QoS-aware secrecy rate maximization in untrusted NOMA with trusted relay

I Amin, D Mishra, R Saini, S Aïssa - IEEE Communications …, 2021 - ieeexplore.ieee.org
untrusted scenario in cooperative NOMA with trusted relay is not fully investigated despite
its importance. Considering a DF relay-… We consider downlink NOMA-based communication, …

Relay cooperative beamforming algorithm based on probabilistic constraint in SWIPT secrecy networks

Z Hu, D Xie, M Jin, L Zhou, J Li - IEEE Access, 2020 - ieeexplore.ieee.org
… -to-relay and relay-to-receiver phases to prevent the warden from detecting the presence of
communications via the transmitterrelay-receiver link and untrusted relay … MISO downlinks: …

[PDF][PDF] Cooperative Relay Transmission under Physical Layer Security for Non-Orthogonal Networks.

MA Salem, ABA Aziz, MY Alias - J. Commun., 2020 - jocm.us
… Abstract—In this paper, the secrecy performance for a downlink cooperative non-orthogonal …
study the secrecy performance of a cooperative NOMA system with an untrusted weak user. …

Secrecy performance analysis for fixed-gain energy harvesting in an Internet of Things with untrusted relays

DD Tran, C So-In, H Tran - IEEE Access, 2018 - ieeexplore.ieee.org
… be leaked due to monitoring by the untrusted relay [19]. To … SNs to the controller and downlink
communications from the … using an untrusted relay: A case for cooperative jamming,” in …

Utility regions for DF relay in OFDMA-based secure communication with untrusted users

R Saini, D Mishra, S De - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
Downlink of a trusted DF relay R assisted secure OFDMA system, with source S, and M
untrusted … user scenario with two tapping, we first discuss rate definitions in classical co-operative

On security and throughput for energy harvesting untrusted relays in IoT systems using NOMA

C So-In, H Tran, DD Tran, S Heng… - IEEE …, 2019 - ieeexplore.ieee.org
… consists of multi-antenna BS, multiple untrusted relays, multiple IoTDs with imperfect CSI. …
multiple AF EH untrusted relays. • We investigate three cooperative TAS and relay selection …

[PDF][PDF] Secure NOMA and OMA coordinated transmission schemes in untrusted relay networks

L Lv, Z Li, H Ding, J Chen - Sci. China Inf. Sci, 2021 - researchgate.net
… secure cooperative communications in untrusted relay … the far user is aided by an untrusted
relay. We propose two novel … for cooperative downlink and uplink NOMA with an untrusted

Power allocation strategy of untrusted relay network based on Stackelberg game

D Xu, R Yao, Y Zhang, Y Fan… - 2021 IEEE 32nd Annual …, 2021 - ieeexplore.ieee.org
… In cooperative networks with untrusted relays and passive eavesdroppers, in order to … In
[23], the authors investigated the physical layer security of a downlink non-orthogonal multiple …

Physical Layer Security in Air-To-Underwater Untrusted Relay Networks

S Qian, X Zhou - Proceedings of the 17th International Conference on …, 2023 - dl.acm.org
… introduces a cooperative communication … untrusted relays, a promising direction for future
research would be to expand this framework to scenarios involving multiple untrusted relays. …

Secure two-way transmission via untrusted UAV Relay: Joint path design and slot-pairing strategy

W Wang, W Zhao, D Yang, A Li, Y Wang, L Xiao - Computer Networks, 2023 - Elsevier
… UAV relay involved in cooperation is lower than that of legitimate users. The untrusted UAV
… In contrast to the existing traditional fixed untrusted relays, UAV untrusted relays can better …