2021
DOI: 10.1109/lnet.2021.3051757
|View full text |Cite
|
Sign up to set email alerts
|

Decoding Orders for Securing Untrusted NOMA

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…In [4], [10], a novel secure decoding order is suggested to provide positive secrecy rate for both strong and weak users. In [11], feasible secure decoding orders are investigated to ensure a positive secrecy rate for all users in an N -user system.…”
Section: A Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In [4], [10], a novel secure decoding order is suggested to provide positive secrecy rate for both strong and weak users. In [11], feasible secure decoding orders are investigated to ensure a positive secrecy rate for all users in an N -user system.…”
Section: A Related Workmentioning
confidence: 99%
“…In contrast, the linear model can more effectively represent the relationship between RI and power of the received signal. In [11], though the linear SIC model has been considered, no SOP analysis has been done. Hence, to analyze the realistic impact of imperfect SIC, we investigate the secrecy performance analysis for a two-user untrusted NOMA system with linear SIC model, which to the best of our knowledge, has not been explored yet.…”
Section: B Research Gap and Motivationmentioning
confidence: 99%
See 2 more Smart Citations