In this paper, we consider the physical layer security of a downlink cooperative multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) network over Nakagami-m fading. The network consists of a multi-antenna source, multiple decode-and-forward (DF) relays, and two users with different priority, in the presence of a passive eavesdropper. Specifically, we investigate the secure transmission from the source to the users via the help of the relays, in which the signals of the users might or might not be successfully decoded at the relays. Thus, we aim to design secure communication protocols for the considered system, where transmit antenna selection (TAS), maximal ratio transmission (MRT), and relay selection are employed ba...
In this paper, a Decode-and-Forward (DF) relaying system for Non Orthogonal Multiple Access (NOMA) n...
In this paper, we investigate the secrecy performance of an Amplify-and-Forward (AF) relay in a coop...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
In this paper, we study the physical layer security of a downlink multi-input single-output non-orth...
In this paper, the secrecy performance for a downlink cooperative non-orthogonal multiple access (NO...
This paper studies the impacts of antenna selection algorithms in decode-and-forward (DF) cooperativ...
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOM...
This paper investigates the physical layer security of a full-duplex (FD) Decode-and-Forward (DF) NO...
In this paper, we study the secrecy outage probability (SOP)and the strictly positive secrecy capaci...
© 1967-2012 IEEE. This paper analyzes the secrecy capacity of a cooperative relaying system using no...
Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Acce...
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access ...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
In 5G and beyond wireless communication net-works, non-orthogonal multiple access (NOMA) and Full-Du...
In this paper, an underlay cooperative cognitive network using a non-orthogonal multiple access (UCC...
In this paper, a Decode-and-Forward (DF) relaying system for Non Orthogonal Multiple Access (NOMA) n...
In this paper, we investigate the secrecy performance of an Amplify-and-Forward (AF) relay in a coop...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
In this paper, we study the physical layer security of a downlink multi-input single-output non-orth...
In this paper, the secrecy performance for a downlink cooperative non-orthogonal multiple access (NO...
This paper studies the impacts of antenna selection algorithms in decode-and-forward (DF) cooperativ...
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOM...
This paper investigates the physical layer security of a full-duplex (FD) Decode-and-Forward (DF) NO...
In this paper, we study the secrecy outage probability (SOP)and the strictly positive secrecy capaci...
© 1967-2012 IEEE. This paper analyzes the secrecy capacity of a cooperative relaying system using no...
Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Acce...
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access ...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
In 5G and beyond wireless communication net-works, non-orthogonal multiple access (NOMA) and Full-Du...
In this paper, an underlay cooperative cognitive network using a non-orthogonal multiple access (UCC...
In this paper, a Decode-and-Forward (DF) relaying system for Non Orthogonal Multiple Access (NOMA) n...
In this paper, we investigate the secrecy performance of an Amplify-and-Forward (AF) relay in a coop...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...