{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T13:00:53Z","timestamp":1771333253985,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:00:00Z","timestamp":1656374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:00:00Z","timestamp":1656374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11276-022-03024-7","type":"journal-article","created":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T10:16:52Z","timestamp":1656411412000},"page":"3157-3172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers"],"prefix":"10.1007","volume":"28","author":[{"given":"Nguyen Le","family":"Cuong","sequence":"first","affiliation":[]},{"given":"Tran Manh","family":"Hoang","sequence":"additional","affiliation":[]},{"given":"Nguyen Thu","family":"Phuong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6117-2100","authenticated-orcid":false,"given":"Pham Thanh","family":"Hiep","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,28]]},"reference":[{"issue":"2","key":"3024_CR1","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/COMST.2016.2621116","volume":"19","author":"SR Islam","year":"2016","unstructured":"Islam, S. R., Avazov, N., Dobre, O. A., & Kwak, K.-S. (2016). Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Communications Surveys and Tutorials, 19(2), 721\u2013742.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"12","key":"3024_CR2","doi-asserted-by":"publisher","first-page":"2667","DOI":"10.1109\/JSAC.2017.2726718","volume":"35","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Qin, Z., Elkashlan, M., Nallanathan, A., & McCann, J. A. (2017). Non-orthogonal multiple access in large-scale heterogeneous networks. IEEE Journal on Selected Areas in Communications, 35(12), 2667\u20132680.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"3024_CR3","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1109\/JSAC.2016.2549378","volume":"34","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Ding, Z., Elkashlan, M., & Poor, H. V. (2016). Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer. IEEE Journal on Selected Areas in Communications, 34(4), 938\u2013953.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"3024_CR4","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11276-018-1746-8","volume":"25","author":"TM Hoang","year":"2018","unstructured":"Hoang, T. M., Tan, N. T., Hoang, N. H., & Hiep, P. T. (2018). Performance analysis of decode-and-forward partial relay selection in NOMA systems with RF energy harvesting. Wireless Networks, 25, 4585.","journal-title":"Wireless Networks"},{"issue":"10","key":"3024_CR5","doi-asserted-by":"publisher","first-page":"2413","DOI":"10.1109\/JSAC.2017.2725879","volume":"35","author":"M Zeng","year":"2017","unstructured":"Zeng, M., Yadav, A., Dobre, O. A., Tsiropoulos, G. I., & Poor, H. V. (2017). Capacity comparison between MIMO-NOMA and MIMO-OMA with multiple users in a cluster. IEEE Journal on Selected Areas in Communications, 35(10), 2413\u20132424.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"9","key":"3024_CR6","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1109\/JSAC.2014.2330151","volume":"32","author":"LJ Rodriguez","year":"2014","unstructured":"Rodriguez, L. J., Tran, N. H., & Le-Ngoc, T. (2014). Performance of full-duplex AF relaying in the presence of residual self-interference. IEEE Journal on Selected Areas in Communications, 32(9), 1752\u20131764.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"12","key":"3024_CR7","doi-asserted-by":"publisher","first-page":"5250","DOI":"10.1109\/TCOMM.2015.2495353","volume":"63","author":"M Mohammadi","year":"2015","unstructured":"Mohammadi, M., Suraweera, H. A., Cao, Y., Krikidis, I., & Tellambura, C. (2015). Full-duplex radio for uplink\/downlink wireless access with spatially random nodes. IEEE Transactions on Communications, 63(12), 5250\u20135266.","journal-title":"IEEE Transactions on Communications"},{"key":"3024_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.aeue.2018.08.020","volume":"95","author":"TM Hoang","year":"2018","unstructured":"Hoang, T. M., Son, V. V., Dinh, N. C., & Hiep, P. T. (2018). Optimizing duration of energy harvesting for downlink NOMA full-duplex over Nakagami-m fading channel. AEU - International Journal of Electronics and Communications, 95, 199\u2013206.","journal-title":"AEU - International Journal of Electronics and Communications"},{"issue":"9","key":"3024_CR9","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1109\/JSAC.2014.2330191","volume":"32","author":"L Laughlin","year":"2014","unstructured":"Laughlin, L., Beach, M. A., Morris, K. A., & Haine, J. L. (2014). Optimum single antenna full duplex using hybrid junctions. IEEE Journal on Selected Areas in Communications, 32(9), 1653\u20131661.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"3024_CR10","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/MCOM.2017.1600361CM","volume":"55","author":"R Li","year":"2017","unstructured":"Li, R., Chen, Y., Li, G. Y., & Liu, G. (2017). Full-duplex cellular networks. IEEE Communications Magazine, 55(4), 184\u2013191.","journal-title":"IEEE Communications Magazine"},{"issue":"8","key":"3024_CR11","doi-asserted-by":"publisher","first-page":"6981","DOI":"10.1109\/TVT.2018.2824310","volume":"67","author":"H Lei","year":"2018","unstructured":"Lei, H., Zhang, J., Park, K.-H., Xu, P., Zhang, Z., Pan, G., & Alouini, M.-S. (2018). Secrecy outage of max-min TAS scheme in MIMO-NOMA systems. IEEE Transactions on Vehicular Technology, 67(8), 6981\u20136990.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"2","key":"3024_CR12","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/JSAC.2018.2872397","volume":"37","author":"X Zhang","year":"2018","unstructured":"Zhang, X., & Wang, F. (2018). Resource allocation for wireless power transmission over full-duplex OFDMA\/NOMA mobile wireless networks. IEEE Journal on Selected Areas in Communications, 37(2), 327\u2013344.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"12","key":"3024_CR13","doi-asserted-by":"publisher","first-page":"5882","DOI":"10.1109\/TWC.2019.2940220","volume":"18","author":"Y-B Kim","year":"2019","unstructured":"Kim, Y.-B., Yamazaki, K., & Jung, B. C. (2019). Virtual full-duplex cooperative NOMA: Relay selection and interference cancellation. IEEE Transactions on Wireless Communications, 18(12), 5882\u20135893.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"3024_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/LWC.2019.2939309","volume":"9","author":"X Li","year":"2019","unstructured":"Li, X., Liu, M., Deng, C., Mathiopoulos, P. T., Ding, Z., & Liu, Y. (2019). Full-duplex cooperative NOMA relaying systems with I\/Q imbalance and imperfect SIC. IEEE Wireless Communications Letters, 9, 17.","journal-title":"IEEE Wireless Communications Letters"},{"issue":"1","key":"3024_CR15","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/TWC.2017.2767601","volume":"17","author":"G Liu","year":"2017","unstructured":"Liu, G., Chen, X., Ding, Z., Ma, Z., & Yu, F. R. (2017). Hybrid half-duplex\/full-duplex cooperative non-orthogonal multiple access with transmit power adaptation. IEEE Transactions on Wireless Communications, 17(1), 506\u2013519.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"4","key":"3024_CR16","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656\u2013715.","journal-title":"The Bell System Technical Journal"},{"issue":"8","key":"3024_CR17","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A. D. (1975). The wire-tap channel. The Bell System Technical Journal, 54(8), 1355\u20131387.","journal-title":"The Bell System Technical Journal"},{"issue":"3","key":"3024_CR18","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339\u2013348.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"3024_CR19","doi-asserted-by":"publisher","first-page":"7168","DOI":"10.1109\/TCOMM.2019.2926719","volume":"67","author":"H Zhao","year":"2019","unstructured":"Zhao, H., Liu, Z., Yang, L., & Alouini, M.-S. (2019). Secrecy analysis in df relay over generalized-$$ K $$ fading channels. IEEE Transactions on Wireless Communications, 67(10), 7168\u20137182.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"3024_CR20","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1109\/LWC.2019.2914108","volume":"8","author":"K Cao","year":"2019","unstructured":"Cao, K., Wang, B., Ding, H., & Tian, J. (2019). Adaptive cooperative jamming for secure communication in energy harvesting relay networks. IEEE Transactions on Wireless Communications, 8(5), 1316\u20131319.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"3024_CR21","first-page":"37","volume":"7","author":"Q Guo","year":"2019","unstructured":"Guo, Q., & Feng, W. (2019). Joint relay and eavesdropper selection strategy against multiple eavesdroppers over Nakagami-m fading channels in cooperative decode-and-forward relay networks. IEEE Access, 7, 37\u2013980.","journal-title":"IEEE Access"},{"issue":"2","key":"3024_CR22","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/JSAC.2012.120215","volume":"30","author":"Z Ding","year":"2012","unstructured":"Ding, Z., Leung, K. K., Goeckel, D. L., & Towsley, D. (2012). On the application of cooperative transmission to secrecy communications. IEEE Journal on Selected Areas in Communications, 30(2), 359\u2013368.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"3024_CR23","doi-asserted-by":"publisher","first-page":"4503","DOI":"10.1109\/TVT.2020.2973726","volume":"69","author":"X Pei","year":"2020","unstructured":"Pei, X., Yu, H., Wen, M., Li, Q., & Ding, Z. (2020). Secure outage analysis for cooperative NOMA systems with antenna selection. IEEE Transactions on Vehicular Technology, 69, 4503.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3024_CR24","doi-asserted-by":"publisher","first-page":"15072","DOI":"10.1109\/ACCESS.2020.2966822","volume":"8","author":"K Jiang","year":"2020","unstructured":"Jiang, K., Zhou, W., & Sun, L. (2020). Jamming-aided secrecy performance in secure uplink NOMA system. IEEE Access, 8, 15072\u201315084.","journal-title":"IEEE Access"},{"key":"3024_CR25","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/LWC.2020.2986443","volume":"9","author":"D Wang","year":"2020","unstructured":"Wang, D., Xu, W., Liang, W., Ding, Z., & Li, L. (2020). Security provisioning for non-orthogonal multiple access networks with limited feedback. IEEE Wireless Communications Letters, 9, 1226.","journal-title":"IEEE Wireless Communications Letters"},{"issue":"9","key":"3024_CR26","doi-asserted-by":"publisher","first-page":"6282","DOI":"10.1109\/TCOMM.2019.2916070","volume":"67","author":"H Lei","year":"2019","unstructured":"Lei, H., Yang, Z., Park, K.-H., Ansari, I. S., Guo, Y., Pan, G., & Alouini, M.-S. (2019). Secrecy outage analysis for cooperative NOMA systems with relay selection schemes. IEEE Transactions on Communications, 67(9), 6282\u20136298.","journal-title":"IEEE Transactions on Communications"},{"issue":"12","key":"3024_CR27","doi-asserted-by":"publisher","first-page":"7824","DOI":"10.1109\/TCOMM.2020.3021139","volume":"68","author":"H Lei","year":"2020","unstructured":"Lei, H., Gao, R., Park, K.-H., Ansari, I. S., Kim, K. J., & Alouini, M.-S. (2020). On secure downlink NOMA systems with outage constraint. IEEE Transactions on Communications, 68(12), 7824\u20137836.","journal-title":"IEEE Transactions on Communications"},{"key":"3024_CR28","doi-asserted-by":"publisher","first-page":"2930","DOI":"10.1109\/TIFS.2020.2980202","volume":"15","author":"K Cao","year":"2020","unstructured":"Cao, K., Wang, B., Ding, H., Li, T., Tian, J., & Gong, F. (2020). Secure transmission designs for noma systems against internal and external eavesdropping. IEEE Transactions on Information Forensics and Security, 15, 2930\u20132943.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"3024_CR29","doi-asserted-by":"publisher","first-page":"1586","DOI":"10.1109\/TCOMM.2018.2876867","volume":"67","author":"L Bariah","year":"2018","unstructured":"Bariah, L., Muhaidat, S., & Al-Dweik, A. (2018). Error probability analysis of non-orthogonal multiple access over nakagami-$$ m $$ fading channels. IEEE Transactions on Communications, 67(2), 1586\u20131599.","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"3024_CR30","first-page":"372","volume":"17","author":"HV Cheng","year":"2018","unstructured":"Cheng, H. V., Bj\u00f6rnson, E., & Larsson, E. G. (2018). Performance analysis of NOMA in training-based multiuser MIMO systems. IEEE Transactions on Communications, 17(1), 372\u2013385.","journal-title":"IEEE Transactions on Communications"},{"issue":"10","key":"3024_CR31","doi-asserted-by":"publisher","first-page":"6441","DOI":"10.1109\/TIT.2013.2269476","volume":"59","author":"A Adhikary","year":"2013","unstructured":"Adhikary, A., Nam, J., Ahn, J.-Y., & Caire, G. (2013). Joint spatial division and multiplexing: The large-scale array regime. IEEE Transactions on Information Theory, 59(10), 6441\u20136463.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"3024_CR32","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1109\/TCOMM.2015.2442248","volume":"63","author":"Y Huang","year":"2015","unstructured":"Huang, Y., Al-Qahtani, F. S., Duong, T. Q., & Wang, J. (2015). Secure transmission in MIMO wiretap channels using general-order transmit antenna selection with outdated CSI. IEEE Transactions on Communications, 63(8), 2959\u20132971.","journal-title":"IEEE Transactions on Communications"},{"issue":"5","key":"3024_CR33","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/MWC.2019.1800598","volume":"26","author":"M Vaezi","year":"2019","unstructured":"Vaezi, M., Schober, R., Ding, Z., & Poor, H. V. (2019). Non-orthogonal multiple access: Common myths and critical questions. IEEE Wireless Communications, 26(5), 174\u2013180.","journal-title":"IEEE Wireless Communications"},{"issue":"49","key":"3024_CR34","first-page":"212","volume":"7","author":"Y Xu","year":"2019","unstructured":"Xu, Y., Xia, J., Wu, H., & Fan, L. (2019). Q-learning based physical-layer secure game against multiagent attacks. IEEE Access, 7(49), 212.","journal-title":"IEEE Access"},{"issue":"3","key":"3024_CR35","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1109\/TCOMM.2017.2776114","volume":"66","author":"D Wang","year":"2017","unstructured":"Wang, D., Ren, P., & Cheng, J. (2017). Cooperative secure communication in two-hop buffer-aided networks. IEEE Transactions on Wireless Communications, 66(3), 972\u2013985.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"3024_CR36","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1109\/LCOMM.2016.2539162","volume":"20","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Wang, H.-M., Yang, Q., & Ding, Z. (2016). Secrecy sum rate maximization in non-orthogonal multiple access. IEEE Communications Letters, 20(5), 930\u2013933.","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"3024_CR37","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/LWC.2019.2899309","volume":"8","author":"Z Xiang","year":"2019","unstructured":"Xiang, Z., Yang, W., Pan, G., Cai, Y., & Sun, X. (2019). Secure transmission in non-orthogonal multiple access networks with an untrusted relay. IEEE Communications Letters, 8(3), 905\u2013908.","journal-title":"IEEE Communications Letters"},{"key":"3024_CR38","unstructured":"Gradshteyn, I. S., & Ryzhik, I. M. (2014). Table of integrals, series, and products."},{"key":"3024_CR39","doi-asserted-by":"crossref","unstructured":"Abramowitz, M., & Stegun, I. A. (1964). Handbook of mathematical functions: with formulas, graphs, and mathematical tables. North Chelmsford, MA, USA: Courier Corporation, vol.\u00a055.","DOI":"10.1115\/1.3625776"},{"issue":"3","key":"3024_CR40","first-page":"1656","volume":"16","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Qin, Z., Elkashlan, M., Gao, Y., & Hanzo, L. (2017). Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Transactions on Communications, 16(3), 1656\u20131672.","journal-title":"IEEE Transactions on Communications"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03024-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-03024-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03024-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T18:15:47Z","timestamp":1663611347000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-03024-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,28]]},"references-count":40,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["3024"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-03024-7","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,28]]},"assertion":[{"value":"31 May 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}