{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:04:38Z","timestamp":1757617478458,"version":"3.44.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T00:00:00Z","timestamp":1740355200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T00:00:00Z","timestamp":1740355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022MF273;ZR2021QF113"],"award-info":[{"award-number":["ZR2022MF273;ZR2021QF113"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013254","name":"National College Students Innovation and Entrepreneurship Training Program","doi-asserted-by":"publisher","award":["S202310429489;S202310429182"],"award-info":[{"award-number":["S202310429489;S202310429182"]}],"id":[{"id":"10.13039\/501100013254","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s12243-025-01065-5","type":"journal-article","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T02:21:15Z","timestamp":1740363675000},"page":"627-638","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance analysis for security improvement in secondary NOMA networks"],"prefix":"10.1007","volume":"80","author":[{"given":"E. Y.","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0349-5408","authenticated-orcid":false,"given":"M. J.","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"W.","family":"Yang","sequence":"additional","affiliation":[]},{"given":"R. Y.","family":"Wang","sequence":"additional","affiliation":[]},{"given":"X. J.","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,24]]},"reference":[{"issue":"12","key":"1065_CR1","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1109\/LSP.2014.2343971","volume":"21","author":"Z Ding","year":"2014","unstructured":"Ding Z, Yang Z, Fan P, Poor HV (2014) On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Process Lett 21(12):1501\u20131505","journal-title":"IEEE Signal Process Lett"},{"issue":"12","key":"1065_CR2","doi-asserted-by":"publisher","first-page":"11409","DOI":"10.1109\/TVT.2017.2728608","volume":"66","author":"R Jiao","year":"2017","unstructured":"Jiao R, Dai L, Zhang J, MacKenzie R, Hao M (2017) On the performance of NOMA-based cooperative relaying systems over Rician fading channels. IEEE Trans Veh Technol 66(12):11409\u201311413","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"1065_CR3","doi-asserted-by":"publisher","first-page":"6793","DOI":"10.1109\/TVT.2020.2982171","volume":"69","author":"MM Alsmadi","year":"2020","unstructured":"Alsmadi MM, Ali NA, Hayajneh M, Ikki SS (2020) Down-link NOMA networks in the presence of IQI and imperfect SIC: receiver design and performance analysis. IEEE Trans Veh Technol 69(6):6793\u20136797","journal-title":"IEEE Trans Veh Technol"},{"issue":"9","key":"1065_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2015.7263349","volume":"53","author":"L Dai","year":"2015","unstructured":"Dai L, Wang B, Yuan Y, Han S, Chih-Lin I, Wang Z (2015) Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends. IEEE Commun Mag 53(9):74\u201381","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"1065_CR5","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/MCOM.2017.1500657CM","volume":"55","author":"Z Ding","year":"2017","unstructured":"Ding Z, Liu Y, Choi J, Sun Q, Elkashlan M, Chih-Lin I, Poor HV (2017) Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Commun Mag 55(2):185\u2013191","journal-title":"IEEE Commun Mag"},{"key":"1065_CR6","doi-asserted-by":"crossref","unstructured":"Chen H, Tao X, Li N, Li X (2016) Secrecy performance of the artificial noise assisted broadcast channel with confidential messages and external eavesdroppers. 2016 IEEE International Conference on Communications (ICC). 1\u20136","DOI":"10.1109\/ICC.2016.7511534"},{"issue":"3","key":"1065_CR7","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TWC.2017.2650987","volume":"16","author":"Y Liu","year":"2017","unstructured":"Liu Y, Qin Z, Elkashlan M, Gao Y, Hanzo L (2017) Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel 16(3):1656\u20131672","journal-title":"IEEE Trans. Wirel"},{"issue":"1","key":"1065_CR8","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/JIOT.2017.2778185","volume":"5","author":"L Hu","year":"2017","unstructured":"Hu L, Wen H, Wu B, Pan F, Liao R-F, Song H, Tang J, Wang X (2017) Cooperative jamming for physical layer security enhancement in Internet of Things. IEEE Internet Things J 5(1):219\u2013228","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"1065_CR9","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.1109\/JSAC.2018.2824624","volume":"36","author":"B Zheng","year":"2018","unstructured":"Zheng B, Wen M, Wang C-X, Wang X, Chen F, Tang J, Ji F (2018) Secure NOMA based two-way relay networks using artificial noise and full duplex. IEEE J Sel Areas Commun 36(7):1426\u20131440","journal-title":"IEEE J Sel Areas Commun"},{"issue":"8","key":"1065_CR10","doi-asserted-by":"publisher","first-page":"5574","DOI":"10.1109\/TCOMM.2019.2914210","volume":"67","author":"Y Cao","year":"2019","unstructured":"Cao Y, Zhao N, Pan G, Chen Y, Fan L, Jin M, Alouini M-S (2019) Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay. IEEE Trans Commun 67(8):5574\u20135587","journal-title":"IEEE Trans Commun"},{"issue":"11","key":"1065_CR11","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1109\/LCOMM.2019.2934410","volume":"23","author":"C Yu","year":"2019","unstructured":"Yu C, Ko H-L, Peng X, Xie W, Zhu P (2019) Jammer-aided secure communications for cooperative NOMA systems. IEEE Commun Lett 23(11):1935\u20131939","journal-title":"IEEE Commun Lett"},{"issue":"9","key":"1065_CR12","doi-asserted-by":"publisher","first-page":"8781","DOI":"10.1109\/TVT.2021.3081589","volume":"70","author":"D Li","year":"2021","unstructured":"Li D, Cao Y, Yang Z, Chen Y, Zhang S, Zhao N, Ding Z (2021) Secrecy analysis in NOMA full-duplex relaying networks with artificial jamming. IEEE Trans Veh Technol 70(9):8781\u20138794","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"1065_CR13","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1109\/TGCN.2020.2999815","volume":"4","author":"A Salem","year":"2020","unstructured":"Salem A, Musavian L, Jorswieck EA, A\u00efssa S (2020) Secrecy outage probability of energy-harvesting cooperative NOMA transmissions with relay selection. IEEE Trans. Green Commun. Netw 4(4):1130\u20131148","journal-title":"IEEE Trans. Green Commun. Netw"},{"issue":"1","key":"1065_CR14","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/TVT.2019.2955455","volume":"69","author":"Y Wang","year":"2019","unstructured":"Wang Y, Yin H, Yang W, Zhang T, Shen Y, Zhu H (2019) Secure wireless powered cooperative communication networks with finite energy storage. IEEE Trans Veh Technol 69(1):1008\u20131022","journal-title":"IEEE Trans Veh Technol"},{"key":"1065_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/ACCESS.2019.2960819","volume":"8","author":"G Zhang","year":"2019","unstructured":"Zhang G, Gao Y, Luo H, Wang S, Guo M, Sha N (2019) Security performance analysis for best relay selection in energy-harvesting cooperative communication networks. IEEE Access 8:26\u201336","journal-title":"IEEE Access"},{"issue":"2","key":"1065_CR16","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1109\/TGCN.2019.2962901","volume":"4","author":"A Mabrouk","year":"2019","unstructured":"Mabrouk A, Tourki K, El Shafie A, Al-Dhahir N (2019) Relay-selection refinement scheme for secrecy in untrusted RF-EH relay systems with adaptive transmission under outdated CSI. IEEE Trans. Green Commun. Netw 4(2):423\u2013432","journal-title":"IEEE Trans. Green Commun. Netw"},{"key":"1065_CR17","doi-asserted-by":"crossref","unstructured":"Hoang TM, Nguyen BC, Van Vinh N, Luu GT et al (2023) Secrecy analysis of cooperative NOMA-FDR systems with imperfect CSI and colluding eavesdroppers. Comput Netw 223","DOI":"10.1016\/j.comnet.2023.109594"},{"issue":"12","key":"1065_CR18","doi-asserted-by":"publisher","first-page":"6030","DOI":"10.1109\/TWC.2019.2941944","volume":"18","author":"Z Cao","year":"2019","unstructured":"Cao Z, Ji X, Wang J, Zhang S, Ji Y, Wang J (2019) Security-reliability tradeoff analysis for underlay cognitive two-way relay networks. IEEE Trans Wirel Commun 18(12):6030\u20136042","journal-title":"IEEE Trans Wirel Commun"},{"issue":"4","key":"1065_CR19","doi-asserted-by":"publisher","first-page":"3883","DOI":"10.1109\/TVT.2022.3144531","volume":"71","author":"B Chen","year":"2022","unstructured":"Chen B, Li R, Ning Q, Lin K, Han C, Leung VC (2022) Security at physical layer in NOMA relaying networks with cooperative jamming. IEEE Trans Veh Technol 71(4):3883\u20133888","journal-title":"IEEE Trans Veh Technol"},{"issue":"21","key":"1065_CR20","doi-asserted-by":"publisher","first-page":"21662","DOI":"10.1109\/JIOT.2022.3182755","volume":"9","author":"TN Nguyen","year":"2022","unstructured":"Nguyen TN, Tran D-H, Van Chien T, Phan V-D, Voznak M, Tin PT, Chatzinotas S, Ng DWK, Poor HV (2022) Security-reliability tradeoff analysis for SWIPT-and AF-based IoT networks with friendly jammers. IEEE Internet Things J 9(21):21662\u201321675","journal-title":"IEEE Internet Things J"},{"key":"1065_CR21","doi-asserted-by":"crossref","unstructured":"Ma L, Li E, Wang X, Gu M, Yang Q (2021) Outage probability analysis of overlay cognitive two-way relaying scheme with opportunistic relay selection. IET Networks 3:230\u2013243","DOI":"10.1049\/ntw2.12015"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-025-01065-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-025-01065-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-025-01065-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T06:32:04Z","timestamp":1757140324000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-025-01065-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,24]]},"references-count":21,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1065"],"URL":"https:\/\/doi.org\/10.1007\/s12243-025-01065-5","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2025,2,24]]},"assertion":[{"value":"31 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}