References
- Dai, L., Wang, B., Yuan, Y., Han, S., Chih-Lin, I., & Wang, Z. (2015). Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Communications Magazine, 53, 74–81.
- Ding, Z., Adachi, F., & Poor, H. V. (2016). The application of MIMO to non-orthogonal multiple access. IEEE Transactions on Wireless Communications, 15, 537–552.
- Ding, Z., Lei, X., Karagiannidis, G. K., Schober, R., Yuan, J., & Bhargava, V. (2017). A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends. IEEE Journal on Selected Areas in Communications, 35, 2181–2195.
- Ding, Z., Liu, Y., Choi, J., Sun, Q., Elkashlan, M., & Poor, H. V. (2017). Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Communications Magazine, 55, 185–191.
- Ding, Z., Peng, M., & Poor, H. V. (2015). Cooperative non-orthogonal multiple access in 5G systems. IEEE Communications Letters : A Publication of the IEEE Communications Society, 19, 1462–1465.
- Ding, Z., Xu, M., Lu, J., & Liu, F. (2012). Improving wireless security for bidirectional communication scenarios. IEEE Transactions on Vehicular Technology, 61, 2842–2848.
- Gradshteyn, I. S., & Ryzhik, I. M. (2014). Table of intergrals, series, and products (8th ed.). Academic Press (an Imprint of Elsevier).
- He, X., & Yener, A. (2010). Cooperation with an untrusted relay: A secrecy perspective. IEEE Transactions on Information Theory, 56, 38073827.
- Islam, S. R., Avazov, N., Dobre, O. A., & Kwak, K. S. (2017). Power-domain non-orthogonal multiple access (NOMA) in 5G Systems: Potentials and challenges. IEEE Communications Surveys & Tutorials, 19, 721–742.
- Kader, M. F., Shahab, M. B., & Shin, S. Y. (2017). Exploiting non-orthogonal multiple access in cooperative relay sharing. IEEE Communications Letters : A Publication of the IEEE Communications Society, 21, 1159–1162.
- Leung-Yan-Cheong, S., & Hellman, M. (1978). The gaussian wiretap channel. IEEE Transactions on Information Theory, 24, 451–456.
- Liu, Y., Ding, Z., Elkashlan, M., & Poor, H. V. (2016). Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer. IEEE Journal on Selected Areas in Communications, 34, 938–953.
- Liu, Y., Ding, Z., Elkashlan, M., & Yuan, J. (2016). Non-orthogonal multiple access in large-scale underlay cognitive radio networks. IEEE Transactions on Vehicular Technology, 65, 10152–10157.
- Lv, L., Chen, J., & Ni, Q. (2016). Cooperative non-orthogonal multiple access in cognitive radio. IEEE Communications Letters : a Publication of the IEEE Communications Society, 20, 2059–2062.
- Mamaghani, M. T., Mohammadi, A., Yeoh, P. L., & Kuhestani, A. (2017). Secure two-way communication via a wireless powered untrusted relay and friendly jammer. IEEE Global Communications Conference 2017 CISS, IEEE, Singapore.
- Mattaiou, M., Papadogiannis, A., Bjornson, E., & Debbah, M. (2015). Two-way relaying under the presence of relay transceiver hardware impairments on IEEE communication letters, 17(6), 2013.
- Nasir, A. A., Zhou, X., Durrani, S., & Kennedy, R. A. (2013). Relaying protocols for wireless energy harvesting and information processing. IEEE Transactions on Wireless Communications, 12(7), 3622–3636.
- Oohama, Y. (2007). Relay channels with Confidential Messages. IEEE Transactions on Information Theory. Retrived from http://arxiv.org/abs/cs.IT/0611125
- Paradiso, J. A., & Starner, T. (2005). Energy scavenging for mobile and wireless electronics. IEEE Pervasive Computing, 4, 18–27.
- Tse, D., & Viswanath, P. (2004). Fundamentals of wireless communication. Cambridge: Cambridge University Press.
- Tuan, V. P., & Kong, H. Y. (2017). Secure communication in untrusted relay selection networks with wireless energy harvesting. Wireless Networks Journal.
- Varshney, L. R. (2008). Transporting information and energy simultaneously. Information Theory, ISIT, 2008, 1612–1616.
- Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8).
- Xing, H., Liu, L., & Zhang, R. (2016, January). Secrecy wireless information and power transfer in fading wiretap channel. IEEE Transactions on Vehicular Technology, 65(1).
- Zabetian, N., Baghani, M., & Mohammadi, A. (2016). Rate optimization in NOMA cognitive radio networks. 2016 8th International Symposium on Telecommunications (IST), Tehran, Iran.
- Zeng, M., Yadav, A., Dobre, O. A., Tsiropoulos, G. I., & Poor, H. V. (2017). Capacity comparison between MIMO-NOMA and MIMO-OMA with multiple users in a cluster. IEEE Journal on Selected Areas in Communications, 35, 2413–2424.
- Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology, 61, 3693–3704.
- Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015). Improving physical-layer security in wireless communications using diversity techniques. IEEE Network, 29, 42–48.