Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 684 Accesses

Abstract

In this chapter, the security of NOMA will be demonstrating by introducing average performance of physical layer security (PLS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ding, Z., Liu, Y., Choi, J., Sun, Q., Elkashlan, M., Chih-Lin., I., et al. (2017). Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Communications Magazine, 55, 185–191.

    Article  Google Scholar 

  • Ding, Z., Yang, Z., Fan, P., & Poor, H. V. (2014). On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Processing Letters, 21, 1501–1505.

    Article  Google Scholar 

  • Feng, Y., Yan, S., Liu, C., Yang, Z., & Yang, N. (2019). Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access. IEEE Transactions on Information Forensics and Security, 14, 1670–1683.

    Article  Google Scholar 

  • Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7, 2180–2189.

    Article  Google Scholar 

  • Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series and products (6th ed.). New York: Academic Press.

    MATH  Google Scholar 

  • He, B., Liu, A., Yang, N., & Lau, V. K. (2017). On the design of secure non-orthogonal multiple access systems. IEEE Journal on Selected Areas in Communications, 35, 2196–2206.

    Article  Google Scholar 

  • Liu, Y., Wang, L., Zaidi, S., Elkashlan, M., & Duong, T. (2016). Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model. IEEE Transactions on Communications, 64, 329–342.

    Article  Google Scholar 

  • Mukherjee, A., Swindlehurst, A. (2011). Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Transactions on Signal Processing, 59, 351–361.

    Article  MathSciNet  Google Scholar 

  • Qin, Z., Gao, Y., & Plumbley, M. D. (2018). Malicious user detection based on low-rank matrix completion in wideband spectrum sensing. IEEE Transactions on Signal Processing, 66, 5–17.

    Article  MathSciNet  Google Scholar 

  • Saito, Y., Kishiyama, Y., Benjebbour, A., Nakamura, T., Li, A., & Higuchi, K. (2013). Non-orthogonal multiple access (NOMA) for cellular future radio access. In IEEE Proceeding of Vehicular Technology Conference (VTC), Dresden, Germany (pp. 1–5).

    Google Scholar 

  • Tekin, E., & Yener, A. (2008). The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory, 54, 2735–2751.

    Article  MathSciNet  Google Scholar 

  • Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54, 1355–1387.

    Article  MathSciNet  Google Scholar 

  • Zhang, X., Zhou, X., & McKay, M. R. (2013). Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks. IEEE Transactions on Information Forensics and Security, 8, 1802–1814.

    Article  Google Scholar 

  • Zhou, X., & McKay, M. R. (2010). Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation. IEEE Transactions on Vehicular Technology, 59, 3831–3842.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Liu, Y., Qin, Z., Ding, Z. (2020). Security in NOMA. In: Non-Orthogonal Multiple Access for Massive Connectivity. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-30975-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30975-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30974-9

  • Online ISBN: 978-3-030-30975-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics