Secure transmission via beamforming optimization for NOMA networks

Y Cao, N Zhao, Y Chen, M Jin, Z Ding… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… Owing to the eminent performance gain, non-orthogonal multiple access (NOMA) has been
secure transmission in NOMA systems. Hence, in this article, secure transmission schemes

On secure NOMA systems with transmit antenna selection schemes

H Lei, J Zhang, KH Park, P Xu, IS Ansari, G Pan… - IEEE …, 2017 - ieeexplore.ieee.org
… and SAS schemes for MISO NOMA system and compare them with the STT scheme. The …
user with fixed power allocation scheme deteriorates as the transmit power surpasses some …

Secure transmission via joint precoding optimization for downlink MISO NOMA

N Zhao, D Li, M Liu, Y Cao, Y Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… In this paper, three secure transmission schemes are proposed for MISO-NOMA networks
via joint precoding optimization, with and without eavesdropping CSI, respectively. For the …

Secure transmission design in HARQ assisted cognitive NOMA networks

Z Xiang, W Yang, Y Cai, Z Ding… - … Forensics and Security, 2020 - ieeexplore.ieee.org
… It is worth noting that we provide a lightweight secure transmission scheme compared with
[24] and [25]. Lightweight PLS mechanisms are urgently required for IoT networks and our …

Secure transmission for NOMA systems with imperfect SIC

Z Xiang, X Tong, Y Cai - China Communications, 2020 - ieeexplore.ieee.org
… -user scenario, we propose a more general scheme where multiple users can share the
same resource slot and design a power allocation scheme for reducing the effect of SIC error on …

Secure transmission in a NOMA-assisted IoT network with diversified communication requirements

Z Xiang, W Yang, Y Cai, J Xiong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… ments in the Internet-of-Things (IoT) networks, this article proposes a nonorthogonal multiple
access (NOMA) scheme which pairs two types of typical users, ie, delay-sensitive user (DSU…

NOMA in cooperative communication systems with energy-harvesting nodes and wireless secure transmission

A Salem, L Musavian - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
… x2 are data symbols for U1 and U2 with unit variance, Ps is the source transmission power,
… In the cooperative NOMA scheme considered in this paper, the users are ordered based on …

An HARQ assisted cognitive NOMA scheme for secure transmission with imperfect SIC

Z Xiang, W Yang, G Pan, Y Cai… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… In addition, we concentrate on the study of secure transmission of the SR user. According
to Wyner secrecy code theorem [45], the codeword of xs is coded as (Rs,Rse) where Rs and …

Secure transmission in MIMO-NOMA networks

Y Qi, M Vaezi - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
… In this letter, we show that the above secure MIMONOMA channel can be seen as two interwoven
… Next, we design novel precoding and power allocation schemes that achieve capacity …

Secure energy efficiency transmission for mmWave-NOMA system

F Zhao, W Hao, L Shen, G Sun, Y Zhou… - IEEE Systems …, 2020 - ieeexplore.ieee.org
… In this section, we evaluate the SSE and SEE of the proposed scheme via simulations. LRs
and eavesdropper are randomly distributed in one cell. Specifically, the number of antennas …