Exploiting adaptive jamming in secure cooperative NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
We study secure communications with an untrusted relay for a cooperative non-orthogonal
multiple access (NOMA) system, where a base station (BS) serves a near user (NU) and a …

Particle swarm optimization-based power allocation scheme for secrecy sum rate maximization in NOMA with cooperative relaying

CE Garcia, MR Camana, I Koo, MA Rahman - International Conference on …, 2019 - Springer
In this paper, we study a particle swarm optimization (PSO)-based power allocation scheme
for physical-layer security under downlink non-orthogonal multiple-access (NOMA) with …

Jamming-aided secrecy performance in secure uplink NOMA system

K Jiang, W Zhou, L Sun - IEEE access, 2020 - ieeexplore.ieee.org
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with
cooperative jammer (s) to improve secrecy performance is studied in this work. We first …

Power optimization for enhancing secrecy of cooperative user relaying NOMA networks

Y Cao, S Wang, M Jin, N Zhao, C Xing… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
To enhance the secrecy of wireless transmission, we propose a cooperative user relaying
NOMA scheme, in which the near user works in full-duplex mode by transmitting jamming …

Performance of cooperative NOMA systems under passive eavesdropping

BM ElHalawany, R Ruby, T Riihonen… - 2018 IEEE global …, 2018 - ieeexplore.ieee.org
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with
better channel conditions have prior information about the messages of other users. The …

Performance analysis of multi-phase cooperative NOMA systems under passive eavesdropping

R Ruby, T Riihonen, K Wu, Y Liu, BM ElHalawany - Signal Processing, 2021 - Elsevier
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with
better channel conditions have prior knowledge about the information of other weak users …

Impact of Antenna Selection on Physical‐Layer Security of NOMA Networks

D Deng, C Li, L Fan, X Liu… - … and Mobile Computing, 2018 - Wiley Online Library
This paper studies the impacts of antenna selection algorithms in decode‐and‐forward (DF)
cooperative nonorthogonal multiple access (NOMA) networks, where the secure information …

Secrecy performance analysis of multi-antenna NOMA system with AF/DF relaying under external and internal eavesdropping scenarios

N Zaghdoud, AB Mnaouer, WH Alouane… - 2020 International …, 2020 - ieeexplore.ieee.org
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple
Access (NOMA) users have the capability of decoding the other paired users sharing the …

Secrecy outage analysis for cooperative NOMA systems with relay selection schemes

H Lei, Z Yang, KH Park, IS Ansari, Y Guo… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
This paper considers the secrecy outage performance of a multiple-relay assisted non-
orthogonal multiple access (NOMA) network over Nakagami-m fading channels. Two time …

Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We investigate a secrecy-enhancing design for cooperative downlink and uplink non-
orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …