Non-orthogonal multiple access (NOMA) has been developed as a key multi-access technique for 5G. However, secure transmission remains a challenge in NOMA. Especially, the user with weakest channel is most threatened by eavesdropping, due to its highest transmit power. Two schemes are proposed to generate artificial jamming at the NOMA base station (BS), aiming at disrupting the potential eavesdropping without affecting the legitimate transmission. In the first scheme, the transmit power of artificial jamming is maximized, with its received power at each receiver higher than that of other users. Thus, the jamming signal can be eliminated via successive interference cancellation (SIC) before others. When the transmit power of the BS is inadeq...
In this letter, we propose a novel cooperative non-orthogonal multiple access (NOMA) scheme to guara...
Non-orthogonal multiple access (NOMA) is a promising approach for 5G. However, the privacy between u...
This paper studies the cell-edge user's performance of a secure multiple-input single-output non-ort...
Owing to the eminent performance gain, non-orthogonal multiple access (NOMA) has been regarded as a ...
The integration of intelligent reflecting surface (IRS) and multiple access provides a promising sol...
Non-orthogonal multiple access (NOMA) is a prospective technology for radio resource constrained fut...
Non-orthogonal multiple access (NOMA) has been proposed as a promising multiple access approach for ...
This paper studies the secure transmission for downlink multiple-input single-output (MISO) non-orth...
This letter proposes a joint covert and secure transmission scheme in the non-orthogonal multiple ac...
This correspondence studies a new secrecy beamforming (SBF) scheme for multiple-input single-output ...
Due to the proliferation of mobile devices, provisioning of massive connectivity has become a major ...
The fifth-generation (5G) communication systems have many anticipated functionalities and requiremen...
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing hig...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
In a downlink non-orthogonal multiple access (NO-MA) system, the reliable transmission of cell-edge ...
In this letter, we propose a novel cooperative non-orthogonal multiple access (NOMA) scheme to guara...
Non-orthogonal multiple access (NOMA) is a promising approach for 5G. However, the privacy between u...
This paper studies the cell-edge user's performance of a secure multiple-input single-output non-ort...
Owing to the eminent performance gain, non-orthogonal multiple access (NOMA) has been regarded as a ...
The integration of intelligent reflecting surface (IRS) and multiple access provides a promising sol...
Non-orthogonal multiple access (NOMA) is a prospective technology for radio resource constrained fut...
Non-orthogonal multiple access (NOMA) has been proposed as a promising multiple access approach for ...
This paper studies the secure transmission for downlink multiple-input single-output (MISO) non-orth...
This letter proposes a joint covert and secure transmission scheme in the non-orthogonal multiple ac...
This correspondence studies a new secrecy beamforming (SBF) scheme for multiple-input single-output ...
Due to the proliferation of mobile devices, provisioning of massive connectivity has become a major ...
The fifth-generation (5G) communication systems have many anticipated functionalities and requiremen...
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing hig...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
In a downlink non-orthogonal multiple access (NO-MA) system, the reliable transmission of cell-edge ...
In this letter, we propose a novel cooperative non-orthogonal multiple access (NOMA) scheme to guara...
Non-orthogonal multiple access (NOMA) is a promising approach for 5G. However, the privacy between u...
This paper studies the cell-edge user's performance of a secure multiple-input single-output non-ort...