We study the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with single antenna and multi-antenna users in presence of an eavesdropper. Two phases are …
DT Do, MS Nguyen - … Computing Electronics and Control), 2022 - telkomnika.uad.ac.id
In this paper, we design a secure transmission scheme in uplink and downlink of non- orthogonal multiple access (NOMA) system. In this scenario, two pairs of base stationuser …
DT Do, MS Van Nguyen - Bulletin of Electrical Engineering and Informatics, 2021 - beei.org
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model …
Z Xiang, X Tong, Y Cai - China Communications, 2020 - ieeexplore.ieee.org
This paper investigates secure transmission for non-orthogonal multiple access (NOMA) systems where the imperfect successive interference cancellation (SIC) is considered at …
In this paper, a novel approach is introduced to study the achievable delay-guaranteed secrecy rate, by introducing the concept of the effective secrecy rate (ESR). This study …
TP Huu, TN Thi-Thanh, C Nguyen-Yen, H Tran… - IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we analyze the secrecy outage probability (SOP) and the fairness of average packet transmission time for a non-orthogonal multiple access (NOMA) system which …
K Jiang, W Zhou, L Sun - IEEE access, 2020 - ieeexplore.ieee.org
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer (s) to improve secrecy performance is studied in this work. We first …
DD Tran, DB Ha - … Conference on Recent Advances in Signal …, 2018 - ieeexplore.ieee.org
In this paper, we consider the physical layer security of a downlink non-orthogonal multiple access (NOMA) system, in which users' quality of service (QoS) requirements are …
We investigate a secrecy-enhancing design for cooperative downlink and uplink non- orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …