DD Tran, DB Ha - … Conference on Recent Advances in Signal …, 2018 - ieeexplore.ieee.org
In this paper, we consider the physical layer security of a downlink non-orthogonal multiple access (NOMA) system, in which users' quality of service (QoS) requirements are …
A new design of non-orthogonal multiple access (NOMA) is explored in this study under secrecy outage probability performance considerations. In particular, the Amplify-and …
Z Xiang, X Tong, Y Cai - China Communications, 2020 - ieeexplore.ieee.org
This paper investigates secure transmission for non-orthogonal multiple access (NOMA) systems where the imperfect successive interference cancellation (SIC) is considered at …
O Abbasi, A Ebrahimi - 2017 Iran workshop on communication …, 2017 - ieeexplore.ieee.org
In 5G wireless communication networks, Non-Orthogonal Multiple Access (NOMA) has attracted much attention in recent years. This paper investigates physical layer security of a …
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better channel conditions have prior information about the messages of other users. The …
In this work, we investigate the relationship between the reliability and security of a typical two-user downlink non-orthogonal multiple access (NOMA) communication system. The …
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing high data rates in 5G systems. This letter is to study physical layer security in a …
Y Feng, S Yan, Z Yang - IEEE Communications Letters, 2018 - ieeexplore.ieee.org
With non-orthogonal multiple access (NOMA) in a passive eavesdropping scenario, we tackle the maximization of the secrecy rate for the strong user subject to a maximum …
This paper proposes a new design of non-orthogonal multiple access (NOMA) under secrecy considerations. We focus on a NOMA system, where a transmitter sends confidential …