{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:19:36Z","timestamp":1775913576522,"version":"3.50.1"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s12243-020-00819-7","type":"journal-article","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T20:02:32Z","timestamp":1604520152000},"page":"375-397","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Physical layer security for NOMA: limitations, issues, and recommendations"],"prefix":"10.1007","volume":"76","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0234-4419","authenticated-orcid":false,"given":"Reem","family":"Melki","sequence":"first","affiliation":[]},{"given":"Hassan N.","family":"Noura","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"819_CR1","doi-asserted-by":"crossref","unstructured":"Dutta A (2019) Power domain NOMA design based on MBER criterion. In: National Conference on Communications (NCC), IEEE, pp 1\u20135","DOI":"10.1109\/NCC.2019.8732248"},{"key":"819_CR2","doi-asserted-by":"publisher","first-page":"48268","DOI":"10.1109\/ACCESS.2018.2868093","volume":"6","author":"J Zeng","year":"2018","unstructured":"Zeng J, et al. (2018) Investigation on evolving single-carrier NOMA into multi-carrier NOMA in 5G. IEEE Access 6: 48268\u201348288","journal-title":"IEEE Access"},{"key":"819_CR3","doi-asserted-by":"crossref","unstructured":"Shahab M, Shin S (2017) A time sharing based approach to accommodate similar gain users in NOMA for 5G networks. In: IEEE Conference on Local Computer Networks Workshops (LCN workshops), IEEE, pp 142\u2013147","DOI":"10.1109\/LCN.Workshops.2017.76"},{"key":"819_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92090-0","volume-title":"Multiple access techniques for 5G wireless networks and beyond","author":"M Vaezi","year":"2019","unstructured":"Vaezi M, Ding Z, Poor H (2019) Multiple access techniques for 5G wireless networks and beyond. Springer, Book"},{"key":"819_CR5","unstructured":"Furqan H, et al. (2019) Physical layer security for NOMA: requirements, merits, challenges, and recommendations. arXiv:1905.05064"},{"issue":"4","key":"819_CR6","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/LCOMM.2019.2903083","volume":"23","author":"S Baig","year":"2019","unstructured":"Baig S, Ali U, Asif HM, Khan AA, Mumtaz S (2019) Closed-form BER expression for fourier and wavelet transform-based pulse-shaped data in downlink NOMA. IEEE Commun Lett 23(4):592\u2013595","journal-title":"IEEE Commun Lett"},{"issue":"1","key":"819_CR7","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/JIOT.2018.2846578","volume":"6","author":"R Melki","year":"2018","unstructured":"Melki R, et al. (2018) An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things Journal 6(1):361\u2013378","journal-title":"IEEE Internet of Things Journal"},{"key":"819_CR8","doi-asserted-by":"crossref","unstructured":"Aldababsa M, Toka M, G\u00f6k\u00e7celi S., Kurt GK, Kucur O (2018) A tutorial on nonorthogonal multiple access for 5G and beyond. Wireless Commun Mobile Comput, vol. 2018","DOI":"10.1155\/2018\/9713450"},{"key":"819_CR9","first-page":"83","volume":"83","author":"R Kizilirmak","year":"2016","unstructured":"Kizilirmak R, Bizaki H (2016) Non-orthogonal multiple access (NOMA) for 5G networks. Towards 5G Wireless Networks-A Physical Layer Perspective: 83:83\u201398","journal-title":"Towards 5G Wireless Networks-A Physical Layer Perspective:"},{"key":"819_CR10","doi-asserted-by":"crossref","unstructured":"Taherzadeh M, Nikopour H, Bayesteh A, Baligh H (2014) Scma codebook design. In: Proceedings of the IEEE Vehicular Technology Conference (VTC2014-Fall), IEEE, pp 1\u20135","DOI":"10.1109\/VTCFall.2014.6966170"},{"issue":"3","key":"819_CR11","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1007\/s11276-019-02060-0","volume":"26","author":"R Melki","year":"2019","unstructured":"Melki R, Noura HN, Mansour MM, Chehab A (2019) Physical layer security schemes for MIMO systems: an overview. Wirel Netw: 26(3):2089\u20132111","journal-title":"Wirel Netw:"},{"key":"819_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.phycom.2018.10.008","volume":"32","author":"R Melki","year":"2019","unstructured":"Melki R, Noura H, Mansour M, Chehab A (2019) A survey on OFDM physical layer security. Physical Communication 32:1\u201330","journal-title":"Physical Communication"},{"issue":"2","key":"819_CR13","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1109\/COMST.2018.2878035","volume":"21","author":"J Hamamreh","year":"2018","unstructured":"Hamamreh J, Furqan H, Arslan H (2018) Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey. IEEE Communications Surveys & Tutorials 21 (2):1773\u20131828","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"819_CR14","doi-asserted-by":"publisher","first-page":"17450","DOI":"10.1109\/ACCESS.2017.2737330","volume":"5","author":"H Lei","year":"2017","unstructured":"Lei H, et al. (2017) On secure NOMA systems with transmit antenna selection schemes. IEEE Access 5:17450\u201317464","journal-title":"IEEE Access"},{"key":"819_CR15","unstructured":"Shim K, et al. (2020) TAS schemes to enhance PLS in two-user NOMA systems with multiple eavesdroppers. In: International Conference on Electronics, Information and Communication (ICEIC)"},{"issue":"2","key":"819_CR16","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11036-018-1151-7","volume":"24","author":"H Noura","year":"2018","unstructured":"Noura H, Melki R, Chehab A, Mansour M (2018) A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach. Mobile Networks and Applications: 24(2):447\u2013463","journal-title":"Mobile Networks and Applications:"},{"issue":"10","key":"819_CR17","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/MCOM.2017.1601065","volume":"55","author":"W Shin","year":"2017","unstructured":"Shin W, Vaezi M, Lee B, Love D, Lee J, Poor H (2017) Non-orthogonal multiple access in multi-cell networks: theory, performance, and practical challenges. IEEE Commun Mag 55(10):176\u2013183","journal-title":"IEEE Commun Mag"},{"key":"819_CR18","doi-asserted-by":"crossref","unstructured":"Xu D, Ren P, Du Q, Sun L, Wang Y (2017) Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission. In: Proceedings of the IEEE International Conference on Communication (ICC), IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2017.7997115"},{"key":"819_CR19","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon C (1949) Communication theory of secrecy systems. Bell Systems Technical Journal 28:656\u2013715","journal-title":"Bell Systems Technical Journal"},{"key":"819_CR20","unstructured":"Stallings W, Tahiliani MP (2014) Cryptography and network security: principles and practice, vol. 6"},{"key":"819_CR21","unstructured":"Gueron S, et al. (2019) Flexible architecture and instruction for advanced encryption standard (AES). US Patent 10,171,232"},{"issue":"6","key":"819_CR22","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MCOM.2018.8387196","volume":"56","author":"H Zhang","year":"2018","unstructured":"Zhang H, et al. (2018) Heterogeneous ultra dense networks: part 2. IEEE Commun Mag 56 (6):12\u201313","journal-title":"IEEE Commun Mag"},{"key":"819_CR23","doi-asserted-by":"crossref","unstructured":"Noura H, Melki R, Chehab A, Mansour M, Martin S (2018) Efficient and secure physical encryption scheme for low-power wireless M2M devices. In: Proceedings of the IEEE International Wireless Communications & Mobile Computing Conference (IWCMC), IEEE, pp 1267\u20131272","DOI":"10.1109\/IWCMC.2018.8450330"},{"issue":"5","key":"819_CR24","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MNET.2018.1800024","volume":"32","author":"S Cioni","year":"2018","unstructured":"Cioni S, et al. (2018) On the satellite role in the era of 5G massive machine type communications. IEEE Netw 32(5):54\u201361","journal-title":"IEEE Netw"},{"issue":"5","key":"819_CR25","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1109\/LWC.2018.2824813","volume":"7","author":"H Tayakout","year":"2018","unstructured":"Tayakout H, Dayoub I, Ghanem K, Bousbia-Salah H (2018) Automatic modulation classification for d-stbc cooperative relaying networks. IEEE Wireless Communications Letters 7(5):780\u2013783","journal-title":"IEEE Wireless Communications Letters"},{"key":"819_CR26","doi-asserted-by":"crossref","unstructured":"Le Q, Bao V, An B (2018) Full-duplex distributed switch-and-stay energy harvesting selection relaying networks with imperfect CSI: design and outage analysis. J Commun Netw 20(1):29\u201346","DOI":"10.1109\/JCN.2018.000004"},{"key":"819_CR27","unstructured":"Pajovic M, Akino T, Orlik P (2019) Localization using millimeter wave communication signals. US Patent App. 10\/425,910"},{"issue":"5","key":"819_CR28","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1109\/JSAC.2018.2832820","volume":"36","author":"P Ferreira","year":"2018","unstructured":"Ferreira P, et al. (2018) Multiobjective reinforcement learning for cognitive satellite communications using deep neural network ensembles. IEEE Journal on Selected Areas in Communications 36(5):1030\u20131041","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"819_CR29","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.optcom.2018.04.046","volume":"424","author":"C Biton","year":"2018","unstructured":"Biton C, Arnon S (2018) Improved multiple access resource allocation in visible light communication systems. Opt Commun 424:98\u2013102","journal-title":"Opt Commun"},{"key":"819_CR30","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M, et al. (2018) Mobile edge computing, fog: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680\u2013698","journal-title":"Futur Gener Comput Syst"},{"issue":"10","key":"819_CR31","doi-asserted-by":"publisher","first-page":"3257","DOI":"10.3390\/s18103257","volume":"18","author":"A Jebril","year":"2018","unstructured":"Jebril A, Sali A, Ismail A, Rasid M (2018) Overcoming limitations of LoRa physical layer in image transmission. Sensors 18(10):3257","journal-title":"Sensors"},{"key":"819_CR32","first-page":"1","volume":"2019","author":"R Melki","year":"2019","unstructured":"Melki R, Noura H, Chehab A (2019) Lightweight multi-factor mutual authentication protocol for IoT devices. Int J Inf Secur: 2019:1\u201316","journal-title":"Int J Inf Secur:"},{"key":"819_CR33","doi-asserted-by":"crossref","unstructured":"Noura H, Melki R, Chehab A (2019) Secure and lightweight mutual multi-factor authentication for IoT communication systems. In: Proceedings of the IEEE Vehicular Technology Conference (VTC2019-Fall), IEEE, pp 1\u20137","DOI":"10.1109\/VTCFall.2019.8891082"},{"key":"819_CR34","doi-asserted-by":"crossref","unstructured":"Saldamli G, Ertaul L, Shankaralingappa A (2019) Analysis of lightweight message authentication codes for IoT environments. In: Proceedings of the IEEE International Conference on Fog and Mobile Edge Computing (FMEC), IEEE, pp 235\u2013240","DOI":"10.1109\/FMEC.2019.8795359"},{"key":"819_CR35","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.phycom.2018.12.010","volume":"33","author":"G Satrya","year":"2019","unstructured":"Satrya G, Shin Y (2019) Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems. Physical Communication 33:16\u201325","journal-title":"Physical Communication"},{"key":"819_CR36","doi-asserted-by":"crossref","unstructured":"Satrya G, Shin Y (2017) Security enhancement to successive interference cancellation algorithm for non-orthogonal multiple access (NOMA). In: Proceedings of the IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, pp 1\u20135","DOI":"10.1109\/PIMRC.2017.8292165"},{"key":"819_CR37","doi-asserted-by":"crossref","unstructured":"Abolpour M, Mirmohseni M, Aref M (2019) Outage performance in secure cooperative NOMA. In: Proceedings of the IEEE Iran Workshop on Communication and Information theory (IWCIT), IEEE, pp 1\u20136","DOI":"10.1109\/IWCIT.2019.8731631"},{"issue":"6","key":"819_CR38","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2883273","volume":"14","author":"Y Feng","year":"2019","unstructured":"Feng Y, Yan S, Liu C, Yang Z, Yang N (2019) Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access. IEEE Transactions on Information Forensics and Security 14(6):1670\u20131683","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"819_CR39","doi-asserted-by":"crossref","unstructured":"Bankey V, Singh V, Upadhyay P (2020) Physical layer secrecy of NOMA-based hybrid satellite-terrestrial relay networks. In: Wireless Communications and Networking Conference (WCNC), IEEE, pp 1\u20136","DOI":"10.1109\/WCNC45663.2020.9120835"},{"issue":"3","key":"819_CR40","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1109\/JSTSP.2019.2902103","volume":"13","author":"Z Xiang","year":"2019","unstructured":"Xiang Z, et al. (2019) Physical layer security in cognitive radio inspired NOMA network. IEEE Journal of Selected Topics in Signal Processing 13(3):700\u2013714","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"issue":"3","key":"819_CR41","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MCOM.2018.1700671","volume":"56","author":"K Xiao","year":"2018","unstructured":"Xiao K, Gong L, Kadoch M (2018) Opportunistic multicast NOMA with security concerns in a 5G massive MIMO system. IEEE Commun Mag 56(3):91\u201395","journal-title":"IEEE Commun Mag"},{"key":"819_CR42","doi-asserted-by":"crossref","unstructured":"Zhou F, et al. (2018) Enhancing PHY security of MISO NOMA SWIPT systems with a practical non-linear EH model. In: Proceedings of the IEEE International Conference on Communications Workshops (ICC Workshops), IEEE, pp 1\u20136","DOI":"10.1109\/ICCW.2018.8403565"},{"issue":"8","key":"819_CR43","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1109\/LCOMM.2018.2841378","volume":"22","author":"N Nandan","year":"2018","unstructured":"Nandan N, Majhi S, Wu H (2018) Secure beamforming for MIMO-NOMA-based cognitive radio network. IEEE Commun Lett 22(8):1708\u20131711","journal-title":"IEEE Commun Lett"},{"issue":"7","key":"819_CR44","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.1109\/JSAC.2018.2824624","volume":"36","author":"B Zheng","year":"2018","unstructured":"Zheng B, et al. (2018) Secure NOMA based two-way relay networks using artificial noise and full duplex. IEEE Journal on Selected Areas in Communications 36(7):1426\u20131440","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"819_CR45","doi-asserted-by":"crossref","unstructured":"Zheng B, Chen F, Wen M, Li Q, Liu Y, Ji F (2018) Secure NOMA based cooperative networks with rate-splitting source and full-duplex relay. In: Proceedings of the IEEE International Symposium on Wireless Communication Systems (ISWCS), pp 1\u20135","DOI":"10.1109\/ISWCS.2018.8491208"},{"issue":"3","key":"819_CR46","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/JSTSP.2019.2901170","volume":"13","author":"M Zeng","year":"2019","unstructured":"Zeng M, Nguyen N, Dobre O, Poor H (2019) Securing downlink massive MIMO-NOMA networks with artificial noise. IEEE Journal of Selected Topics in Signal Processing 13(3):685\u2013699","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"819_CR47","doi-asserted-by":"publisher","first-page":"100977","DOI":"10.1016\/j.phycom.2019.100977","volume":"39","author":"P Singh","year":"2020","unstructured":"Singh P, Trivedi A (2020) NOMA And massive MIMO assisted physical layer security using artificial noise precoding. Physical Communication 39:100977","journal-title":"Physical Communication"},{"issue":"5","key":"819_CR48","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1109\/TWC.2019.2906202","volume":"18","author":"Y Feng","year":"2019","unstructured":"Feng Y, et al. (2019) Beamforming design and power allocation for secure transmission with NOMA. IEEE Trans Wirel Commun 18(5):2639\u20132651","journal-title":"IEEE Trans Wirel Commun"},{"key":"819_CR49","doi-asserted-by":"publisher","first-page":"11397","DOI":"10.1109\/ACCESS.2019.2890822","volume":"7","author":"Y Alsaba","year":"2019","unstructured":"Alsaba Y, Leow C, Abdul Rahim S (2019) Null-steering beamforming for enhancing the physical layer security of non-orthogonal multiple access system. IEEE Access 7:11397\u2013 11409","journal-title":"IEEE Access"},{"issue":"5","key":"819_CR50","doi-asserted-by":"publisher","first-page":"4645","DOI":"10.1109\/TVT.2017.2789223","volume":"67","author":"J Chen","year":"2018","unstructured":"Chen J, Yang L, Alouini M (2018) Physical layer security for cooperative NOMA systems. IEEE Trans Veh Technol 67(5):4645\u20134649","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"819_CR51","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","volume":"36","author":"Y Wu","year":"2018","unstructured":"Wu Y, Khisti A, Xiao C, Caire G, Wong K, Gao X (2018) A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE Journal on Selected Areas in Communications 36(4):679\u2013695","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"819_CR52","doi-asserted-by":"crossref","unstructured":"Jiang F, Huang G, Liu W, Sun C (2018) Adaptive power allocation for D2D assisted cooperative relaying system with NOMA. In: Proceedings of the IEEE\/CIC International Conference on Communications in China (ICCC), pp 676\u2013681","DOI":"10.1109\/ICCChina.2018.8641249"},{"key":"819_CR53","doi-asserted-by":"crossref","unstructured":"Lei L, et al. (2018) Power and load optimization in interference-coupled non-orthogonal multiple access networks. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOCOM.2018.8647669"},{"key":"819_CR54","doi-asserted-by":"crossref","unstructured":"Yang L, Yuan Y (2020) Secrecy outage probability analysis for RIS-assisted NOMA systems. arXiv:2007.15902","DOI":"10.1049\/el.2020.2284"},{"key":"819_CR55","first-page":"1","volume":"2020","author":"L Anh","year":"2020","unstructured":"Anh L, Kong H (2020) Secrecy performance of an uplink-downlink cooperative PD-NOMA DF network in PLS. Int J Electron: 2020:1\u201326","journal-title":"Int J Electron:"},{"issue":"7","key":"819_CR56","doi-asserted-by":"publisher","first-page":"4735","DOI":"10.1109\/TWC.2018.2830386","volume":"17","author":"L You","year":"2018","unstructured":"You L, et al. (2018) Resource optimization with load coupling in multi-cell NOMA. IEEE Trans Wirel Commun 17(7):4735\u2013 4749","journal-title":"IEEE Trans Wirel Commun"},{"key":"819_CR57","doi-asserted-by":"crossref","unstructured":"Su B, Ni Q, He B (2018) Robust transmit designs for secrecy rate constrained MISO NOMA system. In: Proceedings of the IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp 1\u20135","DOI":"10.1109\/PIMRC.2018.8580844"},{"issue":"3","key":"819_CR58","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1109\/JSTSP.2019.2899778","volume":"13","author":"H Wang","year":"2019","unstructured":"Wang H, Zhang X, Yang Q, Tsiftsis TA (2019) Secure users oriented downlink MISO NOMA. IEEE Journal of Selected Topics in Signal Processing 13(3):671\u2013684","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"819_CR59","doi-asserted-by":"crossref","unstructured":"ElHalawany B, Ruby R, Riihonen T, Wu K (2018) Performance of cooperative NOMA systems under passive eavesdropping. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOCOM.2018.8647883"},{"key":"819_CR60","doi-asserted-by":"crossref","unstructured":"Islam A, Uddin M, Kader M, Shin S (2018) Blockchain based secure data handover scheme in non-orthogonal multiple access. In: Proceedings of the IEEE International Conference on Wireless and Telematics (ICWT), pp 1\u20135","DOI":"10.1109\/ICWT.2018.8527732"},{"key":"819_CR61","doi-asserted-by":"crossref","unstructured":"Shao X, Wu Z (2018) A novel multiple access scheme with physical layer security. In: Proceedings of the IEEE International Conference on communication technology (ICCT), pp 36\u201340","DOI":"10.1109\/ICCT.2018.8599937"},{"issue":"6","key":"819_CR62","doi-asserted-by":"publisher","first-page":"4998","DOI":"10.1109\/TVT.2018.2802915","volume":"67","author":"D Xu","year":"2018","unstructured":"Xu D, Ren P, Lin H (2018) Combat hybrid eavesdropping in power-domain NOMA: joint design of timing channel and symbol transformation. IEEE Trans Veh Technol 67(6):4998\u20135012","journal-title":"IEEE Trans Veh Technol"},{"issue":"7","key":"819_CR63","doi-asserted-by":"publisher","first-page":"7214","DOI":"10.1109\/TVT.2019.2919873","volume":"68","author":"B Chen","year":"2019","unstructured":"Chen B, et al. (2019) Secure primary transmission assisted by a secondary full-duplex NOMA relay. IEEE Trans Veh Technol 68(7):7214\u20137219","journal-title":"IEEE Trans Veh Technol"},{"key":"819_CR64","unstructured":"Zhao F, et al. (2020) Secure energy efficiency transmission for mmwave-NOMA system. IEEE Syst J"},{"key":"819_CR65","doi-asserted-by":"crossref","unstructured":"Sun X, Yang W, Cai Y (2020) Secure communication in NOMA-assisted millimeter-wave SWIPT UAV networks. IEEE Internet of Things Journal 7(3)","DOI":"10.1109\/JIOT.2019.2957021"},{"issue":"4","key":"819_CR66","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MWC.01.1900529","volume":"27","author":"Z Xiang","year":"2020","unstructured":"Xiang Z, et al. (2020) NOMA assisted secure short-packet communications in IoT. IEEE Wireless Communications 27(4):8\u201315","journal-title":"IEEE Wireless Communications"},{"key":"819_CR67","doi-asserted-by":"crossref","unstructured":"Yesilkaya A, et al. (2020) Physical-layer security in visible light communications. In: 6G Wireless Summit (6G SUMMIT), IEEE, pp 1\u20135","DOI":"10.1109\/6GSUMMIT49458.2020.9083799"},{"issue":"5","key":"819_CR68","doi-asserted-by":"publisher","first-page":"2905","DOI":"10.1109\/TWC.2020.2968317","volume":"19","author":"Z Sheng","year":"2020","unstructured":"Sheng Z, Tuan H, Nasir A, Duong T, Poor H (2020) Secure UAV-enabled communication using han-kobayashi signaling. IEEE Trans Wirel Commun 19(5):2905\u20132919","journal-title":"IEEE Trans Wirel Commun"},{"key":"819_CR69","doi-asserted-by":"publisher","first-page":"5049","DOI":"10.1109\/ACCESS.2017.2772259","volume":"6","author":"K Lai","year":"2018","unstructured":"Lai K, Lei J, Wen L, Chen G, Li W, Xiao P (2018) Secure transmission with randomized constellation rotation for downlink sparse code multiple access system. IEEE Access 6:5049\u20135063","journal-title":"IEEE Access"},{"issue":"8","key":"819_CR70","doi-asserted-by":"publisher","first-page":"4961","DOI":"10.1109\/TIT.2011.2158487","volume":"57","author":"F Oggier","year":"2011","unstructured":"Oggier F, Hassibi B (2011) The secrecy capacity of the MIMO wiretap channel. IEEE Trans Inf Theory 57(8):4961\u20134972","journal-title":"IEEE Trans Inf Theory"},{"key":"819_CR71","doi-asserted-by":"crossref","unstructured":"Barros J, Rodrigues M (2006) Secrecy capacity of wireless channels. In: IEEE International Symposium on Information Theory, IEEE, pp 356\u2013360","DOI":"10.1109\/ISIT.2006.261613"},{"key":"819_CR72","doi-asserted-by":"crossref","unstructured":"Tao L, et al. (2018) On secrecy outage probability and average secrecy rate of large-scale cellular networks. Wirel Commun Mob Comput, 2018","DOI":"10.1155\/2018\/6869189"},{"issue":"5","key":"819_CR73","doi-asserted-by":"publisher","first-page":"3487","DOI":"10.1109\/TWC.2018.2815021","volume":"17","author":"M Monteiro","year":"2018","unstructured":"Monteiro M, et al. (2018) Maximum secrecy throughput of MIMOME FSO communications with outage constraints. IEEE Trans Wirel Commun 17(5):3487\u20133497","journal-title":"IEEE Trans Wirel Commun"},{"key":"819_CR74","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.adhoc.2018.01.012","volume":"72","author":"X Li","year":"2018","unstructured":"Li X, et al. (2018) Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Netw 72:105\u2013114","journal-title":"Ad Hoc Netw"},{"key":"819_CR75","doi-asserted-by":"crossref","unstructured":"Yan S, Zhou X, Hu J, Hanly S (2019) Low probability of detection communication: opportunities and challenges. arXiv:1906.07895","DOI":"10.1109\/MWC.001.1900057"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00819-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-020-00819-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00819-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T16:48:34Z","timestamp":1669481314000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-020-00819-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"references-count":75,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["819"],"URL":"https:\/\/doi.org\/10.1007\/s12243-020-00819-7","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"16 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}