Enhancing physical-layer security for IoT with nonorthogonal multiple access assisted semi-grant-free transmission
Nonorthogonal multiple access (NOMA) assisted semi-grant-free transmission admits grant-
free users to access the channels otherwise solely occupied by grant-based users, and has …
free users to access the channels otherwise solely occupied by grant-based users, and has …
QoS-aware secrecy rate maximization in untrusted NOMA with trusted relay
This letter considers a trusted decode-and-forward relay-assisted two-user non-orthogonal
multiple access (NOMA) communication system, and tackles the secure rate maximization …
multiple access (NOMA) communication system, and tackles the secure rate maximization …
User pairing and power allocation in untrusted multiuser noma for internet of things
C Yuan, W Ni, K Zhang, J Bai, J Shen… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the Internet of Things (IoT), massive sensitive and confidential information is transmitted
wirelessly, making security a serious concern. This is particularly true when technologies …
wirelessly, making security a serious concern. This is particularly true when technologies …
Ergodic performance of downlink untrusted NOMA system with imperfect SIC
In this letter, the ergodic performance of a non-orthogonal multiple access (NOMA) system
with untrusted users and imperfect successive interference cancellation based decoding is …
with untrusted users and imperfect successive interference cancellation based decoding is …
Secure transmission design for cooperative NOMA in the presence of internal eavesdropping
The application of successive interference cancellation (SIC) introduces critical security risks
to cooperative non-orthogonal multiple access (NOMA) systems in the presence of …
to cooperative non-orthogonal multiple access (NOMA) systems in the presence of …
Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial
Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low
latency, and massive connectivity, the forefront of wireless research calls for the design of …
latency, and massive connectivity, the forefront of wireless research calls for the design of …
Secure transmission in NOMA-enabled Industrial IoT with resource-constrained untrusted devices
The security of confidential information associated with devices in the industrial Internet of
Things (IIoT) network is a serious concern. This article focuses on achieving a non …
Things (IIoT) network is a serious concern. This article focuses on achieving a non …
User fairness aware power allocation for NOMA-assisted video transmission with adaptive quality adjustment
In this paper, we investigate the user fairness power allocation (PA) for video transmission in
a non-orthogonal multiple access (NOMA)-assisted wireless system with a pair of users …
a non-orthogonal multiple access (NOMA)-assisted wireless system with a pair of users …
Decoding orders for securing untrusted NOMA
This letter focuses on exploring a new decoding order to resolve the secrecy issue among
untrusted non-orthogonal multiple access users. In this context, firstly, we identify the total …
untrusted non-orthogonal multiple access users. In this context, firstly, we identify the total …
Pair Outage Probability Minimization for NOMA Among Resource-Constrained IoT Users
Non-orthogonal multiple access (NOMA) is a favourable technique for future wireless
networks to meet massive connectivity and high throughput. The primary concept of NOMA …
networks to meet massive connectivity and high throughput. The primary concept of NOMA …