All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Secure transmission in backhaul NOMA systems: A physical layer security design with untrusted user and eavesdropper

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F24%3A10255603" target="_blank" >RIV/61989100:27240/24:10255603 - isvavai.cz</a>

  • Alternative codes found

    RIV/61989100:27740/24:10255603

  • Result on the web

    <a href="https://www.sciencedirect.com/science/article/pii/S2352864822002735" target="_blank" >https://www.sciencedirect.com/science/article/pii/S2352864822002735</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1016/j.dcan.2022.12.005" target="_blank" >10.1016/j.dcan.2022.12.005</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Secure transmission in backhaul NOMA systems: A physical layer security design with untrusted user and eavesdropper

  • Original language description

    In order to improve the Physical Layer Security (PLS) perspective, this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access (NOMA) system in two practical situations. In the proposed schemes, the untrusted user intercepts information transmitted to the far user, or the external eavesdropper overhears confidential information sent to the far user in the context of NOMA technique. Unlike the conventional NOMA systems, this paper emphasizes the actual situations of the existence of actual illegal users and legitimate users, especially the reasonable use of relay selection architecture to improve the confidentiality performance. To evaluate the security properties of the proposed scheme, a comprehensive analysis of the Security Outage Probability (SOP) performance is first performed, and then the corresponding SOP asymptotic expressions are derived for real scenarios related to eavesdroppers and untrusted users. Numerical results are performed to verify the analysis in terms of the secure performance metric.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2024

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Digital Communications and Networks

  • ISSN

    2468-5925

  • e-ISSN

    2352-8648

  • Volume of the periodical

    10

  • Issue of the periodical within the volume

    4

  • Country of publishing house

    CN - CHINA

  • Number of pages

    13

  • Pages from-to

    1001-1013

  • UT code for WoS article

    001318239900001

  • EID of the result in the Scopus database