Secrecy Analysis and Prediction of Ambient Backscatter NOMA Systems With I/Q Imbalance

J Sun, X Chuai, Y Zeng, X Li - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
In this paper, the reliability and security of ambient backscatter (AmBC) non-orthogonal
multiple access (NOMA) systems on Nakagami-m distribution are studied. When an …

Physical Layer Security of Cooperative NOMA Systems with an Untrusted User

D Jiang, Y Gao, N Sha, X Wang… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) can be combined with physical layer security
technology to greatly improve spectral efficiency while tackling security issues for the …

Secure NOMA based full-duplex two-way relay networks with artificial noise against eavesdropping

B Zheng, M Wen, F Chen, J Tang… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
In this paper, we develop a secure non-orthogonal multiple access (NOMA)-based two-way
relay network, in which two users wish to exchange their NOMA signals via a trusted relay in …

Secure performance analysis for full-duplex cooperative NOMA system in the presence of multiple eavesdroppers

N Zaghdoud, AB Mnaouer, WH Alouane… - 2020 International …, 2020 - ieeexplore.ieee.org
This paper investigates the physical layer security of a full-duplex (FD) Decode-and-Forward
(DF) NOMA network assumed to undergo independent and identically distributed Nakagami …

QoS-aware secrecy rate maximization in untrusted NOMA with trusted relay

I Amin, D Mishra, R Saini, S Aïssa - IEEE Communications …, 2021 - ieeexplore.ieee.org
This letter considers a trusted decode-and-forward relay-assisted two-user non-orthogonal
multiple access (NOMA) communication system, and tackles the secure rate maximization …

Security enhancement using a novel two-slot cooperative NOMA scheme

B Chen, Y Chen, Y Cao, Y Chen, N Zhao… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this article, we propose a novel cooperative non-orthogonal multiple access (NOMA)
scheme to guarantee the secure transmission of a specific user via two time slots. During the …

Secrecy analysis of a cooperative NOMA network using an EH untrusted relay

TA Le, HY Kong - International Journal of Electronics, 2019 - Taylor & Francis
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect
successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is …

Security at physical layer in NOMA relaying networks with cooperative jamming

B Chen, R Li, Q Ning, K Lin, C Han… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this letter, we consider a non-orthogonal multiple access (NOMA) network with a half-
duplex (HD) decode-and-forward (DF) relay to improve physical layer security (PLS) of two …

Outage performance in secure cooperative NOMA

M Abolpour, M Mirmohseni… - 2019 Iran workshop on …, 2019 - ieeexplore.ieee.org
Enabling cooperation in a NOMA system is a promising approach to improve its
performance. In this paper, we study the cooperation in a secure NOMA system, where the …

On secrecy analysis of UAV-enabled relaying NOMA systems

J Zhang, X Zheng, G Pan, Y Xie - Physical Communication, 2021 - Elsevier
In this paper, we analyze the secrecy outage performance for an unmanned aerial vehicle
(UAV)-enabled relaying non-orthogonal multiple access (NOMA) system, in which a source …