References
- L. Dai et al., Nonorthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends, IEEE Commun. Mag. 53 (2015), 74-81. https://doi.org/10.1109/MCOM.2015.7263349
- Z. Wei et al., A survey of downlink non-orthogonal multiple access for 5G wireless communication networks, ZTE Commun. 14 (2016), 17-26. https://doi.org/10.3969/j.issn.1009-6868.2008.01.004
- Z. Ding et al., On the performance of nonorthogonal multiple access in 5G systems with randomly deployed users, IEEE Signal Process. Lett. 21 (2014), 1501-1505. https://doi.org/10.1109/LSP.2014.2343971
- Y. Xiao et al., Forwarding strategy selection in dual-hop NOMA relaying systems, IEEE Commun. Lett. 22 (2018), 1644-1647. https://doi.org/10.1109/lcomm.2018.2803809
- Z. Ding, M. Peng, and H. V. Poor, Cooperative non-orthogonal multiple access in 5G systems, IEEE Commun. Lett. 19 (2015), 1462-1465. https://doi.org/10.1109/LCOMM.2015.2441064
- C. Zhong and Z. Zhang, Non-orthogonal multiple access with cooperative full-duplex relaying, IEEE Commun. Lett. 20 (2016), 2478-2481. https://doi.org/10.1109/LCOMM.2016.2611500
- Z. Ding, H. Dai, and H. V. Poor, Relay selection for cooperative NOMA, IEEE Wirel. Commun. Lett. 5 (2016), 416-419. https://doi.org/10.1109/LWC.2016.2574709
- L. Lai and H. El Gamal, The relay-eavesdropper channel: Cooperation for secrecy, IEEE Trans. Inf. Theory. 54 (2008), 4005-4019. https://doi.org/10.1109/TIT.2008.928272
- Y. Feng, et al., Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access, IEEE Trans. Inf. Forensics Security. 14 (2019), 1670-1683. https://doi.org/10.1109/tifs.2018.2883273
- I. Krikidis, J. Thompson, and S. Mclaughlin, Relay selection for secure cooperative networks with jamming, IEEE Trans. Wirel. Commun. 8 (2009), 5003-5011. https://doi.org/10.1109/TWC.2009.090323
- D. H. Ibrahim and E. S. Hassan, E1-Dolil, a new relay and jammer selection schemes for secure one-way cooperative networks, Wirel. Pers. Commun. 75 (2014), 665-685. https://doi.org/10.1007/s11277-013-1384-5
- L. Tang et al., Secure wireless communications via cooperative relaying and jamming, in Proc. GLOBECOM Workshops (GC Wkshps) (Houston, TX, USA), Dec. 2012, pp. 849-853.
- L. Sun et al., Security-aware relaying scheme for cooperative networks with untrusted relay nodes, IEEE Commun. Lett. 19 (2015), 463-466. https://doi.org/10.1109/LCOMM.2014.2385095
- K. K. Gurrala and S. Das, Performance study of hybrid decode-amplify-forward (HDAF) relaying scheme for physical layer security in wireless cooperative network, Int. J. Commun. Syst. 30 (2017), no. 8, e3182. https://doi.org/10.1002/dac.3182
- Y. Liu et al., Enhancing the physical layer security of nonorthogonal multiple access in large-scale networks, IEEE Trans. Wirel. Commun. 16 (2017), 1656-1672. https://doi.org/10.1109/TWC.2017.2650987
- F. Jameel et al., A comprehensive survey on cooperative relaying and jamming strategies for physical layer security, IEEE Commun. Surveys. 21 (2019), 2734-2771. https://doi.org/10.1109/COMST.2018.2865607
- M. K. Shukla, H. H. Nguyen, and O. J. Pandey, Secrecy performance analysis of two-way relay non-orthogonal multiple access systems, IEEE Access 8 (2020), 39502-39512. https://doi.org/10.1109/access.2020.2975924
- H. Lei et al., Secrecy outage analysis for cooperative NOMA systems with relay selection schemes, IEEE Trans. Commun. 67 (2018), 6282-6298. https://doi.org/10.1109/tcomm.2019.2916070
- J. Chen, L. Yang, and M.-S. Alouini, Physical layer security for cooperative NOMA systems, IEEE Trans. Veh. Technol. 67 (2018), 4645-4649. https://doi.org/10.1109/tvt.2017.2789223
- C. Yu et al., Secrecy outage performance analysis for cooperative NOMA over Nakagami-m Channel, IEEE Access 7 (2019), 79866-79876. https://doi.org/10.1109/access.2019.2923450
- Z. Wang and Z. Peng, Secrecy performance analysis of relay selection in cooperative NOMA systems, IEEE Access 7 (2019), 86274-86287. https://doi.org/10.1109/access.2019.2925380
- W. U. Khan, Maximizing physical layer security in relay-assisted multicarrier non orthogonal multiple access transmission, Internet Technol. Lett. 2 (2019), e76. https://doi.org/10.1002/itl2.76
- L. Lv et al., Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach, IEEE Trans. Inf. Forensics Secur. 14 (2019), 3191-3205. https://doi.org/10.1109/tifs.2019.2912337
- F. Zhou et al., Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT, IEEE J. Sel. Areas Commun. 36 (2018), 918-931. https://doi.org/10.1109/jsac.2018.2824622
- S. Leung-Yan-Cheong and M. Hellman, The gaussian wire-tap channel, IEEE Trans. Inf. Theory. 24 (1978), 451-456. https://doi.org/10.1109/TIT.1978.1055917
- K. K. Gurrala and S. Das, Maximized channel capacity based power allocation technique for multi relay hybrid decode-amplifyforward cooperative network, Wirel. Personal Commun. 87 (2015), 663-678. https://doi.org/10.1007/s11277-015-2622-9
- A. K. Qin and P. N. Suganthan, Self-adaptive differential evolution algorithm for numerical optimization, in Proc. IEEE Congr. Evolut. Comput. (Edinburgh, UK), Sept. 2005, pp. 1785-1791.