[1] |
DAI Linglong, WANG Bichai, YUAN Yifei, et al. Non-orthogonal Multiple Access for 5G: Solutions, challenges, opportunities, and future research trends[J]. IEEE Communications Magazine, 2015, 53(9): 74–81. doi: 10.1109/MCOM.2015.7263349
|
[2] |
DING Zhiguo, LIU Yuanwei, CHOI J, et al. Application of non-orthogonal multiple access in LTE and 5G networks[J]. IEEE Communications Magazine, 2017, 55(2): 185–191. doi: 10.1109/MCOM.2017.1500657CM
|
[3] |
LV Lu, YE Qiang, DING Zhiguo, et al. Multi-antenna two-way relay based cooperative NOMA[J]. IEEE Transactions on Wireless Communications, 2020, 19(10): 6486–6503. doi: 10.1109/TWC.2020.3003615
|
[4] |
DING Zhiguo, ADACHI F, and POOR H V. The application of MIMO to non-orthogonal multiple access[J]. IEEE Transactions on Wireless Communications, 2016, 15(1): 537–552. doi: 10.1109/TWC.2015.2475746
|
[5] |
XU Yongjun, HU R Q, and LI Guoquan. Robust energy-efficient maximization for cognitive NOMA networks under channel uncertainties[J]. IEEE Internet of Things Journal, 2020, 7(9): 8318–8330. doi: 10.1109/JIOT.2020.2989464
|
[6] |
徐勇军, 刘子腱, 李国权, 等. 基于NOMA的无线携能D2D通信鲁棒能效优化算法[J]. 电子与信息学报, 2021, 43(5): 1289–1297. doi: 10.11999/JEIT200175XU Yongjun, LIU Zijian, LI Guoquan, et al. Robust energy efficiency optimization algorithm for NOMA-based D2D communication with simultaneous wireless information and power transfer[J]. Journal of Electronics &Information Technology, 2021, 43(5): 1289–1297. doi: 10.11999/JEIT200175
|
[7] |
KHAN R, KUMAR P, JAYAKODY D N K, et al. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions[J]. IEEE Communications Surveys & Tutorials, 2020, 22(1): 196–248. doi: 10.1109/COMST.2019.2933899
|
[8] |
YANG Nan, WANG Lifeng, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015, 53(4): 20–27. doi: 10.1109/MCOM.2015.7081071
|
[9] |
WYNER A D. The wire-tap channel[J]. The Bell System Technical Journal, 1975, 54(8): 1355–1387. doi: 10.1002/j.1538-7305.1975.tb02040.x
|
[10] |
LIU Yuanwei, QIN Zhijin, ELKASHLAN M, et al. Enhancing the physical layer security of Non-orthogonal Multiple Access in large-scale networks[J]. IEEE Transactions on Wireless Communications, 2017, 16(3): 1656–1672. doi: 10.1109/TWC.2017.2650987
|
[11] |
LI Xingwang, LI Jingjing, LIU Yuanwei, et al. Residual transceiver hardware impairments on cooperative NOMA networks[J]. IEEE Transactions on Wireless Communications, 2020, 19(1): 680–695. doi: 10.1109/TWC.2019.2947670
|
[12] |
LI Xingwang, ZHENG Yike, ALSHEHRI M D, et al. Cognitive AmBC-NOMA IoV-MTS networks with IQI: Reliability and security analysis[J]. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(2): 2596–2607. doi: 10.1109/TITS.2021.3113995
|
[13] |
TAO Xiaofeng, XU Xiaodong, and CUI Qimei. An overview of cooperative communications[J]. IEEE Communications Magazine, 2012, 50(6): 65–71. doi: 10.1109/MCOM.2012.6211487
|
[14] |
CHEN Jianchao, YANG Liang, and ALOUINI M S. Physical layer security for cooperative NOMA systems[J]. IEEE Transactions on Vehicular Technology, 2018, 67(5): 4645–4649. doi: 10.1109/TVT.2017.2789223
|
[15] |
ZAGHDOUD N, MNAOUER A B, BOUJEMAA H, et al. Secrecy performance analysis of cooperative NOMA system with multiple DF relays[C]. 2020 International Wireless Communications and Mobile Computing, Limassol, Cyprus, 2020: 2160–2163.
|
[16] |
CHEN Xiaoming, NG D W K, GERSTACKER W H, et al. A survey on Multiple-Antenna techniques for physical layer security[J]. IEEE Communications Surveys & Tutorials, 2017, 19(2): 1027–1053. doi: 10.1109/COMST.2016.2633387
|
[17] |
KIM S W. Modify-and-Forward for securing cooperative relay communications[C]. 23th International Zurich Seminar on Communications, Zurich, Switzerland, 2014: 136–139.
|
[18] |
VIEN Q T, LE T A, NGUYEN H X, et al. A secure network coding based Modify-and-Forward scheme for cooperative wireless relay networks[C]. 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 2016: 1–5.
|
[19] |
VIEN Q T, LE T A, and DUONG T Q. Opportunistic secure transmission for wireless relay networks with Modify-and-Forward protocol[C]. 2017 IEEE International Conference on Communications, Paris, France, 2017: 1–6.
|
[20] |
CHU S I. Secrecy analysis of Modify-and-Forward relaying with relay selection[J]. IEEE Transactions on Vehicular Technology, 2019, 68(2): 1796–1809. doi: 10.1109/TVT.2018.2885807
|
[21] |
PENG Hongxing, QI Hongyan, LI Xingwang, et al. Hardware impaired Modify-and-Forward relaying with relay selection: Reliability and security[J]. Physical Communication, 2021, 46: 101315. doi: 10.1016/j.phycom.2021.101315
|
[22] |
QIN Zhijin, LIU Yuanwei, DING Zhiguo, et al. Physical layer security for 5G Non-orthogonal Multiple Access in large-scale networks[C]. 2016 IEEE International Conference on Communications, Kuala Lumpur, Malaysia, 2016: 1–6.
|
[23] |
SHARMA P K and KIM D I. UAV-enabled downlink wireless system with non-orthogonal multiple access[C]. 2017 IEEE Globecom Workshops, Singapore, 2017: 1–6.
|