2018
DOI: 10.1109/access.2018.2875118
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 37 publications
1
6
0
Order By: Relevance
“…2 shows the coverage probabilities of AU for different values of AU's altitudes. As it is seen, our analytical results match the simulation results closely, which verifies the accuracy of ( 30)- (31). Using ( 30)-( 31), we find that AU's altitude plays an important role in determining the coverage probability.…”
Section: Simulation and Analytical Resultssupporting
confidence: 78%
“…2 shows the coverage probabilities of AU for different values of AU's altitudes. As it is seen, our analytical results match the simulation results closely, which verifies the accuracy of ( 30)- (31). Using ( 30)-( 31), we find that AU's altitude plays an important role in determining the coverage probability.…”
Section: Simulation and Analytical Resultssupporting
confidence: 78%
“…Moreover, those literature addressed the secure problems from DL NOMA. In contrast with [27], where users were paired and NOMA was carried out between the pair, our UL NOMA system has more generality that all users carry out NOMA, gaining higher spectral efficiency and more connectivity accommodation. Furthermore, full-duplex BS jamming is adopted to enhance security in [27], whereas we employ the weakest users' jamming, on one hand to improve the strongest users' secrecy performance (in turn improve the overall secrecy performance), on the other hand to avoid these users revealing secrecy message (being eavesdropped).…”
Section: B Motivation and Contributionsmentioning
confidence: 99%
“…Different from keyless physical security in above secure UL NOMA, [26] proposed an uplink chaos NOMA transmission scheme which is based on a common key encryption to realize a secure and large-capacity uplink transmission. In addition to the inherent intra-cluster interference in NOMA, the authors [27] studied the physical layer security of UL NOMA for cellular internet of things, where inter-cell interference was also taken into account. In [28], a computation efficiency maximization problem was studied in NOMA-enabled mobile edge computing (MEC) networks.…”
mentioning
confidence: 99%
“…Substituting (15) into (18), we approximate the SOP of the K-th transmission by its lower bound, as follows:…”
Section: System Model Of Secure Harq-ccmentioning
confidence: 99%
“…As another important metric, the widely discussed secrecy throughput presented the average reliable and secure rate during each transmission [8][9][10]. Moreover, signal-processing methods, e.g., beamforming and artificial noise, efficiently enhanced the secrecy performance [11][12][13][14][15][16][17][18]. It was also proposed that diversity technologies had their special functions in PLS, including multi-input multi-output (MIMO) diversity and multi-user diversity [19].…”
Section: Introductionmentioning
confidence: 99%