Covert communications: A comprehensive survey
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …
secure techniques, covert communication emerges as a potential solution to security for …
NOMA and 5G emerging technologies: A survey on issues and solution techniques
Abstract Power Domain Non-Orthogonal Multiple Access (PD-NOMA) is a potential
technology for the next generation of cellular networks. Compared to classical orthogonal …
technology for the next generation of cellular networks. Compared to classical orthogonal …
Secrecy-energy efficient hybrid beamforming for satellite-terrestrial integrated networks
In this paper, we investigate secrecy-energy efficient hybrid beamforming (BF) schemes for a
satellite-terrestrial integrated network, wherein a multibeam satellite system shares the …
satellite-terrestrial integrated network, wherein a multibeam satellite system shares the …
Reliability and security of CR-STAR-RIS-NOMA assisted IoT networks
The Internet-of-Things (IoT) has greatly facilitated our daily lives. Nevertheless, how to
achieve higher spectral efficiency, large-scale device access, and lower latency for the next …
achieve higher spectral efficiency, large-scale device access, and lower latency for the next …
Interplay between NOMA and other emerging technologies: A survey
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to
scale up the number of users, enhance the spectral efficiency, and improve the user-fairness …
scale up the number of users, enhance the spectral efficiency, and improve the user-fairness …
Covert mmWave communications with finite blocklength against spatially random wardens
R Ma, W Yang, X Guan, X Lu, Y Song… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In this article, we investigate covert millimeter-wave (mmWave) communications with finite
blocklength, where a multiantenna transmitter sends covert messages to a legitimate …
blocklength, where a multiantenna transmitter sends covert messages to a legitimate …
Joint impacts of imperfect CSI and imperfect SIC in cognitive radio-assisted NOMA-V2X communications
In this study, the performance of a secondary network in cognitive radio (CR) is studied in
the context of vehicle-to-everything (V2X). The non-orthogonal multiple access (NOMA) is …
the context of vehicle-to-everything (V2X). The non-orthogonal multiple access (NOMA) is …
Low earth orbit satellite security and reliability: Issues, solutions, and the road ahead
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-
increasing user demands, reduced costs, and technological progress. Since there is a lack …
increasing user demands, reduced costs, and technological progress. Since there is a lack …
NOMA-assisted secure short-packet communications in IoT
Z **ang, W Yang, Y Cai, Z Ding… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is expected to provide ubiquitous wireless machine-type
communication devices and extensive information collection, resulting in an unprecedented …
communication devices and extensive information collection, resulting in an unprecedented …
A survey on 5G coverage improvement techniques: Issues and future challenges
Fifth generation (5G) is a recent wireless communication technology in mobile networks. The
key parameters of 5G are enhanced coverage, ultra reliable low latency, high data rates …
key parameters of 5G are enhanced coverage, ultra reliable low latency, high data rates …