2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications 2020
DOI: 10.1109/pimrc48278.2020.9217169
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance of Friendly Jammer Assisted Cooperative NOMA Systems with Internal Eavesdroppers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…After the application of integration by parts and simple mathematical steps, we get Equation (C.10) After substituting the expression from (D.6) and (D.9) along with Equation ( 19) and applying similar steps as in Appendix A, we get Equation (21).…”
Section: Appendix C (Proof Of Equation (18))mentioning
confidence: 99%
See 1 more Smart Citation
“…After the application of integration by parts and simple mathematical steps, we get Equation (C.10) After substituting the expression from (D.6) and (D.9) along with Equation ( 19) and applying similar steps as in Appendix A, we get Equation (21).…”
Section: Appendix C (Proof Of Equation (18))mentioning
confidence: 99%
“…Also, the authors in [20] AF relay for FD NOMA system without cooperation. But, the authors in [21] are based on FD-NOMA with cooperation but in the absence of any Eve's dropper. Also, the system in [22] is based on the cooperative NOMA system but in the absence of any Eve's dropper and without FD.…”
Section: Introductionmentioning
confidence: 99%
“…Several studies have also looked at the system performance when RS, or H-K signaling in a more general sense, operates in the presence of eavesdroppers. Indeed, since the signals are transmitted on free medium, eavesdroppers, whether external or internal to the communication system, have the opportunity to overhear the messages of the system's users, [17], [18]. Generally speaking, to ensure secure communication, alongside cryptography protocols, solutions based on physicallayer security (PLS) can leverage the randomness of the fading channels to guarantee message secrecy [19], [20].…”
Section: A Contextmentioning
confidence: 99%