A systematic review on NOMA variants for 5G and beyond

I Budhiraja, N Kumar, S Tyagi, S Tanwar, Z Han… - IEEE …, 2021 - ieeexplore.ieee.org
Over the last few years, interference has been a major hurdle for successfully implementing
various end-user applications in the fifth-generation (5G) of wireless networks. During this …

Survey on physical layer security for 5G wireless networks

JDV Sánchez, L Urquiza-Aguiar, MCP Paredes… - Annals of …, 2021 - Springer
Physical layer security is a promising approach that can benefit traditional encryption
methods. The idea of physical layer security is to take advantage of the propagation …

Secrecy outage performance of FD-NOMA relay system with multiple non-colluding eavesdroppers

TM Hoang, BC Nguyen, XN Tran… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a full-duplex (FD) non-orthogonal
multiple access (NOMA) relay system under the presence of multiple non-colluding …

Cluster based resource management using H-NOMA in heterogeneous networks beyond 5G

U Ghafoor, HZ Khan, AM Siddiqui, M Ali, A Rauf… - Ad Hoc Networks, 2023 - Elsevier
High throughput, secure transmission, and minimum interference are required in beyond-
fifth-generation (B5G) networks. For this purpose, a mix of hybrid non-orthogonal multiple …

[HTML][HTML] Secrecy sum rate maximization for a MIMO-NOMA uplink transmission in 6G networks

Y Dursun, K Wang, Z Ding - Physical Communication, 2022 - Elsevier
Non-orthogonal multiple access (NOMA), as a well-qualified candidate for sixth-generation
(6G) mobile networks, has been attracting remarkable research interests due to high …

Robust resource allocation for lightweight secure transmission in multicarrier NOMA-assisted full duplex IoT networks

Y Zhang, X Zhao, Z Zhou, P Qin, S Geng… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
In this article, with the aim to enhance the secure transmission and improve the utilization of
spectrum resources in Internet of Things (IoT), a multicarrier nonorthogonal multiple access …

Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers

NL Cuong, TM Hoang, NT Phuong, PT Hiep - Wireless Networks, 2022 - Springer
Full-duplex (FD) relay systems including a transmit antenna selection and a non-orthogonal
multiple access (NOMA) methods are analyzed under presence of multiple eavesdroppers …

URJA: Usage jammer as a resource allocation for secure transmission in a CR-NOMA-based 5G femtocell system

I Budhiraja, N Kumar, S Tyagi, S Tanwar… - IEEE Systems …, 2020 - ieeexplore.ieee.org
In this article, a joint user pairing and secure resource allocation scheme for cognitive radio
inspired nonorthogonal multiple access (CR-NOMA) femtocells in the presence of a jammer …

[HTML][HTML] Green NOMA based MU-MIMO transmission for MEC in 6G Networks

Y Dursun, MB Goktas, Z Ding - Computer Networks, 2023 - Elsevier
Mobile edge computing (MEC) is a distributed computing paradigm that brings computing
and data storage closer to the network's edge. This paper considers a multiple-input multiple …

Exploiting secrecy performance of uplink NOMA in cellular networks

MS Van Nguyen, DT Do, F Afghah, SMR Islam… - IEEE …, 2021 - ieeexplore.ieee.org
We study the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with
single antenna and multi-antenna users in presence of an eavesdropper. Two phases are …