2021
DOI: 10.1088/1757-899x/1032/1/012011
|View full text |Cite
|
Sign up to set email alerts
|

An overview of methods to combat eavesdropping in NOMA-based networks through physical layer security

Abstract: Thanks to their potentials in providing reliable communications for a large number of devices, 5G non-orthogonal multiple access (NOMA) techniques have recently been the subject of considerable research interest. Accordingly, research of Physical Layer Security approaches in NOMA is essential. A primary purpose and challenge for security at the physical level of NOMA-based systems is to protect the information transmitted against both external and internal eavesdropping attacks. To this end, it is necessary to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
4
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…This is mainly due to the fact that it allows to serve simultaneously multiple users over the same resources, increasing spectral efficiency when compared to conventional orthogonal multiple access (OMA) techniques. The most pronounced downside of this resource sharing, apart from interference, is the induced information leakage [3].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…This is mainly due to the fact that it allows to serve simultaneously multiple users over the same resources, increasing spectral efficiency when compared to conventional orthogonal multiple access (OMA) techniques. The most pronounced downside of this resource sharing, apart from interference, is the induced information leakage [3].…”
mentioning
confidence: 99%
“…In the downlink, the use of successive interference cancellation (SIC) at the receiver makes it possible for strong users to behave as internal eavesdroppers to weak users while at the same time the air interface makes transmissions vulnerable to eavesdropping outside the network [3]. Multiple physical layer security approaches have been investigated in the past, including the injection of artificial noise [4].…”
mentioning
confidence: 99%
“…This is mainly due to the fact that it allows to serve simultaneously multiple users over the same resources, increasing spectral efficiency when compared to conventional orthogonal multiple access (OMA) techniques. The most pronounced downside of this resource sharing, apart from interference, is the induced information leakage [3].…”
mentioning
confidence: 99%
“…In the downlink, the use of successive interference cancellation (SIC) at the receiver makes it possible for strong users to behave as internal eavesdroppers to weak users while at the same time the air interface makes transmissions vulnerable to eavesdropping outside the network [3]. Multiple physical layer security approaches have been investigated in the past, including the injection of artificial noise [4].…”
mentioning
confidence: 99%