2022
DOI: 10.1049/cmu2.12475
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing secrecy performance of energy harvesting NOMA systems using IoT user scheduling under untrusted users

Abstract: In this work, multiple energy-limited Internet of Things (IoT) users are intended to communicate with their destination (D u ). The scheduled IoT user harvests the energy from a source signal and uses this energy to forward a mixture of its message and the source message to the D u and the source destination based on non-orthogonal multiple access (NOMA). Since the messages are transmitted at the same resource block, the far untrusted user (source destination) has the opportunity to access the message destined… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 29 publications
(133 reference statements)
0
1
0
Order By: Relevance
“…where N S appears in (12) because Site S transmits N S symbol streams simultaneously. It can be observed from ( 12) that the throughput of Dd is also jointly configured by multiple parameters, K, ν, ψ, P, N B , N S , N 1 , N 2 , Ω, and τ, because they affect Δ dn .…”
Section: Throughputmentioning
confidence: 99%
See 1 more Smart Citation
“…where N S appears in (12) because Site S transmits N S symbol streams simultaneously. It can be observed from ( 12) that the throughput of Dd is also jointly configured by multiple parameters, K, ν, ψ, P, N B , N S , N 1 , N 2 , Ω, and τ, because they affect Δ dn .…”
Section: Throughputmentioning
confidence: 99%
“…Notably, 5G/6G users are already equipped with affordable energy harvesting (EH) circuits [5,6]. Interestingly, the literature has focused only on the linear EH (lEH) characteristics needed to analyze basic system performance [7][8][9][10][11][12]. However, EH circuits comprise non-linear components, such as capacitors, diodes, and inductors.…”
Section: Introduction 1| Fundamentalsmentioning
confidence: 99%
“…To handle the co-channel interference, the problem of joint power allocation and sub-channel assignment for Device-to-device (D2D)enabled IoT NOMA, the sum rate, fairness, access rate and computational complexity have been investigated [47]. In [48], the CNOMA-IoT user scheduling strategy is used to enhance the secrecy OP. The authors in [49] evaluate overlay networks NOMA in terms of secrecy throughput and secrecy OP.…”
Section: Of 18mentioning
confidence: 99%