2020
DOI: 10.1109/tvt.2020.3008715
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance of NOMA Systems With Energy Harvesting and Full-Duplex Relaying

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Therefore, in this paper, we consider only two downlink NOMA users. Similar assumptions were considered in [7]- [9]. However, our analysis can be extended to multiple downlink NOMA users by adopting the user pairing scheme proposed in [9].…”
Section: System Modelmentioning
confidence: 96%
See 1 more Smart Citation
“…Therefore, in this paper, we consider only two downlink NOMA users. Similar assumptions were considered in [7]- [9]. However, our analysis can be extended to multiple downlink NOMA users by adopting the user pairing scheme proposed in [9].…”
Section: System Modelmentioning
confidence: 96%
“…The secrecy outage probability (SOP) analysis of a multiplerelay-assisted two-user downlink NOMA system was presented in [7], where the authors proposed different relay selection schemes to enhance the secrecy performance of the system. The ergodic sum secrecy rate (ESSR) analysis of a two-user downlink and uplink cooperative NOMA system with untrusted relaying was performed in [8], while the authors in [9] presented the ergodic secrecy rate (ESR) and SOP analysis of a full-duplex relay-assisted two-user downlink NOMA system with energy harvesting.…”
Section: Introductionmentioning
confidence: 99%
“…Similar assumptions were considered in [7]- [9]. However, our analysis can be extended to multiple downlink NOMA users by adopting the user pairing scheme proposed in [9]. exponent.…”
Section: System Modelmentioning
confidence: 96%
“…Following the arguments in [12], we adopt a low-overhead location-based user-pairing scheme. In this scheme, we form a set S, consisting of the distances of the secondary users from the ST, arranged in a descending order.…”
Section: System Modelmentioning
confidence: 99%