Abstract
In this chapter, the security of NOMA will be demonstrating by introducing average performance of physical layer security (PLS).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ding, Z., Liu, Y., Choi, J., Sun, Q., Elkashlan, M., Chih-Lin., I., et al. (2017). Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Communications Magazine, 55, 185–191.
Ding, Z., Yang, Z., Fan, P., & Poor, H. V. (2014). On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Processing Letters, 21, 1501–1505.
Feng, Y., Yan, S., Liu, C., Yang, Z., & Yang, N. (2019). Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access. IEEE Transactions on Information Forensics and Security, 14, 1670–1683.
Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7, 2180–2189.
Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series and products (6th ed.). New York: Academic Press.
He, B., Liu, A., Yang, N., & Lau, V. K. (2017). On the design of secure non-orthogonal multiple access systems. IEEE Journal on Selected Areas in Communications, 35, 2196–2206.
Liu, Y., Wang, L., Zaidi, S., Elkashlan, M., & Duong, T. (2016). Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model. IEEE Transactions on Communications, 64, 329–342.
Mukherjee, A., Swindlehurst, A. (2011). Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Transactions on Signal Processing, 59, 351–361.
Qin, Z., Gao, Y., & Plumbley, M. D. (2018). Malicious user detection based on low-rank matrix completion in wideband spectrum sensing. IEEE Transactions on Signal Processing, 66, 5–17.
Saito, Y., Kishiyama, Y., Benjebbour, A., Nakamura, T., Li, A., & Higuchi, K. (2013). Non-orthogonal multiple access (NOMA) for cellular future radio access. In IEEE Proceeding of Vehicular Technology Conference (VTC), Dresden, Germany (pp. 1–5).
Tekin, E., & Yener, A. (2008). The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory, 54, 2735–2751.
Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54, 1355–1387.
Zhang, X., Zhou, X., & McKay, M. R. (2013). Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks. IEEE Transactions on Information Forensics and Security, 8, 1802–1814.
Zhou, X., & McKay, M. R. (2010). Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation. IEEE Transactions on Vehicular Technology, 59, 3831–3842.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Liu, Y., Qin, Z., Ding, Z. (2020). Security in NOMA. In: Non-Orthogonal Multiple Access for Massive Connectivity. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-30975-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-30975-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30974-9
Online ISBN: 978-3-030-30975-6
eBook Packages: Computer ScienceComputer Science (R0)