2019
DOI: 10.1109/tifs.2019.2912337
|View full text |Cite
|
Sign up to set email alerts
|

Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
57
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 85 publications
(57 citation statements)
references
References 52 publications
0
57
0
Order By: Relevance
“…Different from [12]- [14], where the jammers are fixed for emitting AN, the jammers in this work are dynamically selected, and switched into their original role of transmitters if the qualities of channels become better. Our secure NOMA network modeled is also distinct from [23], where the users with stronger channel condition act as relays to help users with weaker channel condition.…”
Section: B Motivation and Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Different from [12]- [14], where the jammers are fixed for emitting AN, the jammers in this work are dynamically selected, and switched into their original role of transmitters if the qualities of channels become better. Our secure NOMA network modeled is also distinct from [23], where the users with stronger channel condition act as relays to help users with weaker channel condition.…”
Section: B Motivation and Contributionsmentioning
confidence: 99%
“…A novel beamforming design was proposed in [11] to enhance physical layer security of a NOMA system with the aid of artificial noise (AN). The benefit from AN inspired researchers to contribute more work [12]- [16], where AN-assisted NOMA can be divided into two categories according to emitting source, one emitting AN from the same transmitter along with desired signals [15], [16], the other emitting AN from the third-party, e.g., relays in cooperative NOMA [12]- [14]. The fundamental functions of relays in cooperative NOMA are forwarding signals.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the open nature of wireless channels, cooperative NOMA systems offer new possibilities and opportunities for security challenge. Recently, emerging as promising solutions to against eavesdropping and guarantee secure transmission, physical layer security techniques have attracted considerable attention and applied in cooperative NOMA systems [12][13][14][15][16][17][18]. In [12], the authors considered both amplify-and-forward (AF) and decode-and-forward (DF) protocols, and derived analytical expressions for secrecy outage probability (SOP) and secrecy capacity.…”
Section: Introductionmentioning
confidence: 99%
“…To maximize the capacity of the systems, a secure two-way relay selection method was proposed for multiple relays networks with two pairs of cellular users [13]. In the work of [14], a novel NOMA-inspired jamming and relaying scheme has been developed to enhance the physical layer security of untrusted relay networks. In [15], an artificial noise (AN)-aided cooperative jamming scheme for multi-input single-output NOMA Cognitive radio networks (CRNs) using simultaneous wireless information and power transfer technology has been proposed to improve the security of the primary network.…”
Section: Introductionmentioning
confidence: 99%