Javascript must be enabled to continue!
Secure NOMA communication eavesdropped by energy harvesting-capable receiver with jamming
View through CrossRef
Non-orthogonal multiple access (NOMA) enables simultaneous transmissions of a huge quantity of wireless users on the same system resources (time, frequency, space), significantly improving spectral efficiency. Also, harvesting radio frequency energy for wireless communication not only saves energy resource but also makes communication greener. However, an energy harvesting-capable eavesdropper can be one of NOMA receivers, threatening security of NOMA communication. This paper secures NOMA communication eavesdropped by the energy harvesting-capable receiver by utilizing a jammer. The secrecy performance of the proposed system model is analyzed thoroughly and corroborated by computer simulations. Moreover, its secrecy performance is demonstrated to be superior to three different reference models. Furthermore, we secure the proposed system model at best by properly configuring critical system parameters.
Publishing House for Science and Technology, Vietnam Academy of Science and Technology (Publications)
Title: Secure NOMA communication eavesdropped by energy harvesting-capable receiver with jamming
Description:
Non-orthogonal multiple access (NOMA) enables simultaneous transmissions of a huge quantity of wireless users on the same system resources (time, frequency, space), significantly improving spectral efficiency.
Also, harvesting radio frequency energy for wireless communication not only saves energy resource but also makes communication greener.
However, an energy harvesting-capable eavesdropper can be one of NOMA receivers, threatening security of NOMA communication.
This paper secures NOMA communication eavesdropped by the energy harvesting-capable receiver by utilizing a jammer.
The secrecy performance of the proposed system model is analyzed thoroughly and corroborated by computer simulations.
Moreover, its secrecy performance is demonstrated to be superior to three different reference models.
Furthermore, we secure the proposed system model at best by properly configuring critical system parameters.
.
Related Results
NOMA Transmission Systems: Overview of SIC Design and New Findings
NOMA Transmission Systems: Overview of SIC Design and New Findings
Non-Orthogonal Multiple Access (NOMA) has been recently proposed as a good alternative to meet 5G and beyond requirements in terms of high spectral efficiency, massive connectivity...
Is noma a neglected/overlooked tropical disease?
Is noma a neglected/overlooked tropical disease?
Abstract
Noma is a debilitating orofacial necrotizing bacterial disease that disproportionately affects impoverished malnourished persons, particularly young childre...
Cooperative Jamming Resource Allocation with Joint Multi-Domain Information Using Evolutionary Reinforcement Learning
Cooperative Jamming Resource Allocation with Joint Multi-Domain Information Using Evolutionary Reinforcement Learning
Addressing the formidable challenges posed by multiple jammers jamming multiple radars, which arise from spatial discretization, many degrees of freedom, numerous model input param...
Recurrence of Noma: Fact or Fiction? A Clinical Review of 34 Patients From Noma Children Hospital, Sokoto, Nigeria
Recurrence of Noma: Fact or Fiction? A Clinical Review of 34 Patients From Noma Children Hospital, Sokoto, Nigeria
Objective:
Noma is an infectious and potential lethal disease that destroys the orofacial structures in which the etiopathogenesis is not fully understood. Controversy ...
Survey on cognitive anti‐jamming communications
Survey on cognitive anti‐jamming communications
In this study, the authors review various jamming and anti‐jamming strategies in the context of cognitive radios (CRs). The study explores different jamming models and classifies t...
A Fast Anti-Jamming Algorithm Based on Imitation Learning for WSN
A Fast Anti-Jamming Algorithm Based on Imitation Learning for WSN
Wireless sensor networks (WSNs), integral components underpinning the infrastructure of the internet of things (IoT), confront escalating threats originating from attempts at malic...
Applications of Sustainable Hybrid Energy Harvesting: A Review
Applications of Sustainable Hybrid Energy Harvesting: A Review
This paper provides a short review of sustainable hybrid energy harvesting and its applications. The potential usage of self-powered wireless sensor (WSN) systems has recently draw...
Physical layer analysis of optical MIMO NOMA waveform for 64-QAM in visible light communications
Physical layer analysis of optical MIMO NOMA waveform for 64-QAM in visible light communications
Abstract
This paper discusses three optical non-orthogonal multiple access (NOMA) techniques – multiple-input multiple-output (MIMO), rate-splitting (RS), and auxili...

