Overlay networks with nonlinear energy scavenging and noma-assisted decoding: security performance analysis

T Le-Thanh, K Ho-Van - Arabian Journal for Science and Engineering, 2022 - Springer
Overlay networks allow the unlicensed transmitter (UT) to aid the licensed transmitter (LT) by
sending the superimposed signal including messages of both UT and LT with a higher …

Physical Layer Secrecy Performance Analysis of Jamming-Assisted Overlay Cognitive NOMA Networks with Hardware Impairments and Multiple Non-Colluding …

PP Hema, AV Babu - IEEE Access, 2024 - ieeexplore.ieee.org
This paper investigates the physical layer security (PLS) of non-orthogonal multiple access
(NOMA)-enabled overlay cognitive radio networks (NOMA-OCRNs), considering multiple …

Improving physical layer security of uplink NOMA via energy harvesting jammers

K Cao, B Wang, H Ding, L Lv, R Dong… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA)
with the aid of energy harvesting (EH) jammers. During each time frame, communication is …

[HTML][HTML] On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems

M Han, J Zhang - Journal of King Saud University-Computer and …, 2022 - Elsevier
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability
(SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access …

Securing ofdm-based noma swipt systems

A Badawy, A El Shafie - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
In this paper, we present a physical-layer security scheme that exploits artificial noise (AN) to
secure the downlink legitimate communications and transfer energy to nodes operating …

Secrecy analysis of a cooperative NOMA network using an EH untrusted relay

TA Le, HY Kong - International Journal of Electronics, 2019 - Taylor & Francis
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect
successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is …

Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise

H Dang-Ngoc, B Ho-Quoc… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Main design objectives of future wireless networks are information security and efficient
spectrum-and-energy utilization to serve a tremendous number of users and applications …

Secrecy analysis for IoT relaying networks deploying NOMA with energy harvesting

J Zhang, M Han - Journal of the Franklin Institute, 2021 - Elsevier
In this paper, we investigate the physical-layer security for an Internet of Things (IoT)
relaying network employing non-orthogonal multiple access (NOMA) in the context of non …

RL-Assisted Power Allocation for Covert Communication in Distributed NOMA Networks

J Bai, J He, Y Chen, Y Shen, X Jiang - IEEE Systems Journal, 2024 - ieeexplore.ieee.org
This article focuses on covert communication in a distributed network with multiple
nonorthogonal multiple access (NOMA) systems, where each NOMA system is consisted of …

Full‐duplex jamming for physical layer security improvement in NOMA‐enabled overlay cognitive radio networks

PP Hema, AV Babu - Security and Privacy - Wiley Online Library
In this paper, we analyze the physical layer security (PLS) performance of nonorthogonal
multiple access (NOMA)‐enabled overlay cognitive radio networks (NOMA‐OCRNs) in the …