Physical-layer security of NOMA systems under untrusted users

BM ElHalawany, K Wu - 2018 IEEE global communications …, 2018 - ieeexplore.ieee.org
… outage and the secrecy performance of a two-users NOMA system with an untrusted user. The
… Zhang, “An optimization perspective of the superiority of NOMA compared to conventional …

Intelligent reflecting surface assisted untrusted NOMA transmissions: a secrecy perspective

D Wang, X Li, Y He, F Zhou, Q Wu - Science China Information Sciences, 2023 - Springer
untrusted users as well as external eavesdroppers, we propose a novel priority-based secure
NOMA … through the NOMA technique and assisted by the IRS. According to the priorities of …

Ergodic Secrecy Capacity of Cooperative NOMA System with Untrusted User

S Ahmad, MJ Khan - Wireless Personal Communications, 2023 - Springer
… The NOMA approach has received a lot of attention in an effort to boost spectral efficiency
[19,20,21]. The traditional orthogonal multiple access (OMA) approaches assign orthogonal …

Secrecy enhancement of cooperative NOMA networks with two-way untrusted relaying

M Awad, SM Ibraheem, SA Napoleon, W Saad… - IEEE …, 2020 - ieeexplore.ieee.org
… In particular, we discuss the secrecy performance point of view of the proposed scheme in
terms of the state of art schemes that concern the untrusted relaying based NOMA and OMA …

Decoding orders and power allocation for untrusted noma: A secrecy perspective

S Thapar, D Mishra, R Saini - 2020 IEEE Wireless …, 2020 - ieeexplore.ieee.org
… Observing the secrecy issue among multiplexed NOMA users… , we focus on safeguarding
untrusted NOMA. Considering the … efficient in providing positive secrecy at all NOMA users. An …

Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… • The destination-aided jamming scheme using AN for cooperative OMA in [24]–[26] is
shown as an efficient approach to combat eavesdropping against untrusted relays in OMA. In …

Novel outage-aware NOMA protocol for secrecy fairness maximization among untrusted users

S Thapar, D Mishra, R Saini - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
… To this end, we study secure NOMA to provide positive secrecy rates at all untrusted users …
secure NOMA system with untrusted users from a secrecy fairness maximization point of view

Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… To prevent information leakage and improve the secrecy sum rate, we propose a novel
NOMA-inspired jamming and relaying scheme for the scenario with a single-antenna …

Power Allocation and Decoding Order Selection for Secrecy Fairness in Downlink Cooperative NOMA with Untrusted Receivers under Imperfect SIC

I Amin, D Mishra, R Saini, S Aïssa - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
… Adopting this information-theoretic point of view of PLS, … secrecy performance of the
two-user DF-NOMA system. • Exploring the different decoding sequences in the twouser DF-NOMA

Secrecy fairness aware NOMA for untrusted users

S Thapar, D Mishra, R Saini - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
… Further, globally-optimized power control solution from secrecy fairness perspective is
obtained at a low computational complexity and, asymptotic approximation is obtained to gain …