Opportunistic Scheduling Scheme to Improve Physical-Layer Security in Cooperative NOMA System: Performance Analysis and Deep Learning Design

Y Pramitarini, RHY Perdana, K Shim, B An - IEEE Access, 2024 - ieeexplore.ieee.org
In this paper, we propose a novel opportunistic scheduling-based antenna-user selection
(OBAUS) scheme to improve the secrecy performance of cooperative non-orthogonal …

Secrecy outage performance of SWIPT cognitive radio network with imperfect CSI

A Singh, MR Bhatnagar, RK Mallik - IEEE Access, 2019 - ieeexplore.ieee.org
We consider a cognitive radio (CR) network with simultaneous wireless information and
power transfer (SWIPT) system having one base station (BS) with multiple antennas that acts …

Physical layer security approaches in 5G wireless communication networks

P Singh, P Pawar, A Trivedi - 2018 First International …, 2018 - ieeexplore.ieee.org
Rapid growth in the fifth generation (5G) wireless network applications demands new
requirements on the data storage, computation, and networking. Thus, it will introduce new …

Exploiting TAS schemes to Enhance the PHY-security in Cooperative NOMA Networks: A Deep Learning Approach

Y Pramitarini, RHY Perdana, K Shim… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
In this paper, we propose a novel antenna selection scheme to enhance the secrecy
performance in a relay-aided non-orthogonal multiple access (NOMA) network against an …

Physical‐layer security for cellular multiuser two‐way relaying networks with single and multiple decode‐and‐forward relays

A Pandey, S Yadav - Transactions on Emerging …, 2019 - Wiley Online Library
We investigate the secrecy performance of cellular multiuser two‐way relay networks, where
the bidirectional information exchange between a multiantenna base station (BS), and …

Exploiting opportunistic scheduling for physical‐layer security in multitwo user NOMA networks

K Shim, B An - Wireless Communications and Mobile …, 2018 - Wiley Online Library
In this paper, we address the opportunistic scheduling in multitwo user NOMA system
consisting of one base station, multinear user, multifar user, and one eavesdropper. To …

[PDF][PDF] Physical layer security for NOMA systems

M Zeng, NP Nguyen, OA Dobre… - Flexible Cogn. Radio …, 2020 - researchgate.net
Non-orthogonal multiple access (NOMA) has been envisioned as a promising candidate for
the next generation of wireless communication systems. By multiplexing users over the …

窃听者随机分布SWIPT-NOMA 系统的物理层安全

丁一凡, 李光球, 李辉 - 电信科学, 2022 - infocomm-journal.com
非正交多址接入(non-orthogonal multiple access, NOMA) 与无线携能通信(simultaneous
wireless information and power transfer, SWIPT) 技术的组合可提高无线系统的频谱效率 …

Analyses of transmit antenna selection to enhance security performance in cooperative radio communication networks under wiretap channel

TS Le, NT Pham, DQH Thieu, NS Pham - Journal of Technical …, 2019 - jte.edu.vn
In this paper, we investigate the physical layer security technique of a cooperative
communication network with a source node having multiple transmitting antennas, in which …

Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers.

D Yifan, LI Guangqiu, LI Hui - Telecommunications Science, 2022 - search.ebscohost.com
The combination of non-orthogonal multiple access (NOMA) and simultaneous wireless
information and power transfer (SWIPT) technologies can improve spectrum efficiency of …