I. Introduction
Non-orthogonal multiple access (NOMA) systems are facing serious security threats due to the broadcast and openness of wireless channels. To address security problems of NOMA systems, the existing research mainly focuses on physical layer security (PLS) technology [1]. However, PLS only protects security of communication content, which will expose the communication behavior and cause the attack from adversary. Against this background, covert communication as a promising approach has gradually attracted people’s attention [2], which aims to hide the existence of wireless transmissions.