In this paper, a novel approach is introduced to study the achievable delay-guaranteed secrecy rate, by introducing the concept of the effective secrecy rate (ESR). This study …
S Xu, C Liu, H Wang, M Qian, J Li - EURASIP Journal on Advances in …, 2022 - Springer
To accommodate the stringent requirements of enhanced coverage quality and improved spectral efficiency, simultaneous transmitting and reflecting reconfigurable intelligent surface …
F Jia, C Zhang, C Jiang, M Li… - IEEE Communications …, 2021 - ieeexplore.ieee.org
Non-orthogonal multiple access systems will face serious physical layer security (PLS) problems in the present of internal eavesdropper. However, in the existing schemes, it's …
J Chen, L Yang, MS Alouini - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
In this correspondence, we investigate the physical layer security for cooperative nonorthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and …
K Jiang, W Zhou, L Sun - IEEE access, 2020 - ieeexplore.ieee.org
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer (s) to improve secrecy performance is studied in this work. We first …
Observing the significance of spectrally-efficient secure non-orthogonal multiple access (NOMA), this paper proposes a novel quality of service (QoS) aware secure NOMA protocol …
L Lv, Z Ding, Q Ni, J Chen - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
This correspondence studies a new secrecy beamforming (SBF) scheme for multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems. In particular, the …
N Zhao, D Li, M Liu, Y Cao, Y Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is a prospective technology for radio resource constrained future mobile networks. However, NOMA users far from a base station (BS) tend …
We investigate a secrecy-enhancing design for cooperative downlink and uplink non- orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …