2019
DOI: 10.1109/lcomm.2019.2934410
|View full text |Cite
|
Sign up to set email alerts
|

Jammer-Aided Secure Communications for Cooperative NOMA Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(29 citation statements)
references
References 17 publications
0
25
0
Order By: Relevance
“…[17][18][19][20] In the context of cooperative NOMA, physical layer security has attracted increasing research interests. [21][22][23][24][25][26] In the work of Vo et al, 21 the authors considered imperfect channel state information (CSI) and analyzed the secrecy and throughput of a cooperative NOMA energy harvesting IoT system in the presence of untrust relays. Aimming to against eavesdropping and meanwhile guarantee the quality of service (QoS) of IoTs, a beamforming design was developed by Deng et al 22 for a two-way cognitive radio IoT network.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…[17][18][19][20] In the context of cooperative NOMA, physical layer security has attracted increasing research interests. [21][22][23][24][25][26] In the work of Vo et al, 21 the authors considered imperfect channel state information (CSI) and analyzed the secrecy and throughput of a cooperative NOMA energy harvesting IoT system in the presence of untrust relays. Aimming to against eavesdropping and meanwhile guarantee the quality of service (QoS) of IoTs, a beamforming design was developed by Deng et al 22 for a two-way cognitive radio IoT network.…”
Section: Introductionmentioning
confidence: 99%
“…In Reference 23, the impacts of in-phase and quadrature-phase imbalance was considered by Li et al, and the secrecy performance of cooperative NOMA IoT transmission systems was discussed. In the purpose of enhancing the security of the primary network, a CJ scheme for MISO-NOMA cognitive radio networks using SWIPT has been proposed by Zhou et al 24 For jammer-aided cooperative NOMA networks, Yu et al, 25 exploited two different relay selection schemes to for discussing the analytical and asymptotical expressions of secrecy outage probability (SOP). Besides, with the aid of a jammer, a novel CJ scheme has been derived by Chen et al 26 for maximizing the secrecy rate and effective energy efficiency (EE) in cooperative NOMA networks.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the open nature of wireless channels, cooperative NOMA systems offer new possibilities and opportunities for security challenge. Recently, emerging as promising solutions to against eavesdropping and guarantee secure transmission, physical layer security techniques have attracted considerable attention and applied in cooperative NOMA systems [12][13][14][15][16][17][18]. In [12], the authors considered both amplify-and-forward (AF) and decode-and-forward (DF) protocols, and derived analytical expressions for secrecy outage probability (SOP) and secrecy capacity.…”
Section: Introductionmentioning
confidence: 99%
“…In [15], an artificial noise (AN)-aided cooperative jamming scheme for multi-input single-output NOMA Cognitive radio networks (CRNs) using simultaneous wireless information and power transfer technology has been proposed to improve the security of the primary network. The works in [16] analyzed analytical and asymptotical expressions of SOP under both random and max-min relay selection schemes for jammer-aided cooperative NOMA networks. In [17], a multi-antenna full-duplex (FD) relay has been introduced in a cooperative NOMA system with two users, and a full-duplex-jamming (FDJam) scheme has been proposed to guarantee the secure transmission for the user with a weak channel.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation