2023
DOI: 10.1109/jsyst.2022.3190297
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 32 publications
0
12
0
Order By: Relevance
“…Notice that the PLS performance of SU was overlooked in [29]- [30], while that of PU was ignored in [31]. The authors of [32] have analyzed the intercept probability of PU and SU in NOMA-OCRN, where the ST selects one SU from among a set of M SUs to operate as a relay for assisting the communication to the PU. In [33], the authors have studied the secrecy performance of the NOMA-enabled overlay cognitive ambient backscatter communication system in the presence of an eavesdropper.…”
Section: A Literature Survey and Problem Formulationmentioning
confidence: 99%
“…Notice that the PLS performance of SU was overlooked in [29]- [30], while that of PU was ignored in [31]. The authors of [32] have analyzed the intercept probability of PU and SU in NOMA-OCRN, where the ST selects one SU from among a set of M SUs to operate as a relay for assisting the communication to the PU. In [33], the authors have studied the secrecy performance of the NOMA-enabled overlay cognitive ambient backscatter communication system in the presence of an eavesdropper.…”
Section: A Literature Survey and Problem Formulationmentioning
confidence: 99%
“…For maximizing the minimal secrecy EC among devices, a joint optimization problem was developed. The authors of [17] presented a joint PLS analysis of secrecy OP and EC for cognitive IIoT networks in which nodes rely on the primary spectrum using spacetime block coding in conjunction with NOMA in cognitive mode to achieve high spectrum efficiency. The analysis on SWIPT protocol based NOMA framework was considered by the authors in [18], wherein they developed three different techniques for transmit antenna selection (TAS) while keeping the complexity into consideration.…”
Section: A Related Workmentioning
confidence: 99%
“…Therefore, four steps are needed for CR-OMA to finish the whole transmission task. Figure (10) illustrates the average secrecy rate along with delay constraints by changing the timeslot. In order to maximize the sum rate, the system must meet the delay constraint.…”
Section: Performance Analysismentioning
confidence: 99%
“…Thereby, physical layer security (PLS) is implemented to undermine the usage of conventional based encryption algorithms. The purpose of PLS is to improve the intrinsic properties of the wireless channel by impeding eavesdroppers from decoding information [10,11]. Cooperative-based communication has gained greater attention in the CR-NOMA system in recent years.…”
Section: Introductionmentioning
confidence: 99%