Joint beamforming and jamming optimization for secure transmission in MISO-NOMA networks

N Zhao, W Wang, J Wang, Y Chen, Y Lin… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has been developed as a key multi-access
technique for 5G. However, secure transmission remains a challenge in NOMA. Especially …

Security optimization of cooperative NOMA networks with friendly jamming

J Li, X Lei, PD Diamantoulakis, L Fan… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
We investigate physical layer security of a downlink cooperative non-orthogonal multiple
access system with an untrusted relay. A friendly jammer (FJ) is employed in order to …

Jammer-aided secure communications for cooperative NOMA systems

C Yu, HL Ko, X Peng, W Xie… - IEEE Communications …, 2019 - ieeexplore.ieee.org
This letter investigates a jammer-aided cooperative non-orthogonal multiple access (NOMA)
system, where one relay is used to deliver information and other relays are acted as …

Secrecy performance analysis of cooperative nonorthogonal multiple access in IoT networks

A Rauniyar, ON Østerbø, JE Håkegård… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
Differentsystemmodels utilizing nonorthogonal multiple access (NOMA) have been
successfully studied to meet the growing capacity demands of the Internet of Things IoT) …

Secure transmission in a NOMA-assisted IoT network with diversified communication requirements

Z Xiang, W Yang, Y Cai, J Xiong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Considering the diversified communication requirements in the Internet-of-Things (IoT)
networks, this article proposes a nonorthogonal multiple access (NOMA) scheme which …

Safeguarding non-orthogonal multiple access with physical layer techniques

Y Feng, S Yan, N Yang, Z Yang, J Yuan - IEEE Network, 2022 - ieeexplore.ieee.org
This article clarifies pivotal security issues in the context of non-orthogonal multiple access
(NOMA) technology and presents potential methodologies to address them at the physical …

Decoding orders for securing untrusted NOMA

S Thapar, D Mishra, R Saini - IEEE Networking Letters, 2021 - ieeexplore.ieee.org
This letter focuses on exploring a new decoding order to resolve the secrecy issue among
untrusted non-orthogonal multiple access users. In this context, firstly, we identify the total …

Secure transmission to the strong user in non-orthogonal multiple access

Y Feng, S Yan, Z Yang - IEEE Communications Letters, 2018 - ieeexplore.ieee.org
With non-orthogonal multiple access (NOMA) in a passive eavesdropping scenario, we
tackle the maximization of the secrecy rate for the strong user subject to a maximum …

Secrecy Rate Maximization for Active RIS-Aided Robust Uplink NOMA Communications

S Singh, A Raviteja, K Singh, SK Singh… - IEEE Wireless …, 2024 - ieeexplore.ieee.org
In this work, we investigate the performance of an active reconfigurable intelligent surface
(RIS)-aided uplink non-orthogonal multiple access (NOMA) network in the presence of an …

Optimization for maximizing sum secrecy rate in SWIPT-enabled NOMA systems

J Tang, T Dai, M Cui, XY Zhang, A Shojaeifard… - IEEE …, 2018 - ieeexplore.ieee.org
In this paper, we study secrecy simultaneous wireless information and power transfer
(SWIPT) in downlink non-orthogonal multiple access (NOMA) systems comprising a base …