Security enhancement using a novel two-slot cooperative NOMA scheme

B Chen, Y Chen, Y Cao, Y Chen, N Zhao… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this article, we propose a novel cooperative non-orthogonal multiple access (NOMA)
scheme to guarantee the secure transmission of a specific user via two time slots. During the …

Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same resource block to improve the spectral efficiency. Whereas due to the resource …

Improving secrecy for multi‐relay multi‐eavesdropper wireless systems through relay selection

X Ding, T Song, Y Zou, X Chen - Transactions on Emerging …, 2016 - Wiley Online Library
In this paper, we consider a cooperative relay network consisting of a source, a destination
and multiple decode‐and‐forward relays in the presence of multiple eavesdroppers, which …

Secrecy Achievable Rate of Two-Way Illegitimate Full-Duplex Relay-Assisted NOMA with CCI

V Ozduran - Wireless Personal Communications, 2023 - Springer
This paper investigates the adverse effects of co-channel interference (CCI) on the secrecy
achievable rate (SAR) performance of illegitimate decode-and-forward full-duplex two-way …

Secrecy performance of transmit antenna selection with outdated CSI for MIMO relay systems

H Lin, R Zhao, Y He, Y Huang - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
This paper investigates transmit antenna selection (TAS) to improve the secrecy
performances in MIMO secure cooperative relay systems with an adaptive decode-and …

Secure NOMA based full-duplex two-way relay networks with artificial noise against eavesdropping

B Zheng, M Wen, F Chen, J Tang… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
In this paper, we develop a secure non-orthogonal multiple access (NOMA)-based two-way
relay network, in which two users wish to exchange their NOMA signals via a trusted relay in …

A general relaying transmission protocol for MIMO secrecy communications

Z Ding, M Peng, HH Chen - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this paper, we consider a secrecy relaying communication scenario where all nodes are
equipped with multiple antennas. An eavesdropper has the access to the global channel …

Secrecy performance analysis of cooperative nonorthogonal multiple access in IoT networks

A Rauniyar, ON Østerbø, JE Håkegård… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
Differentsystemmodels utilizing nonorthogonal multiple access (NOMA) have been
successfully studied to meet the growing capacity demands of the Internet of Things IoT) …

Secrecy performance analysis of QoS-based non-orthogonal multiple access networks over nakagami-m fading

DD Tran, DB Ha - … Conference on Recent Advances in Signal …, 2018 - ieeexplore.ieee.org
In this paper, we consider the physical layer security of a downlink non-orthogonal multiple
access (NOMA) system, in which users' quality of service (QoS) requirements are …

Secrecy performance analysis of multi-antenna NOMA system with AF/DF relaying under external and internal eavesdropping scenarios

N Zaghdoud, AB Mnaouer, WH Alouane… - 2020 International …, 2020 - ieeexplore.ieee.org
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple
Access (NOMA) users have the capability of decoding the other paired users sharing the …