Improving secrecy rate and social welfare by NOMA technique in D2D communications network

M Alibeigi, A Taherpour, S Gazor - IEEE Transactions on Green …, 2021 - ieeexplore.ieee.org
We investigate the advantage of employing the non-orthogonal multiple access (NOMA) in
device-to-device (D2D) communications, where D2D pairs are clustered with content …

Security improvement for NOMA based cooperative D2D networks with imperfect SIC over Nakagami-m channel

M Najimi - Telecommunication Systems, 2022 - Springer
In this paper, we consider a cooperative device-to-device (D2D) enabled cellular network
based on the non-orthogonal multiple access system with imperfect successive interference …

Security enhancement and QoS provisioning for NOMA-based cooperative D2D networks

Q Li, P Ren, D Xu - IEEE Access, 2019 - ieeexplore.ieee.org
The characteristic of heterogeneous power utilization in device-to-device (D2D) enabled
cellular networks provides a natural fit for the adoption of non-orthogonal multiple access …

A zero-sum game-based secure and interference mitigation scheme for socially aware D2D communication with imperfect CSI

R Gupta, S Tanwar - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
Device-to-device (D2D) communication is the most evolving technology in fifth-generation
(5G) networks. It allows direct communication of devices in the proximity-with or without the …

SARAS: Secure resource allocation scheme for NOMA‐based device‐to‐device communication using coalition game and cognitive radio

R Gupta, S Tanwar - International Journal of Communication …, 2022 - Wiley Online Library
Summary Device‐to‐device (D2D) is a fifth‐generation (5G) network's key technology which
allows devices in proximity to communicate one‐to‐one without a base station (BS) …

Secrecy based resource allocation for d2d communication using tabu search algorithm

AF Ashtiani, S Pierre - 2019 IEEE Canadian Conference of …, 2019 - ieeexplore.ieee.org
Device-to-device (D2D) communications have been pro-posed as one of the key
technologies to improve the spectral efficiency in the future fifth generation (5G) of wireless …

Minimizing secrecy outage probability in D2D‐enabled cellular networks: access control with power optimization

Y Chen, X Ji, K Huang, B Li… - Transactions on Emerging …, 2018 - Wiley Online Library
In this paper, we investigate the uplink secure communication for underlay device‐to‐device
(D2D) communication sharing the uplink resources in cellular networks. We first develop a …

Exploiting Secure Multi-Hop Transmissions with NOMA Networks: Performance Analysis

Y Pramitarini, RHY Perdana, K Shim… - … Conference on Artificial …, 2024 - ieeexplore.ieee.org
In this paper, we analyze the secrecy performance of secure multi-hop transmission for the
NOMA system. More specifically, the multi-hop transmission can extend the coverage of …

Radio resource allocation for physical-layer security in D2D underlay communications

H Zhang, T Wang, L Song, Z Han - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Device-to-Device (D2D) communications have been proposed recently to improve the
spectral efficiency. In this paper, we consider physical-layer security in D2D communication …

Improving wireless physical layer security via D2D communication

H Xu, C Pan, W Xu, J Shi, M Chen… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
This paper investigates the physical layer security issue of a device-to-device (D2D)
underlaid cellular system with a multi-antenna base station (BS) and a multi-antenna …