Security in NOMA

  • Yuanwei Liu
  • Zhijin Qin
  • Zhiguo Ding
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


In this chapter, the security of NOMA will be demonstrating by introducing average performance of physical layer security (PLS).


  1. Ding, Z., Liu, Y., Choi, J., Sun, Q., Elkashlan, M., Chih-Lin., I., et al. (2017). Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Communications Magazine, 55, 185–191.CrossRefGoogle Scholar
  2. Ding, Z., Yang, Z., Fan, P., & Poor, H. V. (2014). On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Processing Letters, 21, 1501–1505.CrossRefGoogle Scholar
  3. Feng, Y., Yan, S., Liu, C., Yang, Z., & Yang, N. (2019). Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access. IEEE Transactions on Information Forensics and Security, 14, 1670–1683.CrossRefGoogle Scholar
  4. Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7, 2180–2189.CrossRefGoogle Scholar
  5. Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series and products (6th ed.). New York: Academic Press.zbMATHGoogle Scholar
  6. He, B., Liu, A., Yang, N., & Lau, V. K. (2017). On the design of secure non-orthogonal multiple access systems. IEEE Journal on Selected Areas in Communications, 35, 2196–2206.CrossRefGoogle Scholar
  7. Liu, Y., Wang, L., Zaidi, S., Elkashlan, M., & Duong, T. (2016). Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model. IEEE Transactions on Communications, 64, 329–342.CrossRefGoogle Scholar
  8. Mukherjee, A., Swindlehurst, A. (2011). Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Transactions on Signal Processing, 59, 351–361.MathSciNetCrossRefGoogle Scholar
  9. Qin, Z., Gao, Y., & Plumbley, M. D. (2018). Malicious user detection based on low-rank matrix completion in wideband spectrum sensing. IEEE Transactions on Signal Processing, 66, 5–17.MathSciNetCrossRefGoogle Scholar
  10. Saito, Y., Kishiyama, Y., Benjebbour, A., Nakamura, T., Li, A., & Higuchi, K. (2013). Non-orthogonal multiple access (NOMA) for cellular future radio access. In IEEE Proceeding of Vehicular Technology Conference (VTC), Dresden, Germany (pp. 1–5).Google Scholar
  11. Tekin, E., & Yener, A. (2008). The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory, 54, 2735–2751.MathSciNetCrossRefGoogle Scholar
  12. Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54, 1355–1387.MathSciNetCrossRefGoogle Scholar
  13. Zhang, X., Zhou, X., & McKay, M. R. (2013). Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks. IEEE Transactions on Information Forensics and Security, 8, 1802–1814.CrossRefGoogle Scholar
  14. Zhou, X., & McKay, M. R. (2010). Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation. IEEE Transactions on Vehicular Technology, 59, 3831–3842.CrossRefGoogle Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Yuanwei Liu
    • 1
  • Zhijin Qin
    • 1
  • Zhiguo Ding
    • 2
  1. 1.LondonUK
  2. 2.ManchesterUK

Personalised recommendations