User pairing and power allocation in untrusted multiuser noma for internet of things

C Yuan, W Ni, K Zhang, J Bai, J Shen… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the Internet of Things (IoT), massive sensitive and confidential information is transmitted
wirelessly, making security a serious concern. This is particularly true when technologies …

Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial

L Lv, D Xu, RQ Hu, Y Ye, L Yang, X Lei, X Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low
latency, and massive connectivity, the forefront of wireless research calls for the design of …

Secure transmission in NOMA-enabled Industrial IoT with resource-constrained untrusted devices

S Thapar, D Mishra, R Saini - IEEE Transactions on Industrial …, 2023 - ieeexplore.ieee.org
The security of confidential information associated with devices in the industrial Internet of
Things (IIoT) network is a serious concern. This article focuses on achieving a non …

Enhanced user pairing and power allocation strategies for downlink NOMA systems with imperfections in SIC

NS Mouni, MP Reddy, A Kumar… - … Systems & NETworkS …, 2023 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is a key energy and spectrally-efficient multiple
access technique. In this poster, we analyze the adaptive multi-user clustering (AMUC) for …

Adaptive multi-user clustering and power allocation for NOMA systems with imperfect SIC

NS Mouni, A Kumar, PK Upadhyay - arXiv preprint arXiv:2203.15828, 2022 - arxiv.org
Non-orthogonal multiple access (NOMA) is recognized as a promising radio access
technique for the next generation wireless systems. We consider a practical downlink NOMA …

Adaptive bitrate streaming in multi-user downlink NOMA edge caching systems with imperfect SIC

NN Dao, DN Vu, W Na, TM Hoang, DT Do, S Cho - Computer networks, 2022 - Elsevier
Recently, mobile networks have witnessed an increasing dominance of video traffic streams
to simultaneously distribute real-time contents to massive number of user devices. In this …

Pair Outage Probability Minimization for NOMA Among Resource-Constrained IoT Users

S Thapar, D Mishra, R Saini… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is a favourable technique for future wireless
networks to meet massive connectivity and high throughput. The primary concept of NOMA …

[Retracted] Power Allocation Intelligent Optimization for Mobile NOMA Communication System

X Fu, Z Tang, P Xiao - Journal of Advanced Transportation, 2022 - Wiley Online Library
Non‐orthogonal multiple access (NOMA) technology can greatly improve user access and
spectral efficiency. This paper considers the power allocation optimization problem of a two …

Security Transmission Scheme of NOMA Systems With an Untrusted Near User

E Li, R Wang, W Yang, A Dai… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Aiming at the serious threat of untrusted users to the system security in the non-orthogonal
multiple access (NOMA) downlink system, where an untrusted near user assists a far user to …

Secrecy rate maximization in relay-assisted NOMA with Imperfect SIC

I Amin, D Mishra, R Saini, S Aïssa - 2023 IEEE Wireless …, 2023 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has emerged as an enabling solution for 5th
generation and beyond networks, but the often-neglected issues due to successive …