Hybrid automatic repeat request (HARQ) in wireless communications systems and standards: A contemporary survey

A Ahmed, A Al-Dweik, Y Iraqi, H Mukhtar… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Automatic repeat request (ARQ) schemes, and in particular hybrid-ARQ (HARQ) schemes,
which jointly adopt forward error correction (FEC) and ARQ, are essential to provide reliable …

Enhancing physical layer security with artificial noise in large-scale NOMA networks

C Gong, X Yue, Z Zhang, X Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates the secrecy outage performance for a large-scale downlink system
with full-duplex (FD) non-orthogonal multiple access (NOMA) transmission aided by artificial …

[HTML][HTML] An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks

M Adil, MA Almaiah, A Omar Alsayed, O Almomani - Sensors, 2020 - mdpi.com
Wireless Sensor Networks (WSNs) are vulnerable to various security threats. One of the
most common types of vulnerability threat is the jamming attack, where the attacker uses the …

Energy-efficient covert communications for bistatic backscatter systems

Y Wang, S Yan, W Yang, Y Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we consider covert communications for bistatic backscatter systems, where a
tag transmits information passively to a reader by reflecting incident carrier signals with …

Secure transmission in a NOMA-assisted IoT network with diversified communication requirements

Z Xiang, W Yang, Y Cai, J Xiong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Considering the diversified communication requirements in the Internet-of-Things (IoT)
networks, this article proposes a nonorthogonal multiple access (NOMA) scheme which …

Channel inversion power control aided covert communications in uplink NOMA systems

M Wang, W Yang, X Lu, C Hu, B Liu… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
In this letter, we investigate covert communications in uplink non-orthogonal multiple access
(NOMA) systems, where a covert user tries to transmit private information to a legitimate …

Robust trajectory and communication design for multi-UAV enabled wireless networks in the presence of jammers

Y Wu, W Fan, W Yang, X Sun, X Guan - IEEE Access, 2019 - ieeexplore.ieee.org
This paper investigates a multi-unmanned aerial vehicle (UAV) enabled wireless
communication, where a number of ground nodes (GNs) are scheduled to communicate with …

Secure UAV-to-vehicle communications

T Li, J Ye, J Dai, H Lei, W Yang, G Pan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) communications have been widely exploited in our daily
life, which leads to rising concerns about the security issue. This work investigates the …

Hardware-and interference-limited cognitive IoT relaying NOMA networks with imperfect SIC over generalized non-homogeneous fading channels

S Arzykulov, G Nauryzbayev, MS Hashmi… - IEEE …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology has received much attention due to its great potential to
interconnect billions of devices in a broad range of applications. IoT networks can provide …

Intelligent reflecting surface aided NOMA-HARQ based IoT framework for future wireless networks

D Sarkar, SS Yadav, V Pal… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In sixth-generation (6G) wireless networks, non-orthogonal multiple access (NOMA)
technology is widely used to improve the spectrum efficiency. Along with NOMA, hybrid …