2020 National Conference on Communications (NCC) 2020
DOI: 10.1109/ncc48643.2020.9056050
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy at Physical Layer in NOMA with Cooperative Jamming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…This is indicative of the system's superiority in terms of security. While the authors in [10] are mainly concerned to enhance the security of confidential information transmission between a source, two destinations, a friendly jammer (FJ), and an eavesdropper (Eve). To thwart Eve's attempts to intercept data, the FJ sends a jamming signal concurrently with the source sending a superimposed signal across both receivers that through NOMA.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This is indicative of the system's superiority in terms of security. While the authors in [10] are mainly concerned to enhance the security of confidential information transmission between a source, two destinations, a friendly jammer (FJ), and an eavesdropper (Eve). To thwart Eve's attempts to intercept data, the FJ sends a jamming signal concurrently with the source sending a superimposed signal across both receivers that through NOMA.…”
Section: A Related Workmentioning
confidence: 99%
“…From the literature, it can be affirmed that different type of jamming signals can be employed. For instance, friendly jammer (FJ) signal was employed in [10], while, cooperative jamming signal was used in [22], [27] and artificial-noise (AN) aided jamming signal was employed in [42]- [44] for safeguarding the system's security aspects. The information signal becomes hidden during propagation by radiating the generated noise isotropically.…”
Section: Average Secrecy Sum Rate (Assrmentioning
confidence: 99%
“…The authors in [15] described a jammer-based downlink NOMA system with half-duplex (HD) decode-and-forward (DF) relaying in the absence of direct links between source and end users. In [16], authors took into account a network architecture in which a source uses the NOMA technique to interact with two destination users in the presence of an eavesdropper and a friendly jammer. In [17], a HD-DF relay was employed in a downlink NOMA network and jamming signals were exploited to disrupt the eavesdropping.…”
Section: Introductionmentioning
confidence: 99%
“…28 Later, an extension of Jiang et al 28 the secrecy analysis of cooperative NOMA system, is also studied with the aid of cooperative jammer, where power allocation problem is also analyzed. 29,30 From the aforementioned studies, to the best of author's knowledge, it is noticed that the secrecy analysis of cooperative NOMA network with jamming schemes is not deliberated. Motivated by this, in our analysis, a new control jamming (CJ) scheme is proposed for a cooperative NOMA network with DF relaying under total power constraint.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, to secure the confidential information against eavesdropping and to enhance the secrecy performance further, cooperative jamming technique has been employed for NOMA system 28 . Later, an extension of Jiang et al 28 the secrecy analysis of cooperative NOMA system, is also studied with the aid of cooperative jammer, where power allocation problem is also analyzed 29,30 . From the aforementioned studies, to the best of author's knowledge, it is noticed that the secrecy analysis of cooperative NOMA network with jamming schemes is not deliberated.…”
Section: Introductionmentioning
confidence: 99%