Secrecy Achievable Rate of Two-Way Illegitimate Full-Duplex Relay-Assisted NOMA with CCI

V Ozduran - Wireless Personal Communications, 2023 - Springer
This paper investigates the adverse effects of co-channel interference (CCI) on the secrecy
achievable rate (SAR) performance of illegitimate decode-and-forward full-duplex two-way …

Secrecy analysis in NOMA full-duplex relaying networks with artificial jamming

D Li, Y Cao, Z Yang, Y Chen, S Zhang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5 G
and beyond. However, its privacy often suffers from adversarial eavesdropping, especially …

Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay

Y Cao, N Zhao, G Pan, Y Chen, L Fan… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of
cell-edge users cannot be guaranteed due to severe channel fading. On the other hand, the …

Secrecy performance analysis of half/full duplex AF/DF relaying in NOMA systems over fading channels

N Zaghdoud, AB Mnaouer, H Boujemaa… - Telecommunication …, 2022 - Springer
Although the progress in understanding 5G and beyond techniques such as Non-
Orthogonal Multiple Access (NOMA) and full-duplex techniques has been overwhelming …

On the performance of physical layer security in virtual full-duplex non-orthogonal multiple access system

W Guo, Y Liu - EURASIP Journal on Wireless Communications and …, 2021 - Springer
This paper investigates physical layer security analysis of cooperative non-orthogonal
multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme …

Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers

NL Cuong, TM Hoang, NT Phuong, PT Hiep - Wireless Networks, 2022 - Springer
Full-duplex (FD) relay systems including a transmit antenna selection and a non-orthogonal
multiple access (NOMA) methods are analyzed under presence of multiple eavesdroppers …

Secure NOMA based full-duplex two-way relay networks with artificial noise against eavesdropping

B Zheng, M Wen, F Chen, J Tang… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
In this paper, we develop a secure non-orthogonal multiple access (NOMA)-based two-way
relay network, in which two users wish to exchange their NOMA signals via a trusted relay in …

Secrecy analysis of cooperative NOMA-FDR systems with imperfect CSI and colluding eavesdroppers

TM Hoang, BC Nguyen, N Van Vinh, GT Luu - Computer Networks, 2023 - Elsevier
This paper analyzes the secrecy attributes of a full-duplex relay (FDR) non-orthogonal
multiple access (NOMA) system, where the best relay is chosen from a set of numerous …

On the physical layer security performance of full‐duplex cooperative NOMA system with multiple eavesdroppers, imperfect SIC and hardware imperfections

T Nimi, AV Babu - Internet Technology Letters - Wiley Online Library
In this letter, we propose a control jammer‐assisted framework for improving the physical
layer security (PLS) of full‐duplex (FD)‐cooperative non‐orthogonal multiple access (FD …

Secrecy performance analysis in downlink NOMA systems with cooperative full-duplex relaying

C Liu, L Zhang, M Xiao, Z Chen… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
We introduce the cooperative full-duplex relaying to a downlink non-orthogonal multiple
access (NOMA) system and analyze the secrecy performance of each NOMA user. In …