z Xiang, X Tong, Y Cai - China Communications, 2020 - ieeexplore.ieee.org
This paper investigates secure transmission for non-orthogonal multiple access (NOMA)
systems where the imperfect successive interference cancellation (SIC) is considered at …

On the security enhancement of uplink NOMA systems with jammer selection

K Cao, B Wang, H Ding, L Lv, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We investigate physical layer security of an uplink NOMA system consisting of one base
station, multiple users and one eavesdropper. During each uplink transmission, two users …

Enhancing PHY-security of FD-enabled NOMA systems using jamming and user selection: Performance analysis and DNN evaluation

K Shim, TN Do, TV Nguyen… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In this article, we study the physical-layer security (PHY-security) improvement method for a
downlink nonorthogonal multiple access (NOMA) system in the presence of an active …

On secrecy performance analysis of multi-antenna STAR-RIS-assisted downlink NOMA systems

S Xu, C Liu, H Wang, M Qian, J Li - EURASIP Journal on Advances in …, 2022 - Springer
To accommodate the stringent requirements of enhanced coverage quality and improved
spectral efficiency, simultaneous transmitting and reflecting reconfigurable intelligent surface …

Secure transmission design for cooperative NOMA in the presence of internal eavesdropping

B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
The application of successive interference cancellation (SIC) introduces critical security risks
to cooperative non-orthogonal multiple access (NOMA) systems in the presence of …

Secrecy performance analysis of QoS-based non-orthogonal multiple access networks over nakagami-m fading

DD Tran, DB Ha - … Conference on Recent Advances in Signal …, 2018 - ieeexplore.ieee.org
In this paper, we consider the physical layer security of a downlink non-orthogonal multiple
access (NOMA) system, in which users' quality of service (QoS) requirements are …