2020 28th Iranian Conference on Electrical Engineering (ICEE) 2020
DOI: 10.1109/icee50131.2020.9260991
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Energy Harvesting NOMA Systems with IOT Relay Selection and Untrusted User Presence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…OMA‐TSIUS) and NOMA protocol regarding partial IoT user selection (i.e. NOMA‐PIUS) [30] are applied to the energy‐constrained IoT users. Based on OMA protocol, xm$x_{m}$ and xs$x_s$ are transmitted from Um*$U_{{\it m}}^{\ast }$ to their own destinations (i.e.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…OMA‐TSIUS) and NOMA protocol regarding partial IoT user selection (i.e. NOMA‐PIUS) [30] are applied to the energy‐constrained IoT users. Based on OMA protocol, xm$x_{m}$ and xs$x_s$ are transmitted from Um*$U_{{\it m}}^{\ast }$ to their own destinations (i.e.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Hence, the far untrusted source destination plays the role of the external eavesdropper in the considered OMA‐based system. In [30], the selection strategy is according to the maximum CSI for the source to the IoT users links, which maximizes the harvested energy at the IoT users.…”
Section: Numerical Resultsmentioning
confidence: 99%