Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… cooperative downlink and uplink NOMA transmissions in the presence of an untrusted relay,
where a source uses the NOMA principle to have downlink and uplink transmissions with a …

Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… , relying on the uplink NOMA principle, the untrusted relay forwards its … the untrusted relay
to maximize the secrecy sum rate. Scenarios of single-antenna and multiple-antenna relaying

[PDF][PDF] Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir, F Li, Z Kong… - in IEEE Transactions on … - researchgate.net
… , relying on the uplink NOMA principle, the untrusted relay forwards its … the untrusted relay
to maximize the secrecy sum rate. Scenarios of single-antenna and multiple-antenna relaying

Enhancing secrecy for NOMA untrusted relay networks with user scheduling and jamming

B He, L Lv, L Yang, J Chen - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
… for NOMA untrusted relayNOMA untrusted relay network in [5]. In [6], a cooperative
jamming strategy is developed to enhance the security of both the uplink and downlink NOMA

On security and throughput for energy harvesting untrusted relays in IoT systems using NOMA

C So-In, H Tran, DD Tran, S Heng… - IEEE …, 2019 - ieeexplore.ieee.org
… EH untrusted relays in MISO IoT system using NOMA have not been studied extensively in
recent works. Thus, in this paper, we consider PLS and throughput for a NOMA IoT … of uplink

Security energy efficiency maximization for untrusted relay assisted NOMA-MEC network with WPT

P Zhao, W Zhao, H Bao, B Li - IEEE Access, 2020 - ieeexplore.ieee.org
… Literature [9] studied the influence of NOMA on the uplink … security of untrusted relay assisted
MEC to offload by NOMA … efficiency of untrusted relay assisted MEC to offload by NOMA

Secrecy enhancement of cooperative NOMA networks with two-way untrusted relaying

M Awad, SM Ibraheem, SA Napoleon, W Saad… - IEEE …, 2020 - ieeexplore.ieee.org
… In this paper, we proposed an enhanced secrecy performance scheme of cooperative
uplink/downlink NOMA networks against untrusted relaying. To save resources and prevent …

Secure relaying in non-orthogonal multiple access: Trusted and untrusted scenarios

A Arafa, W Shin, M Vaezi… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
… for large-scale NOMA systems in the downlink and the uplink, respectively. NOMA-assisted …
eavesdropper, and then we investigate the case of having an untrusted relay in Section IV. …

On the leakage-rate performance of untrusted relay-aided NOMA under co-channel interference

V Ozduran, N Nomikos - Telecommunication Systems, 2024 - Springer
This study seeks an answer for the impact of the co-channel interference on the leakage
rate of illegitimate relay-assisted power-domain non-orthogonal multiple access (NOMA) …

[PDF][PDF] Secure NOMA and OMA coordinated transmission schemes in untrusted relay networks

L Lv, Z Li, H Ding, J Chen - Sci. China Inf. Sci, 2021 - researchgate.net
… signal to confuse the relay and the uplink NOMA principle is … decoding capability of the
untrusted relay were developed in [… and uplink NOMA coordinated direct and untrusted relay