Security analysis of multi-antenna NOMA networks under I/Q imbalance

X Li, M Zhao, C Zhang, WU Khan, J Wu, KM Rabie… - Electronics, 2019 - mdpi.com
This paper investigates the reliability and security performance of the downlink non-
orthogonal multiple access (NOMA) networks over Nakagami-m fading channels, where the …

NOMA-assisted multiple access scheme for IoT deployment: Relay selection model and secrecy performance improvement

DT Do, MS Van Nguyen, TA Hoang, M Voznak - Sensors, 2019 - mdpi.com
In this paper, an Internet-of-Things (IoT) system containing a relay selection is studied as
employing an emerging multiple access scheme, namely non-orthogonal multiple access …

Secrecy sum rate optimization for downlink MIMO nonorthogonal multiple access systems

M Tian, Q Zhang, S Zhao, Q Li… - IEEE Signal Processing …, 2017 - ieeexplore.ieee.org
Nonorthogonal multiple access (NOMA) is expected to be a promising technique for future
wireless networks. In this letter, we investigate the secrecy sum rate optimization problem for …

On secure NOMA-based terrestrial and aerial IoT systems

H Lei, C Zhu, KH Park, W Lei, IS Ansari… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
In this article, we study the secure communication performance of nonorthogonal multiple
access (NOMA) communication systems with aerial eavesdroppers. First, the ground-to …

Ergodic performance of downlink untrusted NOMA system with imperfect SIC

PK Hota, S Thapar, D Mishra, R Saini… - IEEE Communications …, 2021 - ieeexplore.ieee.org
In this letter, the ergodic performance of a non-orthogonal multiple access (NOMA) system
with untrusted users and imperfect successive interference cancellation based decoding is …

On secure NOMA-aided semi-grant-free systems

H Lei, F Yang, H Liu, IS Ansari, KJ Kim… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource
blocks allocated for grant-based (GB) users while maintaining the quality of service of GB …

Enhancing secrecy for NOMA untrusted relay networks with user scheduling and jamming

B He, L Lv, L Yang, J Chen - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter investigates secure transmission for a cooperative non-orthogonal multiple
access (NOMA) network consisting of multiple near users (NUs), a far user (FU) and an …

Physical layer security designs for 5G NOMA systems with a stronger near-end internal eavesdropper

C Zhang, F Jia, Z Zhang, J Ge… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Serial interference cancellation (SIC) technology is the key to ensure a higher system
capacity for NOMA. However, SIC may also introduce some critical security risks, since it …

Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming

C Yuan, X Tao, N Li, W Ni, RP Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper analyzes the secrecy capacity of a cooperative relaying system using non-
orthogonal multiple access (NOMA). A new cooperative NOMA scheme is proposed, where …

Secure Transmit Antenna Selection Protocol for MIMO NOMA Networks Over Nakagami-m Channels

DD Tran, HV Tran, DB Ha, G Kaddoum - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
In this paper, we consider a multi-input multioutput (MIMO) nonorthogonal multiple access
(NOMA) network consisting of one source and two legitimate users (LUs), so-called near …