Research Article

Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks

Figure 9

Illustration of the secrecy sum throughput with the different numbers of the near users and far users as a function of the transmit power, where bps/Hz.