A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Nonorthogonal multiple access for 5G and beyond
Driven by the rapid escalation of the wireless capacity requirements imposed by advanced
multimedia applications (eg, ultrahigh-definition video, virtual reality, etc.), as well as the …
multimedia applications (eg, ultrahigh-definition video, virtual reality, etc.), as well as the …
A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends
Non-orthogonal multiple access (NOMA) is an essential enabling technology for the fifth-
generation (5G) wireless networks to meet the heterogeneous demands on low latency, high …
generation (5G) wireless networks to meet the heterogeneous demands on low latency, high …
NOMA and 5G emerging technologies: A survey on issues and solution techniques
Abstract Power Domain Non-Orthogonal Multiple Access (PD-NOMA) is a potential
technology for the next generation of cellular networks. Compared to classical orthogonal …
technology for the next generation of cellular networks. Compared to classical orthogonal …
Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks
Mobile edge computing (MEC) has been envisaged as a promising technique in the next-
generation wireless networks. In order to improve the security of computation tasks …
generation wireless networks. In order to improve the security of computation tasks …
Enhancing physical-layer security for IoT with nonorthogonal multiple access assisted semi-grant-free transmission
Nonorthogonal multiple access (NOMA) assisted semi-grant-free transmission admits grant-
free users to access the channels otherwise solely occupied by grant-based users, and has …
free users to access the channels otherwise solely occupied by grant-based users, and has …
Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) have been deemed two
promising technologies due to their potential to achieve high spectral efficiency and massive …
promising technologies due to their potential to achieve high spectral efficiency and massive …
Physical layer security for cooperative NOMA systems
In this correspondence, we investigate the physical layer security for cooperative
nonorthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and …
nonorthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and …
A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …