TM Hoang, BC Nguyen, N Van Vinh, GT Luu - Computer Networks, 2023 - Elsevier
This paper analyzes the secrecy attributes of a full-duplex relay (FDR) non-orthogonal multiple access (NOMA) system, where the best relay is chosen from a set of numerous …
In this letter, we investigate the ergodic secrecy sum rate of a two-way relay NOMA system. In particular, by considering decode-and-forward signal processing at the relay and …
S Xu, C Liu, M Qian, H Wang, W Sun - IET Communications, 2021 - Wiley Online Library
Both cooperative non‐orthogonal multiple access (NOMA) and physical layer security (PLS) are promising techniques for future communication systems. This paper investigates the PLS …
C Yu, HL Ko, X Peng, W Xie - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the secrecy outage performance of a typical cooperative downlink non-orthogonal multiple access (NOMA) system over Nakagami-m fading channel …
MS Van Nguyen, DT Do - International Journal of …, 2020 - Wiley Online Library
The secrecy performance of a nonorthogonal multiple access (NOMA) system is examined in this study by employment of a dual‐hop decode‐and‐forward (DF) relay under existence …
N Zaghdoud, WH Alouane… - … on sciences and …, 2019 - ieeexplore.ieee.org
In this paper, we study the secrecy outage probability (SOP) and the strictly positive secrecy capacity (SPSC) of cooperative non-orthogonal multiple access (NOMA) system with a …
J Chen, L Yang, MS Alouini - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
In this correspondence, we investigate the physical layer security for cooperative nonorthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and …
In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of …
E Li, Z Liang, Y Wang, M Zheng - Physical Communication, 2023 - Elsevier
For the security challenges generated by the eavesdroppers existing in wireless communication systems, we propose a model for securely exchanging data between two …