Secrecy Communications for Wireless-Powered Full-Duplex Cooperative NOMA Systems: A User Selection and Friendly Jamming Approach

Y Ren, J Ren, X Zhang, G Lu - 2023 IEEE/CIC International …, 2023 - ieeexplore.ieee.org
This paper studies the secure communications of a wireless-powered full-duplex
cooperative non-orthogonal multiple access (CoNOMA) system with a source node, a group …

Secrecy communication for wireless-powered cooperative NOMA systems with a friendly jammer

Y Ren, X Zhang, P Long, J Wang… - 2022 IEEE Globecom …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the physical layer security of wireless-powered cooperative non-
orthogonal multiple access (NOMA) systems with an energy harvesting (EH) friendly …

Secrecy analysis in NOMA full-duplex relaying networks with artificial jamming

D Li, Y Cao, Z Yang, Y Chen, S Zhang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5 G
and beyond. However, its privacy often suffers from adversarial eavesdropping, especially …

Improving physical layer security of cooperative NOMA system with wireless-powered full-duplex relaying

Y Ren, Y Tan, M Makhanbet, X Zhang - Information, 2021 - mdpi.com
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising
technologies for improving spectral efficiency and energy efficiency, respectively. In this …

Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay

Y Cao, N Zhao, G Pan, Y Chen, L Fan… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of
cell-edge users cannot be guaranteed due to severe channel fading. On the other hand, the …

Power optimization for enhancing secrecy of cooperative user relaying NOMA networks

Y Cao, S Wang, M Jin, N Zhao, C Xing… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
To enhance the secrecy of wireless transmission, we propose a cooperative user relaying
NOMA scheme, in which the near user works in full-duplex mode by transmitting jamming …

Secrecy performance of NOMA systems with energy harvesting and full-duplex relaying

C Guo, L Zhao, C Feng, Z Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper studies the physical layer security for a cooperative non-orthogonal multiple
access system with energy harvesting (EH) and full-duplex (FD) relaying. In particular, the …

Secure performance analysis for full-duplex cooperative NOMA system in the presence of multiple eavesdroppers

N Zaghdoud, AB Mnaouer, WH Alouane… - 2020 International …, 2020 - ieeexplore.ieee.org
This paper investigates the physical layer security of a full-duplex (FD) Decode-and-Forward
(DF) NOMA network assumed to undergo independent and identically distributed Nakagami …

Secrecy Achievable Rate of Two-Way Illegitimate Full-Duplex Relay-Assisted NOMA with CCI

V Ozduran - Wireless Personal Communications, 2023 - Springer
This paper investigates the adverse effects of co-channel interference (CCI) on the secrecy
achievable rate (SAR) performance of illegitimate decode-and-forward full-duplex two-way …

Secrecy analysis for NOMA networks with a full-duplex jamming relay

D Li, Y Cao, J Tang, Y Chen, S Zhang… - 2021 IEEE wireless …, 2021 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5G
and beyond. However, its privacy often suffers from adversarial eavesdropping, especially …