Exploiting adaptive jamming in secure cooperative NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
We study secure communications with an untrusted relay for a cooperative non-orthogonal
multiple access (NOMA) system, where a base station (BS) serves a near user (NU) and a …

Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We investigate a secrecy-enhancing design for cooperative downlink and uplink non-
orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …

Secrecy performance analysis of cooperative NOMA networks with active protection under α-μ fading

TP Huu, H Tran, TX Quach… - … conference on advanced …, 2019 - ieeexplore.ieee.org
In this paper, we analyze the secrecy performance of a cooperative communication wireless
system using nonorthogonal multiple access (NOMA) over α-μ fading channel. A new …

Secure transmission design for cooperative NOMA in the presence of internal eavesdropping

B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
The application of successive interference cancellation (SIC) introduces critical security risks
to cooperative non-orthogonal multiple access (NOMA) systems in the presence of …

Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming

C Yuan, X Tao, N Li, W Ni, RP Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper analyzes the secrecy capacity of a cooperative relaying system using non-
orthogonal multiple access (NOMA). A new cooperative NOMA scheme is proposed, where …

Secrecy analysis for NOMA networks with a full-duplex jamming relay

D Li, Y Cao, J Tang, Y Chen, S Zhang… - 2021 IEEE wireless …, 2021 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5G
and beyond. However, its privacy often suffers from adversarial eavesdropping, especially …

Enhancing secrecy for NOMA untrusted relay networks with user scheduling and jamming

B He, L Lv, L Yang, J Chen - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter investigates secure transmission for a cooperative non-orthogonal multiple
access (NOMA) network consisting of multiple near users (NUs), a far user (FU) and an …

Security optimization of cooperative NOMA networks with friendly jamming

J Li, X Lei, PD Diamantoulakis, L Fan… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
We investigate physical layer security of a downlink cooperative non-orthogonal multiple
access system with an untrusted relay. A friendly jammer (FJ) is employed in order to …

Performance of cooperative NOMA systems under passive eavesdropping

BM ElHalawany, R Ruby, T Riihonen… - 2018 IEEE global …, 2018 - ieeexplore.ieee.org
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with
better channel conditions have prior information about the messages of other users. The …

Full-duplex relay assisted secure transmission for NOMA networks

Y Cao, J Tang, N Zhao, Y Chen… - 2019 IEEE/CIC …, 2019 - ieeexplore.ieee.org
In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of
cell-edge users cannot be guaranteed. On the other hand, the presence of eavesdroppers …