Opportunistic Scheduling Scheme to Improve Physical-Layer Security in Cooperative NOMA System: Performance Analysis and Deep Learning Design

Y Pramitarini, RHY Perdana, K Shim, B An - IEEE Access, 2024 - ieeexplore.ieee.org
In this paper, we propose a novel opportunistic scheduling-based antenna-user selection
(OBAUS) scheme to improve the secrecy performance of cooperative non-orthogonal …

Exploiting TAS schemes to Enhance the PHY-security in Cooperative NOMA Networks: A Deep Learning Approach

Y Pramitarini, RHY Perdana, K Shim… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
In this paper, we propose a novel antenna selection scheme to enhance the secrecy
performance in a relay-aided non-orthogonal multiple access (NOMA) network against an …

Enhancing PHY-security of FD-enabled NOMA systems using jamming and user selection: Performance analysis and DNN evaluation

K Shim, TN Do, TV Nguyen… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In this article, we study the physical-layer security (PHY-security) improvement method for a
downlink nonorthogonal multiple access (NOMA) system in the presence of an active …

Exploiting opportunistic scheduling schemes to improve physical-layer security in MU-MISO NOMA systems

K Shim, TV Nguyen, B An - IEEE Access, 2019 - ieeexplore.ieee.org
This paper studies opportunistic scheduling schemes to enhance the secrecy performance
in multi-user multiple-input single-output (MU-MISO) non-orthogonal multiple access …

Exploiting opportunistic scheduling for physical‐layer security in multitwo user NOMA networks

K Shim, B An - Wireless Communications and Mobile …, 2018 - Wiley Online Library
In this paper, we address the opportunistic scheduling in multitwo user NOMA system
consisting of one base station, multinear user, multifar user, and one eavesdropper. To …

Power allocation‐Assisted secrecy analysis for NOMA enabled cooperative network under multiple eavesdroppers

VN Nayak, KK Gurrala - ETRI Journal, 2021 - Wiley Online Library
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple
access (NOMA)‐enabled decode‐and‐forward (DF) relay network is investigated with the …

Secure transmission design for cooperative NOMA in the presence of internal eavesdropping

B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
The application of successive interference cancellation (SIC) introduces critical security risks
to cooperative non-orthogonal multiple access (NOMA) systems in the presence of …

Improving physical layer security of noma networks by using opportunistic scheduling

K Shim, TN Do, B An - 2018 Tenth International Conference on …, 2018 - ieeexplore.ieee.org
In this paper, we study how to improve physical layer security capability of multiple near
users and multiple far users non-orthogonal multiple access (NOMA) networks. To this end …

Interference-based and Deep-Learning-Aided Physical Layer Security Enhancement in Uplink NOMA under Cooperative Eavesdropping

FM Caceres, S Kandeepan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Physical Layer Security (PLS) for Uplink NonOrthogonal Multiple Access (UL-NOMA) is
investigated, under cooperative multi-eavesdropping. Particular attention is paid to the effect …

A physical layer security-based transmit antenna selection scheme for noma systems

K Shim, H Oh, TN Do, B An - 2018 Tenth International …, 2018 - ieeexplore.ieee.org
In this paper, we propose a novel transmit antenna selection (TAS) scheme to improve the
physical layer security of two-user non-orthogonal multiple access (NOMA) systems …