S Zhang, X Xu, H Wang, J Peng, D Zhang… - IEEE Access, 2018 - ieeexplore.ieee.org
… • We model the uplinkNOMA transmissions in IoT using the … cal layer security characterization of uplinkNOMA in IoT. As the … the internet of things with an untrustedrelay,’’ IEEE Access, …
… We consider an uplink C-NOMA-SPC system, where two cell-edge users (ie, Ui, i = {1, 2}) … mi, with a base station (ie, S) via a half-duplex relay (ie, R), as shown in Fig. 1. Users are …
G Chopra, RK Jha, S Jain - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
… In [26], the relay assisted PLS downlink NOMA network has been implemented and studied … through uplink transmission, the BS obtains the information about 𝑅1 users. Once the NOMA …
… untrustedrelay simultaneously transmit signals through non-orthogonal channels was considered. It was concluded that the proposed non-orthogonal relaying … BS in the uplink of actual …
… In [17], the authors have considered the uplink and downlink NOMA strategy to transmit the data by using the cooperation of the relay which is untrusted. In [18], the uplinkNOMA has …
… al investigated the secrecy performance of an individual user in an uplinkNOMA system, whose … transmission in NOMA networks with an untrusted amplify-and-forward relay jammed by …
… disparities between uplinkNOMA and downlink NOMA in terms of PLS. In uplinkNOMA, the … Two models for the relay, trusted and untrustedrelay, are taken into consideration when …
… relaying protocol for uplinkNOMA [25], where the data of both UDs need to be correctly decoded before forwarding to AP, we adopt the partial DF relaying … an unreliable communication …
Z Mobini - AEU-International Journal of Electronics and …, 2020 - Elsevier
… In our cooperative CR NOMA system, ST acts as an untrustedrelay and hence, the instantaneous secrecy capacity C s can be expressed as(14) C S = 1 2 log 2 ( 1 + γ PD ) - 1 2 log 2 ( …