Secure transmission design for cooperative NOMA in the presence of internal eavesdropping

B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
The application of successive interference cancellation (SIC) introduces critical security risks
to cooperative non-orthogonal multiple access (NOMA) systems in the presence of …

Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We investigate a secrecy-enhancing design for cooperative downlink and uplink non-
orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …

Secrecy Outage Performance Analysis for Cooperative NOMA Over Nakagami- Channel

C Yu, HL Ko, X Peng, W Xie - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the secrecy outage performance of a typical cooperative
downlink non-orthogonal multiple access (NOMA) system over Nakagami-m fading channel …

Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming

C Yuan, X Tao, N Li, W Ni, RP Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper analyzes the secrecy capacity of a cooperative relaying system using non-
orthogonal multiple access (NOMA). A new cooperative NOMA scheme is proposed, where …

Enhancing secrecy for NOMA untrusted relay networks with user scheduling and jamming

B He, L Lv, L Yang, J Chen - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter investigates secure transmission for a cooperative non-orthogonal multiple
access (NOMA) network consisting of multiple near users (NUs), a far user (FU) and an …

Power allocation‐Assisted secrecy analysis for NOMA enabled cooperative network under multiple eavesdroppers

VN Nayak, KK Gurrala - ETRI Journal, 2021 - Wiley Online Library
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple
access (NOMA)‐enabled decode‐and‐forward (DF) relay network is investigated with the …

Power optimization for enhancing secrecy of cooperative user relaying NOMA networks

Y Cao, S Wang, M Jin, N Zhao, C Xing… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
To enhance the secrecy of wireless transmission, we propose a cooperative user relaying
NOMA scheme, in which the near user works in full-duplex mode by transmitting jamming …

Secure NOMA based cooperative networks with rate-splitting source and full-duplex relay

B Zheng, F Chen, M Wen, Q Li, Y Liu… - 2018 15th International …, 2018 - ieeexplore.ieee.org
In this paper, we develop a non-orthogonal multiple access (NOMA)-based cooperative
network against multiple eavesdroppers, in which the source delivers confidential …

Secure outage analysis for cooperative NOMA systems with antenna selection

X Pei, H Yu, M Wen, Q Li, Z Ding - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The secrecy outage probability (SOP) performance is investigated for a cooperative non-
orthogonal multiple access system under eavesdropping attack, where a base station …

Jammer-aided secure communications for cooperative NOMA systems

C Yu, HL Ko, X Peng, W Xie… - IEEE Communications …, 2019 - ieeexplore.ieee.org
This letter investigates a jammer-aided cooperative non-orthogonal multiple access (NOMA)
system, where one relay is used to deliver information and other relays are acted as …