2021
DOI: 10.1109/lcomm.2021.3057080
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage Analysis in NOMA Power Line Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
10
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 16 publications
0
10
0
2
Order By: Relevance
“…Similar to [2], the outage performance of C-NOMA was investigated over log-normal fading distribution in [7]. Secrecy performance was investigated on a similar model in [8]. NOMA has also been integrated with various technologies which have improved its operational efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to [2], the outage performance of C-NOMA was investigated over log-normal fading distribution in [7]. Secrecy performance was investigated on a similar model in [8]. NOMA has also been integrated with various technologies which have improved its operational efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…[24][25][26][27] proposed a novel hybrid transceiver design for MIMO-NOMA deploying lens antenna array. In [28][29][30][31][32][33][34], simulation results demonstrated that compared to OMA, NOMA has better performances in terms of channel estimation accuracy, system sum-rate, outage probability and symbol error rate (SER). [35] shown that the installation of reconfigurable intelligent surface (RIS) in MIMO-NOMA for long-distance communication could be an effective solution to the EE optimization problem using its reconfigurable properties combined with the higher degrees of freedom provided with the frequency reuse capability of NOMA.…”
Section: Introductionmentioning
confidence: 99%
“…The PLS offers keyless knowledge authentication with information-theoretic assurances, as opposed to traditional cryptography techniques that use the phenomenon of secret key exchange at both transmitter and receiver and it also depends on the decipherer’s restricted computation capacity to safeguard the information [ 23 ]. The PLS follows the Shannon theory concept, which protects the physical layer by using the inherent randomness of wireless networks [ 24 ].…”
Section: Introductionmentioning
confidence: 99%