In this paper, we study a particle swarm optimization (PSO)-based power allocation scheme for physical-layer security under downlink non-orthogonal multiple-access (NOMA) with …
K Jiang, W Zhou, L Sun - IEEE access, 2020 - ieeexplore.ieee.org
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer (s) to improve secrecy performance is studied in this work. We first …
To enhance the secrecy of wireless transmission, we propose a cooperative user relaying NOMA scheme, in which the near user works in full-duplex mode by transmitting jamming …
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better channel conditions have prior information about the messages of other users. The …
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better channel conditions have prior knowledge about the information of other weak users …
D Deng, C Li, L Fan, X Liu… - … and Mobile Computing, 2018 - Wiley Online Library
This paper studies the impacts of antenna selection algorithms in decode‐and‐forward (DF) cooperative nonorthogonal multiple access (NOMA) networks, where the secure information …
N Zaghdoud, AB Mnaouer, WH Alouane… - 2020 International …, 2020 - ieeexplore.ieee.org
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOMA) users have the capability of decoding the other paired users sharing the …
H Lei, Z Yang, KH Park, IS Ansari, Y Guo… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
This paper considers the secrecy outage performance of a multiple-relay assisted non- orthogonal multiple access (NOMA) network over Nakagami-m fading channels. Two time …
We investigate a secrecy-enhancing design for cooperative downlink and uplink non- orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …