ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel
In this paper, a decoding method of joint zero-forcing and successive interference cancellation (ZF-SIC) is put forward to assist the study of the individual secrecy in the quasi-static Rayleigh fading single-input multiple-output multiple access wiretap
Kaiwei Jiang +4 more
doaj +2 more sources
SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang +4 more
doaj +2 more sources
Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping [PDF]
The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers.
Chorti, Arsenia +4 more
core +3 more sources
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding.
Kaiwei Jiang +4 more
doaj +2 more sources
Optimization of Code Rates in SISOME Wiretap Channels [PDF]
We propose a new framework for determining the wiretap code rates of single-input single-output multi-antenna eavesdropper (SISOME) wiretap channels when the capacity of the eavesdropper's channel is not available at the transmitter.
Geraci, Giovanni +4 more
core +2 more sources
Secrecy Performance Analysis of Hybrid RF/FSO System under Different Eavesdropping Strategies
In this paper, we analyze the confidentiality of a hybrid radio frequency (RF)/free-space optical (FSO) system with regard to physical layer security (PLS). In this system, signals are transmitted between the source and destination using RF and FSO links,
Xinkang Song +4 more
doaj +2 more sources
Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User
In this paper, we investigate the integration of physical layer security (PLS) and cognitive radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral efficiency (SE) and security in fifth generation (5G) and beyond wireless ...
Swathi Priya Indraganti +1 more
doaj +2 more sources
Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments
In this work, we focus on the issue of secure communication in energy harvesting untrusted relay networks taking into account the impact of hardware impairments, where an energy-constrained relay, powered by received radio frequency signals, attempts to ...
Dechuan Chen +5 more
doaj +2 more sources
Physical Layer Security in Uplink NOMA Multi-Antenna Systems With Randomly Distributed Eavesdroppers
The physical layer security of uplink non-orthogonal multiple access (NOMA) is analyzed. A stochastic geometry approach is applied to analyze the coverage probability and effective secrecy throughput (EST) of the kth NOMA user, where a fixed or an ...
Gerardo Gomez +4 more
doaj +2 more sources
Power Allocation for Secure NOMA Network Based on Q-Learning
This paper investigates the secrecy performance of a multi-relay non-orthogonal multiple access (NOMA) network. Considering the presence of eavesdroppers, an optimal relay selection scheme and a jamming signal transmission scheme for both amplify-and ...
Weidong Guo, Xinyan Wang
doaj +2 more sources

