2022
DOI: 10.1109/tccn.2021.3130979
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Noise Aided Secure Communications for Cooperative NOMA Networks

Abstract: reveal that the SRT of the near-user and far-user can be improved by increasing the number of antennas at the near-user and the number of relays.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 55 publications
(144 reference statements)
0
3
0
Order By: Relevance
“…Additionally, three different cases of self-interference (SI) signal in FD mode were adopted to investigate the impact of SI cancellation on system secure performance. In [24], one source established communication directly with a multi-antenna near-user, while the source used multiple FD relays to communicate with the distant user in the case of passive Eves. To solve this wiretapping problem, a new FD-based two-stage AN scheme was proposed, where AN is not only an interference signal to prevent eavesdropping but also acts as a secret key to enhance the confidentiality of the distant user.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, three different cases of self-interference (SI) signal in FD mode were adopted to investigate the impact of SI cancellation on system secure performance. In [24], one source established communication directly with a multi-antenna near-user, while the source used multiple FD relays to communicate with the distant user in the case of passive Eves. To solve this wiretapping problem, a new FD-based two-stage AN scheme was proposed, where AN is not only an interference signal to prevent eavesdropping but also acts as a secret key to enhance the confidentiality of the distant user.…”
Section: Related Workmentioning
confidence: 99%
“…Compared with the traditional upper-layer security technology, physical layer security (PLS) does not need to consume a lot of communication resources or infrastructure to share encryption technology between legitimate users, which is more suitable against wiretapping attacks in IoT networks [17]. Therefore, various PLS technology adopted by the NOMA system, such as relay-aided diversity and cooperative jamming, has gradually attracted widespread attention from academia and is regarded as a research hotspot to achieve massive connectivity and secure transmission [15][16][17][18][19][20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%
“…The wired forward link is not flexible enough in deployment. Some urban areas may not be suitable for laying wired links [10,11]. With the increase of wired forward links, the network complexity of the forward link will increase exponentially.…”
Section: Introductionmentioning
confidence: 99%
“…With the increasing scarcity of frequency and harmonic resources, the exploitation of airspace resources has become an effective way to achieve and enhance covert communications [11,12]. Singleantenna transceivers have extremely limited airspace freedom, which makes it difficult to reconcile the conflict between the system's frequency-harmonic efficiency and its stealthiness [13,14]. Another implementation of MIMO, distributed node collaboration, can also help improve covert communications by using collaborating nodes to relay signals or to take turns for the target signal transmission.…”
Section: Introductionmentioning
confidence: 99%