User pairing and power allocation in untrusted multiuser noma for internet of things
C Yuan, W Ni, K Zhang, J Bai, J Shen… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the Internet of Things (IoT), massive sensitive and confidential information is transmitted
wirelessly, making security a serious concern. This is particularly true when technologies …
wirelessly, making security a serious concern. This is particularly true when technologies …
Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial
Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low
latency, and massive connectivity, the forefront of wireless research calls for the design of …
latency, and massive connectivity, the forefront of wireless research calls for the design of …
Secure transmission in NOMA-enabled Industrial IoT with resource-constrained untrusted devices
The security of confidential information associated with devices in the industrial Internet of
Things (IIoT) network is a serious concern. This article focuses on achieving a non …
Things (IIoT) network is a serious concern. This article focuses on achieving a non …
Enhanced user pairing and power allocation strategies for downlink NOMA systems with imperfections in SIC
Non-orthogonal multiple access (NOMA) is a key energy and spectrally-efficient multiple
access technique. In this poster, we analyze the adaptive multi-user clustering (AMUC) for …
access technique. In this poster, we analyze the adaptive multi-user clustering (AMUC) for …
Adaptive multi-user clustering and power allocation for NOMA systems with imperfect SIC
NS Mouni, A Kumar, PK Upadhyay - arXiv preprint arXiv:2203.15828, 2022 - arxiv.org
Non-orthogonal multiple access (NOMA) is recognized as a promising radio access
technique for the next generation wireless systems. We consider a practical downlink NOMA …
technique for the next generation wireless systems. We consider a practical downlink NOMA …
Adaptive bitrate streaming in multi-user downlink NOMA edge caching systems with imperfect SIC
Recently, mobile networks have witnessed an increasing dominance of video traffic streams
to simultaneously distribute real-time contents to massive number of user devices. In this …
to simultaneously distribute real-time contents to massive number of user devices. In this …
Pair Outage Probability Minimization for NOMA Among Resource-Constrained IoT Users
Non-orthogonal multiple access (NOMA) is a favourable technique for future wireless
networks to meet massive connectivity and high throughput. The primary concept of NOMA …
networks to meet massive connectivity and high throughput. The primary concept of NOMA …
[Retracted] Power Allocation Intelligent Optimization for Mobile NOMA Communication System
X Fu, Z Tang, P Xiao - Journal of Advanced Transportation, 2022 - Wiley Online Library
Non‐orthogonal multiple access (NOMA) technology can greatly improve user access and
spectral efficiency. This paper considers the power allocation optimization problem of a two …
spectral efficiency. This paper considers the power allocation optimization problem of a two …
Security Transmission Scheme of NOMA Systems With an Untrusted Near User
E Li, R Wang, W Yang, A Dai… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Aiming at the serious threat of untrusted users to the system security in the non-orthogonal
multiple access (NOMA) downlink system, where an untrusted near user assists a far user to …
multiple access (NOMA) downlink system, where an untrusted near user assists a far user to …
Secrecy rate maximization in relay-assisted NOMA with Imperfect SIC
Non-orthogonal multiple access (NOMA) has emerged as an enabling solution for 5th
generation and beyond networks, but the often-neglected issues due to successive …
generation and beyond networks, but the often-neglected issues due to successive …