Owing to the eminent performance gain, non-orthogonal multiple access (NOMA) has been regarded as a promising approach to achieve high throughput and low latency for the next-generation networks. Nevertheless, the potential adversaries can still pose a threat to the secure transmission in NOMA systems. Hence, in this article, secure transmission schemes based on beamforming optimization are designed to combat both internal and external eavesdropping for downlink multi-input single-output NOMA networks. Using the transmit beamforming design, we first propose two schemes to protect the privacy of a specific NOMA user in the presence of untrusted users. Then, the sum secrecy rate optimization problem is studied to combat the external eavesdrop...
This paper studies the cell-edge user's performance of a secure multiple-input single-output non-ort...
This paper proposes a new design of non-orthogonal multiple access (NOMA) under secrecy consideratio...
In this paper, a novel approach is introduced to study the achievable delay-guaranteed secrecy rate,...
Non-orthogonal multiple access (NOMA) has been developed as a key multi-access technique for 5G. How...
This correspondence studies a new secrecy beamforming (SBF) scheme for multiple-input single-output ...
Non-orthogonal multiple access (NOMA) is a prospective technology for radio resource constrained fut...
Non-orthogonal multiple access (NOMA) has been proposed as a promising multiple access approach for ...
International audienceThis paper investigates the secrecy performance for simultaneously transmittin...
Non-orthogonal multiple access (NOMA) is a promising approach for 5G. However, the privacy between u...
This paper studies the secure transmission for downlink multiple-input single-output (MISO) non-orth...
This letter proposes a joint covert and secure transmission scheme in the non-orthogonal multiple ac...
This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple acces...
In a downlink non-orthogonal multiple access (NO-MA) system, the reliable transmission of cell-edge ...
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing hig...
The integration of intelligent reflecting surface (IRS) and multiple access provides a promising sol...
This paper studies the cell-edge user's performance of a secure multiple-input single-output non-ort...
This paper proposes a new design of non-orthogonal multiple access (NOMA) under secrecy consideratio...
In this paper, a novel approach is introduced to study the achievable delay-guaranteed secrecy rate,...
Non-orthogonal multiple access (NOMA) has been developed as a key multi-access technique for 5G. How...
This correspondence studies a new secrecy beamforming (SBF) scheme for multiple-input single-output ...
Non-orthogonal multiple access (NOMA) is a prospective technology for radio resource constrained fut...
Non-orthogonal multiple access (NOMA) has been proposed as a promising multiple access approach for ...
International audienceThis paper investigates the secrecy performance for simultaneously transmittin...
Non-orthogonal multiple access (NOMA) is a promising approach for 5G. However, the privacy between u...
This paper studies the secure transmission for downlink multiple-input single-output (MISO) non-orth...
This letter proposes a joint covert and secure transmission scheme in the non-orthogonal multiple ac...
This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple acces...
In a downlink non-orthogonal multiple access (NO-MA) system, the reliable transmission of cell-edge ...
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing hig...
The integration of intelligent reflecting surface (IRS) and multiple access provides a promising sol...
This paper studies the cell-edge user's performance of a secure multiple-input single-output non-ort...
This paper proposes a new design of non-orthogonal multiple access (NOMA) under secrecy consideratio...
In this paper, a novel approach is introduced to study the achievable delay-guaranteed secrecy rate,...