Quantum cryptography in 5G networks: a comprehensive overview
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …
VoIP call, instant message or other use of telecommunications systems involves …
Improving physical layer security of uplink NOMA via energy harvesting jammers
We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA)
with the aid of energy harvesting (EH) jammers. During each time frame, communication is …
with the aid of energy harvesting (EH) jammers. During each time frame, communication is …
Enhancing physical-layer security for IoT with nonorthogonal multiple access assisted semi-grant-free transmission
Nonorthogonal multiple access (NOMA) assisted semi-grant-free transmission admits grant-
free users to access the channels otherwise solely occupied by grant-based users, and has …
free users to access the channels otherwise solely occupied by grant-based users, and has …
Beamforming and jamming optimization for IRS-aided secure NOMA networks
The integration of intelligent reflecting surface (IRS) and multiple access provides a
promising solution to improved coverage and massive connections at low cost. However …
promising solution to improved coverage and massive connections at low cost. However …
Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay
We investigate a secrecy-enhancing design for cooperative downlink and uplink non-
orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …
orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …
Intelligent reflecting surface aided secure communications for NOMA networks
Intelligent reflecting surface (IRS) is deemed a promising technique for future wireless and
mobile technologies due to its ability to reconfigure the radio propagation environment. In …
mobile technologies due to its ability to reconfigure the radio propagation environment. In …
On the security enhancement of uplink NOMA systems with jammer selection
We investigate physical layer security of an uplink NOMA system consisting of one base
station, multiple users and one eavesdropper. During each uplink transmission, two users …
station, multiple users and one eavesdropper. During each uplink transmission, two users …
Beamforming design and power allocation for secure transmission with NOMA
In this paper, we propose a novel beamforming design to enhance physical layer security of
a non-orthogonal multiple access (NOMA) system with the aid of artificial noise (AN). The …
a non-orthogonal multiple access (NOMA) system with the aid of artificial noise (AN). The …
Physical layer security for NOMA systems: Requirements, issues, and recommendations
Nonorthogonal multiple access (NOMA) has been viewed as a potential candidate for the
upcoming generation of wireless communication systems. Comparing to traditional …
upcoming generation of wireless communication systems. Comparing to traditional …
Enhancing PHY-security of FD-enabled NOMA systems using jamming and user selection: Performance analysis and DNN evaluation
In this article, we study the physical-layer security (PHY-security) improvement method for a
downlink nonorthogonal multiple access (NOMA) system in the presence of an active …
downlink nonorthogonal multiple access (NOMA) system in the presence of an active …