Secure 5G downlink NOMA cognitive relay network: joint the impact of imperfect spectrum sensing and outdated CSI

M Zhang, X Wang, E Li, G Yang, X Wang - Wireless Networks, 2024 - Springer
… But there are few papers to discuss the security of interweave cognitive relay network with
NOMA cognitive relay network. The proposed NOMA interweave cognitive relay network

Effective resource utilization schemes for decode-and-forward relay networks with NOMA

W Duan, J Ju, J Hou, Q Sun, XQ Jiang, G Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
… Specifically, the physical layer security of NOMANOMA networks are significantly improved
compared with the convention OMA schemes. In [10], a MIMONOMA cognitive radio network

Secrecy outage probability of energy-harvesting cooperative NOMA transmissions with relay selection

A Salem, L Musavian, EA Jorswieck… - … and Networking, 2020 - ieeexplore.ieee.org
… Since the uni-cast message can be received by all users, secure NOMA transmission to
prevent multi-cast destinations from decoding the uni-cast signal has also been considered in [16…

An analysis on secure millimeter wave NOMA communications in cognitive radio networks

Y Song, W Yang, Z Xiang, N Sha, H Wang… - IEEE Access, 2020 - ieeexplore.ieee.org
… that in mmWave NOMA aided CR networks, the SOP obtained by pairing NOMA users is …
used to balance the security and reliability of the secondary networks. The power allocation …

Impact of untrusted relay on physical layer security in non-orthogonal multiple access networks

DT Do, MS Van Nguyen - Wireless Personal Communications, 2019 - Springer
… In this paper, the wiretap network model is constructed according to the … of both NOMA and
untrusted relaying network. In addition, new asymptotic expressions of these important secure

Secure performance of AF and DF relaying in cooperative NOMA systems

N Zaghdoud, WH Alouane… - … on sciences and …, 2019 - ieeexplore.ieee.org
… In this work, we study the security of a cooperative NOMA system under AF and DF relaying
… have analyzed the physical layer security for cooperative NOMA system over independent …

Secrecy analysis for IoT relaying networks deploying NOMA with energy harvesting

J Zhang, M Han - Journal of the Franklin Institute, 2021 - Elsevier
security for an Internet of Things (IoT) relaying network employing non-orthogonal multiple
access (NOMA… its own information using the NOMA technique to their respective destinations, …

Secure communications in NOMA system: Subcarrier assignment and power allocation

H Zhang, N Yang, K Long, M Pan… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
… investigated in half-duplex relay networks to improve the physical layer security. In [29], a …
1) We investigate secure communications for NOMA twoway relay wireless networks in the …

Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers

NL Cuong, TM Hoang, NT Phuong, PT Hiep - Wireless Networks, 2022 - Springer
… To improve the secure performance, the source is equipped with multiple antennas and the
… (IoT) and future wireless networks [28]. We analyze the security of FD-NOMA relay system by …

Energy efficient resource allocation for secure NOMA networks

H Zhang, N Yang, K Long, M Pan… - 2018 IEEE 87th …, 2018 - ieeexplore.ieee.org
… We consider a NOMA two-way relay wireless network composed of M preassigned user
pairs, denoted by M = {1,...,M}. The NOMA channel composes of N SCs, denoted by N = {1,...,N}, …