Secrecy analysis of ambient backscatter NOMA systems under I/Q imbalance

X Li, M Zhao, Y Liu, L Li, Z Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this correspondence, we investigate the reliability and the security of the ambient
backscatter (AmBC) non-orthogonal multiple access (NOMA) systems, where the source …

A secure downlink NOMA scheme against unknown internal eavesdroppers

A Abushattal, S Althunibat, M Qaraqe… - IEEE Wireless …, 2021 - ieeexplore.ieee.org
Enhancing security level against potential internal eavesdroppers in Non-Orthogonal
Multiple Access (NOMA) has been reported as a serious challenge. In this letter, a novel …

Secure transmission design for cooperative NOMA in the presence of internal eavesdropping

B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
The application of successive interference cancellation (SIC) introduces critical security risks
to cooperative non-orthogonal multiple access (NOMA) systems in the presence of …

Physical-layer security of NOMA systems under untrusted users

BM ElHalawany, K Wu - 2018 IEEE global communications …, 2018 - ieeexplore.ieee.org
One of the main characteristics of the power-domain non-orthogonal multiple access
(NOMA) technique is the possibility of users to decode the messages of the other paired …

Secure outage analysis for cooperative NOMA systems with antenna selection

X Pei, H Yu, M Wen, Q Li, Z Ding - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The secrecy outage probability (SOP) performance is investigated for a cooperative non-
orthogonal multiple access system under eavesdropping attack, where a base station …

Enhancing physical layer security with artificial noise in large-scale NOMA networks

C Gong, X Yue, Z Zhang, X Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates the secrecy outage performance for a large-scale downlink system
with full-duplex (FD) non-orthogonal multiple access (NOMA) transmission aided by artificial …

Beamforming design and power allocation for secure transmission with NOMA

Y Feng, S Yan, Z Yang, N Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we propose a novel beamforming design to enhance physical layer security of
a non-orthogonal multiple access (NOMA) system with the aid of artificial noise (AN). The …

Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same resource block to improve the spectral efficiency. Whereas due to the resource …

Secure communications in a unified non-orthogonal multiple access framework

X Yue, Y Liu, Y Yao, X Li, R Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper investigates the impact of physical layer secrecy on the performance of a unified
non-orthogonal multiple access (NOMA) framework, where both external and internal …

Optimal relay selection for secure NOMA systems under untrusted users

K Cao, B Wang, H Ding, T Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same frequency band to improve the spectral efficiency. Whereas a security flaw emerges in …