H Lei, Z Yang, KH Park, IS Ansari, Y Guo… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
This paper considers the secrecy outage performance of a multiple-relay assisted non- orthogonal multiple access (NOMA) network over Nakagami-m fading channels. Two time …
Non-orthogonal multiple access (NOMA), as a well-qualified candidate for sixth-generation (6G) mobile networks, has been attracting remarkable research interests due to high …
In this work, we investigate the relationship between the reliability and security of a typical two-user downlink non-orthogonal multiple access (NOMA) communication system. The …
In Cognitive Radio Non-Orthogonal Multiple Access (CR-NOMA), hybrid successive interference cancellation (SIC) was proposed to improve the probability for a secondary user …
R Ruby, QV Pham, K Wu, AA Heidari… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the increasing demand for security in many sectors, such as defense and health systems, developing secure Internet of Things (IoT) networks is a matter of great urgency …
The orthogonal frequency division multiplexing (OFDM) and the non-orthogonal multiple access (NOMA) scheme are presented as promising techniques to meet the requirement of …
TX Zheng, X Chen, C Wang, KK Wong… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to …
S Liu, Y Yu, L Guo, PL Yeoh, B Vucetic… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we consider a mobile edge computing (MEC)-based secure computation offloading system, and design a practical multi-eavesdropper model including two specific …