Research Article
Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks
Figure 9
Illustration of the secrecy sum throughput with the different numbers of the near users and far users as a function of the transmit power, where bps/Hz.