Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose a novel non-orthogonal multiple access (NOMA)-inspired jamming and relaying
scheme to enhance the physical layer security of untrusted relay networks. Particularly …

Exploiting full-duplex two-way relay cooperative non-orthogonal multiple access

X Wang, M Jia, IWH Ho, Q Guo… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, a novel full-duplex cooperative non-orthogonal multiple access (FD CNOMA)
system is proposed, where users intend to exchange messages with the assistance of a …

[HTML][HTML] Realizing efficient security and privacy in IoT networks

JH Anajemba, Y Tang, C Iwendi, A Ohwoekevwo… - Sensors, 2020 - mdpi.com
In recent times, security and privacy at the physical (PHY) layer has been a major issue of
several communication technologies which comprise the internet of things (IoT) and mostly …

Secure primary transmission assisted by a secondary full-duplex NOMA relay

B Chen, Y Chen, Y Chen, Y Cao, Z Ding… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In this paper, secure primary transmission is proposed by using a multi-antenna secondary
full-duplex non-orthogonal multiple access (NOMA) relay in cognitive radio (CR) networks …

Transceiver design for downlink SWIPT NOMA systems with cooperative full-duplex relaying

W Wu, X Yin, P Deng, T Guo, B Wang - IEEE Access, 2019 - ieeexplore.ieee.org
This paper studies the application of simultaneous wireless information and power transfer
(SWIPT) to downlink non-orthogonal multiple access (NOMA) system. A novel cooperative …

Multi-antenna two-way relay based cooperative NOMA

L Lv, Q Ye, Z Ding, Z Li, N Al-Dhahir… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we investigate a non-orthogonal multiple access (NOMA) assisted multi-
antenna two-way relay system, where multi-antenna users apply NOMA to support …

Physical layer security for NOMA systems: Requirements, issues, and recommendations

S Pakravan, JY Chouinard, X Li, M Zeng… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Nonorthogonal multiple access (NOMA) has been viewed as a potential candidate for the
upcoming generation of wireless communication systems. Comparing to traditional …

Throughput analysis of multipair two-way replaying networks with NOMA and imperfect CSI

DT Do, TL Nguyen, KM Rabie, X Li, BM Lee - IEEE Access, 2020 - ieeexplore.ieee.org
To improve the utilization of spectrum and system capacity, non-orthogonal multiple access
(NOMA) is considered as a promising multiple access method for emerging communication …

Secure transmission via power allocation in NOMA-UAV networks with circular trajectory

X Chen, Z Yang, N Zhao, Y Chen… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) aided unmanned aerial vehicle (UAV) is becoming
a promising technique for future wireless networks. However, its security remains a great …

Secure transmission in HARQ-assisted non-orthogonal multiple access networks

Z Xiang, W Yang, G Pan, Y Cai… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates the secure transmission in hybrid automatic repeat request (HARQ)-
assisted non-orthogonal multiple access (NOMA) networks, where a security-required (SR) …