The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in ...
In this paper, a downlink scenario of a non-orthogonal multiple access (NOMA) scheme with power cons...
In this paper, we study the secrecy outage probability (SOP)and the strictly positive secrecy capaci...
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogo...
This paper studies a downlink security-aware secure outage performance in the secondary network of c...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
This paper studies the secondary network relying relay selection to transmit signal from the seconda...
The demand of real-time wireless communication is increasing drastically where users demand for bett...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
The demand of real-time wireless communication is increasing drastically where users demand for bett...
Security performance and the impact of imperfect channel state information (CSI) in underlay coopera...
© 1967-2012 IEEE. This paper analyzes the secrecy capacity of a cooperative relaying system using no...
In this letter, we propose a novel cooperative non-orthogonal multiple access (NOMA) scheme to guara...
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOM...
Different system models utilizing Non-orthogonal multiple access (NOMA) have been successfully studi...
In this paper, a downlink scenario of a non-orthogonal multiple access (NOMA) scheme with power cons...
In this paper, we study the secrecy outage probability (SOP)and the strictly positive secrecy capaci...
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogo...
This paper studies a downlink security-aware secure outage performance in the secondary network of c...
A key feature of the non-orthogonal multiple access (NOMA) technique is that users with better chann...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
This paper studies the secondary network relying relay selection to transmit signal from the seconda...
The demand of real-time wireless communication is increasing drastically where users demand for bett...
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a...
The demand of real-time wireless communication is increasing drastically where users demand for bett...
Security performance and the impact of imperfect channel state information (CSI) in underlay coopera...
© 1967-2012 IEEE. This paper analyzes the secrecy capacity of a cooperative relaying system using no...
In this letter, we propose a novel cooperative non-orthogonal multiple access (NOMA) scheme to guara...
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOM...
Different system models utilizing Non-orthogonal multiple access (NOMA) have been successfully studi...
In this paper, a downlink scenario of a non-orthogonal multiple access (NOMA) scheme with power cons...
In this paper, we study the secrecy outage probability (SOP)and the strictly positive secrecy capaci...
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogo...