Performance of cooperative NOMA systems under passive eavesdropping

BM ElHalawany, R Ruby, T Riihonen… - 2018 IEEE global …, 2018 - ieeexplore.ieee.org
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with
better channel conditions have prior information about the messages of other users. The …

Secure outage analysis for cooperative NOMA systems with antenna selection

X Pei, H Yu, M Wen, Q Li, Z Ding - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The secrecy outage probability (SOP) performance is investigated for a cooperative non-
orthogonal multiple access system under eavesdropping attack, where a base station …

Enhancing secrecy performance of cooperative NOMA-based IoT networks via multiantenna-aided artificial noise

R Ruby, QV Pham, K Wu, AA Heidari… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the increasing demand for security in many sectors, such as defense and health
systems, developing secure Internet of Things (IoT) networks is a matter of great urgency …

Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system

Y Jin, Z Hu, D Xie, G Wu, L Zhou - EURASIP Journal on Wireless …, 2021 - Springer
Aiming at high energy consumption and information security problem in the simultaneous
wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a …

Effective secrecy rate for a downlink NOMA network

W Yu, A Chorti, L Musavian, HV Poor… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, a novel approach is introduced to study the achievable delay-guaranteed
secrecy rate, by introducing the concept of the effective secrecy rate (ESR). This study …

[HTML][HTML] Covert communication for cooperative NOMA with two phases detection

H Peng, Z Tian, X Li, W Wang, G Nauryzbayev… - Alexandria Engineering …, 2023 - Elsevier
This paper investigates the covert communication of cooperative non-orthogonal multiple
access (NOMA) systems, where the near user serves as a decode-and-forward (DF) relay …

Physical layer security for UAV-based full-duplex relay NOMA system

TT Nguyen, TTH Le, XN Tran - … International Conference on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of an unmanned aerial vehicle (UAV)-
based full-duplex (FD) relay non-orthogonal multiple access (NOMA) system over the …

Secrecy enhancement in two-hop DF relaying system under hardware impairment

SQ Nguyen, HY Kong - International Journal of Electronics, 2017 - Taylor & Francis
In this paper, we investigate joint jammer selection and network coding for secrecy
enhancement under transceiver hardware impairment. We propose two protocols of joint …

Secrecy at physical layer in NOMA with cooperative jamming

S Sharma, SD Roy, S Kundu - 2020 National Conference on …, 2020 - ieeexplore.ieee.org
We have proposed and analyzed secrecy performance of a network architecture which
contains a source, two destinations, a friendly jammer (FJ) and an eavesdropper (Eve). To …

Security-reliability analysis of noma-based multi-hop relay networks in presence of an active eavesdropper with imperfect eavesdropping CSI

TT Phu, TD Tran, M Voznak - Advances in Electrical and …, 2017 - advances.vsb.cz
In this paper, we evaluate system performances of a multi-hop relay protocol with presence
of an active eavesdropper. In the proposed protocol, a source attempts to transmit its data to …