Outage probability and secrecy capacity of a non-orthogonal multiple access system

TMC Chu, HJ Zepernick - 2017 11th International Conference …, 2017 - ieeexplore.ieee.org
In this paper, we analyze the outage probability and secrecy capacity of a non-orthogonal
multiple access (NOMA) system in the presence of an eavesdropper. In order to enhance …

Secrecy performance analysis of QoS-based non-orthogonal multiple access networks over nakagami-m fading

DD Tran, DB Ha - … Conference on Recent Advances in Signal …, 2018 - ieeexplore.ieee.org
In this paper, we consider the physical layer security of a downlink non-orthogonal multiple
access (NOMA) system, in which users' quality of service (QoS) requirements are …

[PDF][PDF] Exploring Secrecy Outage Probability of AF-NOMA and AF-OMA Networks.

DT Do, MS Van Nguyen - J. Commun., 2019 - jocm.us
A new design of non-orthogonal multiple access (NOMA) is explored in this study under
secrecy outage probability performance considerations. In particular, the Amplify-and …

Secure transmission for NOMA systems with imperfect SIC

Z Xiang, X Tong, Y Cai - China Communications, 2020 - ieeexplore.ieee.org
This paper investigates secure transmission for non-orthogonal multiple access (NOMA)
systems where the imperfect successive interference cancellation (SIC) is considered at …

Secrecy analysis of a NOMA system with full duplex and half duplex relay

O Abbasi, A Ebrahimi - 2017 Iran workshop on communication …, 2017 - ieeexplore.ieee.org
In 5G wireless communication networks, Non-Orthogonal Multiple Access (NOMA) has
attracted much attention in recent years. This paper investigates physical layer security of a …

Performance of cooperative NOMA systems under passive eavesdropping

BM ElHalawany, R Ruby, T Riihonen… - 2018 IEEE global …, 2018 - ieeexplore.ieee.org
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with
better channel conditions have prior information about the messages of other users. The …

On secure downlink NOMA systems with outage constraint

H Lei, R Gao, KH Park, IS Ansari… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this work, we investigate the relationship between the reliability and security of a typical
two-user downlink non-orthogonal multiple access (NOMA) communication system. The …

Secrecy sum rate maximization in non-orthogonal multiple access

Y Zhang, HM Wang, Q Yang… - IEEE Communications …, 2016 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for
providing high data rates in 5G systems. This letter is to study physical layer security in a …

Secure transmission to the strong user in non-orthogonal multiple access

Y Feng, S Yan, Z Yang - IEEE Communications Letters, 2018 - ieeexplore.ieee.org
With non-orthogonal multiple access (NOMA) in a passive eavesdropping scenario, we
tackle the maximization of the secrecy rate for the strong user subject to a maximum …

On the design of secure non-orthogonal multiple access systems

B He, A Liu, N Yang, VKN Lau - IEEE Journal on Selected …, 2017 - ieeexplore.ieee.org
This paper proposes a new design of non-orthogonal multiple access (NOMA) under
secrecy considerations. We focus on a NOMA system, where a transmitter sends confidential …