Next Article in Journal
Enhancing Distribution Network Resilience Using Genetic Algorithms
Previous Article in Journal
Review of Planar Optical System: Lens Based on Metasurfaces
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of Deceiving HF Eavesdropping Systems with OFDM NOMA

by
Halil Alptuğ Dalgıç
* and
Kubilay Taşdelen
Department of Electrical-Electronics Engineering, Faculty of Technology, Isparta University of Applied Sciences, 32200 Isparta, Turkey
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(21), 4323; https://doi.org/10.3390/electronics14214323
Submission received: 8 September 2025 / Revised: 27 October 2025 / Accepted: 30 October 2025 / Published: 4 November 2025
(This article belongs to the Section Microwave and Wireless Communications)

Abstract

This study investigates the enhancement in spectral efficiency in wireless networks through the application of Non-Orthogonal Multiple Access (NOMA), particularly within the context of imminent 5G networks. Despite its recognized potential, the application of NOMA in High-Frequency (HF) radio communications for eavesdropping mitigation has not been extensively explored. This paper introduces an innovative NOMA-based strategy for securing end-to-end radio communication against unauthorized interception. Utilizing NOMA’s distinctive capability, this methodology transmits a legitimate message at lower power, overlaid with a deceptive message in the same frequency band, thus effectively camouflaging the genuine communication from eavesdroppers. In our experimental setup, scaled mixed Orthogonal Frequency-Division Multiplexing (OFDM)-modulated waveforms were transmitted over varied distances. The findings demonstrate that under specific conditions, our NOMA-based system can successfully mislead eavesdropping systems, showcasing significant potential for enhancing security and privacy in HF radio communication settings. The experiments underscore the practicality of this approach, with the results indicating a noteworthy improvement in thwarting potential eavesdropping attempts, thereby confirming the theoretical model’s applicability in real-world scenarios.

1. Introduction

One of the paramount challenges in end-to-end communication is the risk of eavesdropping, which threatens the confidentiality of transmitted information. To counteract this, various encryption algorithms have been developed. However, the relentless advancement of technology and the advent of supercomputers have escalated the arms race, making it possible to decrypt messages that were once considered secure. This predicament necessitates the exploration and adoption of novel technologies, among which Non-Orthogonal Multiple Access (NOMA) emerges as a beacon of hope. Recognized for its potential to enhance spectral efficiency, NOMA has been heralded as a cornerstone technology for 5G and the subsequent generations of wireless networks [1,2,3,4,5]. Unlike traditional methods, NOMA ingeniously combines multiuser signal superposition with successive interference cancellation (SIC) receivers [6,7,8], thereby optimizing the use of available spectra and facilitating multiuser detection.
Is it possible to deceive eavesdropping systems using Non-Orthogonal Multiple Access (NOMA)? Upon examining today’s leading eavesdropping systems, it is observed that they are primarily capable of detecting, classifying, and analyzing only the signals with higher power. Consequently, in a NOMA waveform transmitted at the same frequency but with two different power levels, the signal with lower power can remain “hidden” in the shadow of the signal with higher power [9,10]. This makes it challenging for eavesdropping systems to detect or decipher the lower-power signal. This characteristic of NOMA presents a potential advantage for ensuring privacy in communications.
Despite its burgeoning popularity, the application of NOMA to bolster security against eavesdropping in end-to-end radio communication remains underexplored [11]. This study proposes a NOMA-based method designed to obfuscate eavesdroppers. By superimposing two High-Frequency (HF) messages within the same frequency domain—one for deception and the other for genuine communication—and encoding the latter with lower power, we ensure that eavesdroppers are misled by the more dominant signal. This approach leverages the inherent capabilities of NOMA, ensuring that only intended receivers, equipped with knowledge of the NOMA procedure and SIC capabilities, can discern the actual message.
In this paper, two power-scaled combined OFDM-modulated waveforms are analyzed and tested in the field at various distances to deceive eavesdropping systems. In the following section, the system overview and mathematical description are provided.

2. System Overview and Mathematical Description

NOMA uses superposition coding at the transmitter and SIC at the receiver [5,12]. In downlink-style transmission, we consider two messages: Message 1 (cover/deception) and Message 2 (legitimate/low-power). Only the intended system receivers know the power ratio of the NOMA superposition; eavesdroppers do not. Figure 1 illustrates the system overview. The HF band has limited bandwidth; according to the transmitter properties, this experiment uses only 8 kHz occupied bandwidth. The experiment parameters are summarized in Table 1.
Let N be the number of subcarriers. The OFDM symbol vectors for the high-power and low-power layers are
X α = [ x α , 0 , x α , 1 , , x α , N 1 ] , X β = [ x β , 0 , x β , 1 , , x β , N 1 ] ,
with power allocation coefficients α , β ( 0 , 1 ) satisfying α + β = 1 and α β [8,13,14].
Table 1. OFDM waveform parameters for the experiment.
Table 1. OFDM waveform parameters for the experiment.
ParameterValue
Guard Interval Rate1/16
FFT Size (N-FFT)128
PSK Modulation Order2 (BPSK)
Pilot Tone Placement X α [ k ] = 1 , k = 0 , 8 , 16 , , N 8
Pilot Tone ModulationBPSK (value fixed = 1 )
Carrier Frequency28,780 kHz
Pilot tones are placed on every eighth subcarrier of X α , and the same subcarriers are nulled in X β :
X α [ k ] = Pilot tone if k { 0 , 8 , 16 , , N 8 } x α , k otherwise ; X β [ k ] = 0 if k { 0 , 8 , 16 , , N 8 } x β , k otherwise .
The transmitted NOMA–OFDM vector is [15]
X NOMA = α X α + β X β .
The received frequency-domain vector is modeled as
Y = H X NOMA + N ,
where ∘ denotes the Hadamard (element-wise) product, H = [ h 0 , , h N 1 ] is the per-subcarrier channel, and N CN ( 0 , σ 2 ) is AWGN.
Channel estimation and SIC: [6,16] On pilot subcarriers k { 0 , 8 , 16 , , N 8 } ,
H ^ [ k ] = Y [ k ] X α [ k ] ,
and H ^ is obtained on data subcarriers via linear interpolation between adjacent pilots. Zero-Forcing equalization gives
Y ˜ = Y H ^ = α X α + β X β + N ,
where ⊘ denotes element-wise division. Since α β , we first detect X α , reconstruct X ˜ α , and then cancel to obtain
X ^ β = Y ˜ α X ˜ α β .

2.1. Parameter Selection Rationale and Analytical Bounds

This subsection provides the theoretical rationale behind the selected parameters ( α , β , FFT size, guard interval, and pilot spacing) and derives bounds that link the deception objective to the reliable reception of the legitimate layer.

2.1.1. PowerAllocation for Deception vs. Reliability

Let the total average symbol power be P, and define allocation coefficients α , β ( 0 , 1 ) with α + β = 1 and α β . An uninformed eavesdropper does not perform SIC; hence the high-power layer acts as structured interference when attempting to decode the low-power layer. Considering SNR = P / N 0 for the pre-allocation SNR, the instantaneous (low-power) SINR at the eavesdropper is
SINR β ( eve ) = β 2 SNR α 2 SNR + 1 .
For the legitimate receiver, SIC removes the high-power layer up to a small residual fraction ε [ 0 , 1 ) that captures channel estimation and symbol decision errors. The post-SIC SINR for the low-power layer becomes
SINR β ( legit ) = β 2 SNR ε α 2 SNR + 1 .
Let γ th denote the decoder threshold required by the chosen modulation/coding to meet the target BER. Deception requires that the eavesdropper remains below the threshold while the legitimate receiver stays above it:
SINR β ( eve ) < γ th ,
SINR β ( legit ) γ th .
Using (8)–(10) yields a window for a feasible β (given α = 1 β ):
γ th ε α 2 + 1 SNR legit β min β < γ th α 2 + 1 SNR eve β max
Feasibility requires β min < β max and β = 1 α to satisfy (11). In practice, ε is small (good SIC), so increasing α widens the deception margin (smaller SINR β ( eve ) ) but simultaneously reduces β and therefore the legitimate layer’s robustness. This formalizes the empirical trade-off observed in our measurements.
Design Recipe (Summary)
(i) Fix γ th for the selected modulation/coding and target BER. (ii) Estimate ε from pilot-aided SIC (or set a conservative bound, e.g., 20 dB). (iii) Use the expected SNR legit and the worst-case SNR eve to compute β min , β max via (11). (iv) Choose β [ β min , β max ) and set α = 1 β .

2.1.2. FFT Size, Subcarrier Spacing, and Guard Interval

With occupied bandwidth B = 8 kHz and N FFT = 128 , the subcarrier spacing is
Δ f = B N FFT = 62.5 Hz , T u = 1 Δ f = 16 ms .
We employ a guard interval (cyclic prefix) ratio of 1 / 16 , which yields
T cp = T u 16 = 1 ms , T sym = T u + T cp = 17 ms .
The choice T cp τ max ensures that the linear convolution over the HF channel (maximum excess delay τ max ) is captured as a circular convolution and prevents inter-symbol interference in FFT demodulation. In our campaign, channel sounding using the known preamble confirmed τ max 1 ms , thereby validating the 1 / 16 guard interval.

2.1.3. Pilot Placement and Channel Tracking

Pilots are inserted on every eighth subcarrier of the high-power layer and nulled on the low-power layer, i.e., { k : k = 0 , 8 , 16 , , N 8 } . This yields a frequency pilot spacing of 8 Δ f = 500 Hz . Given the symbol duration T sym = 17 ms , this density satisfies the usual sampling requirements for piecewise-smooth HF channels: the linear interpolation of H ^ [ k ] between adjacent pilots maintains MMSE within the noise floor for the measured Doppler and delay spreads, while nulling the same tones on the low-power layer minimizes inter-layer pilot contamination and improves SIC initialization.

2.1.4. Link to Reported Operating Points

The two operating points reported in Section 3 (e.g., α = 0.75 , β = 0.25 and α = 0.9 , β = 0.1 ) are consistent with (11) under the measured SNR range and small SIC residue ( ε 1 ): a larger α strengthens deception (lower SINR β ( eve ) ) but tightens the reliability margin of the legitimate layer, matching the trend seen in the BER curves versus SNR and distance.

2.2. System Configuration in High-Frequency Radio

The system consists of a mobile transmitting station and a fixed receiving station.

2.2.1. Transmitting Station

The station includes a computer, a transmitter, and an antenna [3,7,11]. The transmitter and computer are inside a car; the antenna is mounted on the car. The ICOM IC-7300 is used as the transmitter. After scanning the spectrum to find an empty channel, 28,780 kHz is selected. The IC-7300 and the computer are connected via USB; the antenna is connected to the IC-7300 via coax. The transmission station configuration is shown in Figure 2.

2.2.2. Receiving Station

The receiving station consists of an uninterruptible power supply (UPS), computer, receiver (AOR AR-5001D), software-defined radio (SDR), and antenna. The system is constructed in a hangar; the antenna is located outside near the door. Since the hangar had no electricity, a UPS is used. The receiver is tuned to 28,780 kHz. The AR-5001D provides IF output at 45 MHz; therefore an SDR is added to digitize the data and is connected to the computer via USB. The receiving station configuration is shown in Figure 3. The spectrum and signal at the receiving antenna are shown in Figure 4 in our decoder’s interface.

2.3. Application

Signals are received for distances of 0.18, 0.30, 0.55, 0.95, 1.7, 3, 5.4, 9.5, 17, and 30 km. The signal received at 5.4 km is shown in Figure 4. Every transmission is repeated 50 times for each geographic location. Measurements also show that this geographical area exhibits time-invariant channel parameters during the campaign. A known OFDM sequence is transmitted and received at each step for analyzing the channel. A Zero-Forcing equalizer is used at the receiver. The noise floor is approximately 60 dB, and an analog low-pass filter is used in the device. The distance between the receiver and transmitter is increased stepwise to compute the bit error rate (BER).

Channel Coding and Frame Configuration

In order to evaluate the performance enhancement achievable by forward error correction, convolutional channel coding with rate R = 1 / 2 was introduced into the system. A conventional constraint length K = 7 convolutional encoder with the generator polynomial set ( 171 , 133 ) 8 and a Viterbi decoder was employed, following a widely adopted trellis structure in HF modem implementations.
When convolutional coding was applied, the frame structure was adapted accordingly. The uncoded frame contained 128 data bits per layer (plus 8 pilot symbols on each side), resulting in 144 subcarriers per OFDM symbol. After the application of rate- 1 / 2 coding, all 64 input bits were encoded into 128 coded bits, preserving the same 144-subcarrier OFDM frame length while maintaining pilot allocation identical to the uncoded configuration.
Both coded and uncoded frames were transmitted under identical propagation conditions (Figure 5) to directly compare the effect of coding gain on the system’s bit error rate (BER). The same power allocation coefficients, α = 0.75 and β = 0.25 , were used to ensure fair comparison.

3. Results

BER performance versus distance (km) is analyzed for Message 1 (high-power, deception) and Message 2 (low-power, legitimate) in Figure 6. It can be seen that Message 2 can be hidden in this waveform when the transmitter and receiver are closer than 10 km. The selection of α and β is important due to the inter-layer interference between the two scaled waveforms.
In Figure 7, the theoretical and experimental BER performance results are compared for the proposed model. As expected, the high-power deceptive message exhibits a better BER than the low-power legitimate message. According to the results, this system can be used for deceiving eavesdropping systems at SNRs of 15 dB or higher.
Another comparison concerns α and β power allocation. As seen in Figure 7, there is a trade-off between increasing the power disparity and the correct reception of the legitimate waveform: the more α diverges from β , the more the BER curves separate, improving the deception feature, while the BER of the low-power message is degraded. Depending on receiver conditions, operation in high-SNR regions is preferable.
Additionally, Figure 8 highlights that very small β values may adversely affect integrity even at shorter distances.
For reference, conventional single-layer OFDM-only transmission ( β = 0 ) was also evaluated. As expected, this configuration achieved a slightly lower BER due to the absence of inter-layer interference, serving as a baseline benchmark for assessing the additional complexity and deceptive advantage introduced by NOMA.
Figure 6. BER vs. distance (km), where α = 0.75 , and β = 0.25 , with a comparison of β = 0 mode (OFDM only).
Figure 6. BER vs. distance (km), where α = 0.75 , and β = 0.25 , with a comparison of β = 0 mode (OFDM only).
Electronics 14 04323 g006
Figure 7. BER vs. SNR, where α = 0.75 , and β = 0.25 .
Figure 7. BER vs. SNR, where α = 0.75 , and β = 0.25 .
Electronics 14 04323 g007
Figure 8. BER vs. distance (km), where α = 0.9 , and β = 0.1 , with a comparison of β = 0 mode (OFDM only).
Figure 8. BER vs. distance (km), where α = 0.9 , and β = 0.1 , with a comparison of β = 0 mode (OFDM only).
Electronics 14 04323 g008
Furthermore, convolutionally coded transmissions were evaluated to quantify the coding gain relative to uncoded cases. As shown in Figure 9, the rate- 1 / 2 convolutional code provides a significant improvement in the BER, especially for the low-power legitimate message. The coded curves exhibit a reduction of approximately one order of magnitude in the BER at medium-to-high SNR levels. This result confirms that error control coding can effectively extend the reliable range of the legitimate signal without compromising the deceptive characteristics of the high-power layer.
Figure 9. Bit error rate (BER) versus distance for the proposed NOMA–OFDM link with power split α = 0.75 and β = 0.25 . The uncoded and rate- 1 / 2 convolutionally coded results are shown for both layers; coding notably lowers the BER, especially for the low-power layer at longer ranges. (Log scale; points with measured BER = 0 are omitted.)
Figure 9. Bit error rate (BER) versus distance for the proposed NOMA–OFDM link with power split α = 0.75 and β = 0.25 . The uncoded and rate- 1 / 2 convolutionally coded results are shown for both layers; coding notably lowers the BER, especially for the low-power layer at longer ranges. (Log scale; points with measured BER = 0 are omitted.)
Electronics 14 04323 g009

4. Conclusions

This study investigated the BER performance of dual-message NOMA–OFDM transmission under different power allocation factors, α and β . We showed that the low-power legitimate message can be effectively hidden within the waveform below 10 km and that increasing power disparity improves deception while degrading the legitimate layer’s BER. Consequently, the choice of α and β must balance deception strength and reliable communication, depending on the operational SNR and receiver conditions. Overall, the proposed model is practical for deceiving eavesdropping systems, particularly at SNRs of 15 dB or higher. Additionally, by incorporating a rate- 1 / 2 convolutional encoder with a ( 171 , 133 ) 8 trellis, the proposed model demonstrated substantial BER reduction for both layers compared to the uncoded configuration. The coding gain was more pronounced for the low-power layer, improving reliability at longer distances where uncoded transmission suffered from severe errors. These results indicate that combining NOMA-based power-domain superposition with forward error correction offers a practical balance between deception and robustness in HF communications. In comparison, the OFDM-only reference confirmed that the absence of power-domain superposition leads to a marginally improved BER but eliminates the system’s deception capability. Therefore, while OFDM serves as a useful benchmark for validating the performance of the proposed method, the NOMA-based dual-layer structure remains essential for combining spectral efficiency with concealment.

Author Contributions

Conceptualization, H.A.D. and K.T.; methodology, H.A.D.; software, H.A.D.; validation, H.A.D. and K.T.; formal analysis, H.A.D.; investigation, H.A.D.; resources, K.T.; data curation, H.A.D.; writing—original draft preparation, H.A.D.; writing—review and editing, K.T.; visualization, H.A.D.; supervision, K.T.; project administration, K.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

This study is derived from the Ph.D. Dissertation entitled “Integration of HF Band Communication Protocols into New OFDM Waveforms and Performance Analysis” in the Department of Electrical and Electronics Engineering, Institute of Graduate Education, Isparta University of Applied Sciences.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AWGNAdditive White Gaussian Noise
BERBit Error Rate
BPSKBinary Phase-Shift Keying
E2EEnd-to-End
FFTFast Fourier Transform
HFHigh Frequency
IFIntermediate Frequency
NOMANon-Orthogonal Multiple Access
NOMA–OFDMNOMA-Based Orthogonal Frequency-Division Multiplexing
OFDMOrthogonal Frequency-Division Multiplexing
PSKPhase-Shift Keying
SDRSoftware-Defined Radio
SICSuccessive Interference Cancellation
SNRSignal-to-Noise Ratio
TXTransmitter
RXReceiver
UPSUninterruptible Power Supply
ZFZero-Forcing (Equalizer)

References

  1. Liu, F.; Petrova, M. Dynamic power allocation for downlink multi-carrier NOMA systems. IEEE Commun. Lett. 2018, 22, 1930–1933. [Google Scholar] [CrossRef]
  2. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-orthogonal multiple access (NOMA) for cellular future radio access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013. [Google Scholar]
  3. Wang, H.; Zhang, R.; Song, R.; Leung, S.-H. A novel power minimization precoding scheme for MIMO-NOMA uplink systems. IEEE Commun. Lett. 2018, 22, 1106–1109. [Google Scholar] [CrossRef]
  4. Ye, W.; Chen, J.; Lin, B.; Tang, X.; Zhang, Y. Experimental demonstration of NOMA visible light communications based on SCFDM. In Proceedings of the 2017 16th International Conference on Optical Communications and Networks (ICOCN), Wuzhen, China, 7–10 August 2017; pp. 1–3. [Google Scholar]
  5. Li, X.; Li, C.; Jin, Y. Dynamic resource allocation for transmit power minimization in OFDM-based NOMA systems. IEEE Commun. Lett. 2016, 20, 2558–2561. [Google Scholar] [CrossRef]
  6. Kara, F.; Kaya, H. On the error performance of cooperative-NOMA with statistical CSIT. IEEE Commun. Lett. 2019, 23, 128–131. [Google Scholar] [CrossRef]
  7. Luo, S.; Teh, K.C. Adaptive transmission for cooperative NOMA system with buffer-aided relaying. IEEE Commun. Lett. 2017, 21, 937–940. [Google Scholar] [CrossRef]
  8. Lin, B.; Ye, W.; Tang, X.; Ghassemlooy, Z. Experimental demonstration of bidirectional NOMA-OFDMA visible light communications. Opt. Express 2017, 25, 4348–4355. [Google Scholar] [CrossRef] [PubMed]
  9. Richard, E.A. Performance analysis of OFDMA vs. NOMA in cognitive radio network. Int. J. Res. Appl. Sci. Eng. Technol. 2021, 9, 2483–2488. [Google Scholar] [CrossRef]
  10. Trivedi, V.; Ramadan, K.; Kumar, P.; Dessouky, M.; El-Samie, F.E. Enhanced OFDM-NOMA for next generation wireless communication: A study of PAPR reduction and sensitivity to CFO and estimation errors. AEU—Int. J. Electron. Commun. 2019, 102, 9–24. [Google Scholar] [CrossRef]
  11. Ismail, A.; Mohamedpour, K. Performance study of HF communication using NOMA over narrowband HF channel. IET Commun. 2023, 17, 1683–1690. [Google Scholar] [CrossRef]
  12. Lin, L.; Zhou, W.; Zhao, Z. Analytical modeling of NOMA-based mobile edge computing systems with randomly located users. IEEE Commun. Lett. 2020, 24, 2965–2968. [Google Scholar] [CrossRef]
  13. Song, R.; He, J. OFDM-NOMA combined with LFM signal for W-band communication and radar detection simultaneously. Opt. Lett. 2022, 47, 2931–2934. [Google Scholar] [CrossRef] [PubMed]
  14. Guo, X.; Luo, Y. Hybrid NOMA/OFDMA visible light communication system with coordinated multiple point transmission. Opt. Express 2022, 30, 47404–47420. [Google Scholar] [CrossRef] [PubMed]
  15. Li, B.; Shi, J.; Feng, S. Reconstructed hybrid optical OFDM-NOMA for multiuser VLC systems. Photonics 2022, 9, 857. [Google Scholar] [CrossRef]
  16. Saraswat, S.K.; Singh, D. Analysis of optimization of rate in power domain NOMA schemes for MIMO. In Proceedings of the 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), Mathura, India, 28–29 February 2020. [Google Scholar]
Figure 1. A system overview. Two OFDM layers at different power levels are superimposed at the same HF carrier.
Figure 1. A system overview. Two OFDM layers at different power levels are superimposed at the same HF carrier.
Electronics 14 04323 g001
Figure 2. Transmitter station setup.
Figure 2. Transmitter station setup.
Electronics 14 04323 g002
Figure 3. Receiver station setup.
Figure 3. Receiver station setup.
Electronics 14 04323 g003
Figure 4. Spectrum and received signal at the receiving antenna.
Figure 4. Spectrum and received signal at the receiving antenna.
Electronics 14 04323 g004
Figure 5. Transmitted locations and the receiving location (South Ankara, Türkiye).
Figure 5. Transmitted locations and the receiving location (South Ankara, Türkiye).
Electronics 14 04323 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dalgıç, H.A.; Taşdelen, K. Performance Analysis of Deceiving HF Eavesdropping Systems with OFDM NOMA. Electronics 2025, 14, 4323. https://doi.org/10.3390/electronics14214323

AMA Style

Dalgıç HA, Taşdelen K. Performance Analysis of Deceiving HF Eavesdropping Systems with OFDM NOMA. Electronics. 2025; 14(21):4323. https://doi.org/10.3390/electronics14214323

Chicago/Turabian Style

Dalgıç, Halil Alptuğ, and Kubilay Taşdelen. 2025. "Performance Analysis of Deceiving HF Eavesdropping Systems with OFDM NOMA" Electronics 14, no. 21: 4323. https://doi.org/10.3390/electronics14214323

APA Style

Dalgıç, H. A., & Taşdelen, K. (2025). Performance Analysis of Deceiving HF Eavesdropping Systems with OFDM NOMA. Electronics, 14(21), 4323. https://doi.org/10.3390/electronics14214323

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop