Secrecy performance analysis of uplink NOMA in IoT networks

Z Xiang, W Yang, Y Cai, Y Cheng… - 2018 IEEE/CIC …, 2018 - ieeexplore.ieee.org
This paper investigates physical layer security (PLS) of uplink non-orthogonal multiple
access (NOMA) in Internet of Things (IoT) networks, where two devices transmit secret …

Physical layer security for weak user in MISO NOMA using directional modulation (NOMAD)

RM Christopher, DK Borah - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter investigates the physical layer security of the data from the weak user (WU)
against interception by the strong user (SU) in non-orthogonal multiple access (NOMA) …

Enhancing PHY-security of FD-enabled NOMA systems using jamming and user selection: Performance analysis and DNN evaluation

K Shim, TN Do, TV Nguyen… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In this article, we study the physical-layer security (PHY-security) improvement method for a
downlink nonorthogonal multiple access (NOMA) system in the presence of an active …

Secure performance of AF and DF relaying in cooperative NOMA systems

N Zaghdoud, WH Alouane… - … on sciences and …, 2019 - ieeexplore.ieee.org
In this paper, we study the secrecy outage probability (SOP) and the strictly positive secrecy
capacity (SPSC) of cooperative non-orthogonal multiple access (NOMA) system with a …

On the secrecy design of STAR-RIS assisted uplink NOMA networks

Z Zhang, J Chen, Y Liu, Q Wu, B He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates the secure transmission in a simultaneously transmitting and
reflecting reconfigurable intelligent surface (STAR-RIS) assisted uplink non-orthogonal …

Covert and secure communications in NOMA networks with internal eavesdropping

Q Li, D Xu, K Navaie, Z Ding - IEEE Wireless Communications …, 2023 - ieeexplore.ieee.org
This letter proposes a joint covert and secure transmission scheme in the non-orthogonal
multiple access (NOMA) networks against internal eavesdropping and external monitoring …

Secrecy performance analysis of relay selection in cooperative NOMA systems

Z Wang, Z Peng - IEEE Access, 2019 - ieeexplore.ieee.org
This paper investigates the security performance of two relay selection schemes for
cooperative non-orthogonal multiple access (NOMA) systems, where K randomly distributed …

Security improvement with QoS provisioning using service priority and power allocation for NOMA-IoT networks

W Khalid, H Yu - IEEE Access, 2021 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has gained attention as a promising multiple
access scheme for the Internet of Things (IoT). A typical setting of user ordering in NOMA …

Power optimization for enhancing secrecy of cooperative user relaying NOMA networks

Y Cao, S Wang, M Jin, N Zhao, C Xing… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
To enhance the secrecy of wireless transmission, we propose a cooperative user relaying
NOMA scheme, in which the near user works in full-duplex mode by transmitting jamming …

A downlink non-orthogonal multiple access scheme having physical layer security

N Horiike, E Okamoto, T Yamamoto - EURASIP Journal on Wireless …, 2018 - Springer
In recent years, the standardization for the fifth generation (5G) mobile communication
systems has been actively discussed, and it is expected that a large number of wireless …