Effective secrecy rate for a downlink NOMA network

W Yu, A Chorti, L Musavian, HV Poor… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, a novel approach is introduced to study the achievable delay-guaranteed
secrecy rate, by introducing the concept of the effective secrecy rate (ESR). This study …

Exploiting secrecy performance of uplink NOMA in cellular networks

MS Van Nguyen, DT Do, F Afghah, SMR Islam… - IEEE …, 2021 - ieeexplore.ieee.org
We study the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with
single antenna and multi-antenna users in presence of an eavesdropper. Two phases are …

On the security enhancement of uplink NOMA systems with jammer selection

K Cao, B Wang, H Ding, L Lv, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We investigate physical layer security of an uplink NOMA system consisting of one base
station, multiple users and one eavesdropper. During each uplink transmission, two users …

Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same resource block to improve the spectral efficiency. Whereas due to the resource …

Evaluating secrecy performance of cooperative NOMA networks under existence of relay link and direct link

MS Van Nguyen, DT Do - International Journal of …, 2020 - Wiley Online Library
The secrecy performance of a nonorthogonal multiple access (NOMA) system is examined
in this study by employment of a dual‐hop decode‐and‐forward (DF) relay under existence …

Power optimization for enhancing secrecy of cooperative user relaying NOMA networks

Y Cao, S Wang, M Jin, N Zhao, C Xing… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
To enhance the secrecy of wireless transmission, we propose a cooperative user relaying
NOMA scheme, in which the near user works in full-duplex mode by transmitting jamming …

On secure downlink NOMA systems with outage constraint

H Lei, R Gao, KH Park, IS Ansari… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this work, we investigate the relationship between the reliability and security of a typical
two-user downlink non-orthogonal multiple access (NOMA) communication system. The …

Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay

Y Cao, N Zhao, G Pan, Y Chen, L Fan… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of
cell-edge users cannot be guaranteed due to severe channel fading. On the other hand, the …

Secrecy at physical layer in NOMA with cooperative jamming

S Sharma, SD Roy, S Kundu - 2020 National Conference on …, 2020 - ieeexplore.ieee.org
We have proposed and analyzed secrecy performance of a network architecture which
contains a source, two destinations, a friendly jammer (FJ) and an eavesdropper (Eve). To …

Secure transmission for NOMA systems with imperfect SIC

Z Xiang, X Tong, Y Cai - China Communications, 2020 - ieeexplore.ieee.org
This paper investigates secure transmission for non-orthogonal multiple access (NOMA)
systems where the imperfect successive interference cancellation (SIC) is considered at …