A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better channel conditions have prior information about the messages of other users. The …
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better channel conditions have prior knowledge about the information of other weak users …
N Zaghdoud, AB Mnaouer, WH Alouane… - 2020 International …, 2020 - ieeexplore.ieee.org
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOMA) users have the capability of decoding the other paired users sharing the …
We study secure communications with an untrusted relay for a cooperative non-orthogonal multiple access (NOMA) system, where a base station (BS) serves a near user (NU) and a …
N Zaghdoud, AB Mnaouer… - 2020 IEEE 45th LCN …, 2020 - ieeexplore.ieee.org
In 5G and beyond wireless communication net-works, non-orthogonal multiple access (NOMA) and Full-Duplex (FD) techniques are considered as promising key techniques …
B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of …
Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5G and beyond. However, its privacy often suffers from adversarial eavesdropping, especially …
N Zaghdoud, WH Alouane, H Boujemaa… - … & Mobile Computing …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of an Amplify-and-Forward (AF) relay in a cooperative NOMA system. The AF relay ensures the transmission of the signal in the …
S Sharma, SD Roy, S Kundu - 2020 National Conference on …, 2020 - ieeexplore.ieee.org
We have proposed and analyzed secrecy performance of a network architecture which contains a source, two destinations, a friendly jammer (FJ) and an eavesdropper (Eve). To …