To enhance the secrecy of wireless transmission, we propose a cooperative user relaying NOMA scheme, in which the near user works in full-duplex mode by transmitting jamming signals and receiving desired signals in the first phase, and the base station sends jamming signals in the second phase. Two power allocation (PA) schemes between the legitimate and jamming signals are designed based on different knowledge of the eavesdropping channel state information (ECSI). The first scheme aims to jam the eavesdropping with highest power while meeting rate requirements without ECSI. In the second scheme, the closed-form expressions of secrecy outage probability (SOP) are first derived using the statistical ECSI. Then, the sum secrecy rate is maximi...
Three relay selection techniques, aiming at achieving secure non-orthogonal multiple access in coope...
hree relay selection techniques, aiming at achieving secure non-orthogonal multiple access in cooper...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access ...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
© 1967-2012 IEEE. This paper analyzes the secrecy capacity of a cooperative relaying system using no...
Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5G and beyond. ...
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies ...
Abstract In this work, we analyze the secrecy rate in a cooperative network, where a source node is ...
In this paper, the secrecy performance for a downlink cooperative non-orthogonal multiple access (NO...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
In 5G and beyond wireless communication net-works, non-orthogonal multiple access (NOMA) and Full-Du...
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optim...
Three relay selection techniques, aiming at achieving secure non-orthogonal multiple access in coope...
hree relay selection techniques, aiming at achieving secure non-orthogonal multiple access in cooper...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access ...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
© 1967-2012 IEEE. This paper analyzes the secrecy capacity of a cooperative relaying system using no...
Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5G and beyond. ...
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies ...
Abstract In this work, we analyze the secrecy rate in a cooperative network, where a source node is ...
In this paper, the secrecy performance for a downlink cooperative non-orthogonal multiple access (NO...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
In 5G and beyond wireless communication net-works, non-orthogonal multiple access (NOMA) and Full-Du...
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optim...
Three relay selection techniques, aiming at achieving secure non-orthogonal multiple access in coope...
hree relay selection techniques, aiming at achieving secure non-orthogonal multiple access in cooper...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...