Research Article

Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks

Figure 1

Schematic illustration of the multitwo user NOMA system with the presence of an eavesdropper.