Secure primary transmission assisted by a secondary full-duplex NOMA relay

B Chen, Y Chen, Y Chen, Y Cao, Z Ding… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In this paper, secure primary transmission is proposed by using a multi-antenna secondary
full-duplex non-orthogonal multiple access (NOMA) relay in cognitive radio (CR) networks …

Secure transmission for NOMA-based cognitive radio networks with imperfect CSI

Z Shang, T Zhang, G Hu, Y Cai… - IEEE Communications …, 2021 - ieeexplore.ieee.org
This letter studies the secure transmission issue of non-orthogonal multiple access (NOMA)
based cognitive radio networks (CRNs) with imperfect channel state information (CSI) …

Secrecy analysis in NOMA full-duplex relaying networks with artificial jamming

D Li, Y Cao, Z Yang, Y Chen, S Zhang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5 G
and beyond. However, its privacy often suffers from adversarial eavesdropping, especially …

Non-orthogonal multiple access and artificial-noise aided secure transmission in FD relay networks

Y Feng, Z Yang, S Yan - 2017 IEEE Globecom workshops (GC …, 2017 - ieeexplore.ieee.org
In this paper, we investigate an artificial-noise (AN) aided secure transmission for non-
orthogonal multiple access (NOMA) full-duplex (FD) relay network. We propose a novel joint …

Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers

NL Cuong, TM Hoang, NT Phuong, PT Hiep - Wireless Networks, 2022 - Springer
Full-duplex (FD) relay systems including a transmit antenna selection and a non-orthogonal
multiple access (NOMA) methods are analyzed under presence of multiple eavesdroppers …

Secure NOMA based two-way relay networks using artificial noise and full duplex

B Zheng, M Wen, CX Wang, X Wang… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
In this paper, we develop a non-orthogonal multiple access (NOMA)-based two-way relay
network with secrecy considerations, in which two users wish to exchange their NOMA …

Security enhancement using a novel two-slot cooperative NOMA scheme

B Chen, Y Chen, Y Cao, Y Chen, N Zhao… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this article, we propose a novel cooperative non-orthogonal multiple access (NOMA)
scheme to guarantee the secure transmission of a specific user via two time slots. During the …

Physical layer security in cognitive radio inspired NOMA network

Z Xiang, W Yang, G Pan, Y Cai… - IEEE Journal of Selected …, 2019 - ieeexplore.ieee.org
This paper investigates physical layer security (PLS) in cognitive radio inspired non-
orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary …

Secure beamforming for MIMO-NOMA-based cognitive radio network

N Nandan, S Majhi, HC Wu - IEEE Communications Letters, 2018 - ieeexplore.ieee.org
Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) play the crucial
roles in the fifth generation wireless communication systems. However, the physical-layer …

Relay selection and power allocation for secrecy sum rate maximization in underlying cognitive radio with cooperative relaying NOMA

CE Garcia, MR Camana, I Koo - Neurocomputing, 2021 - Elsevier
Cooperative communication that integrates cognitive radio and non-orthogonal multiple
access is recognized as an emerging technology for fifth-generation and beyond wireless …