[1] |
SUN W , LIU J , YUE Y ,et al. Double auction-based resource allocation for mobile edge computing in industrial internet of things[J]. IEEE Transactions on Industrial Informatics , 2018,14(10): 4692-4701.
|
[2] |
JAMEEL F , WYNE S , KADDOUM G ,et al. A comprehensive survey on cooperative relaying and jamming strategies for physical layer security[J]. IEEE Communications Surveys &Tutorials, 2019,21(3): 2734-2771.
|
[3] |
LIU Y , CHEN H , WANG L . Physical layer security for next generation wireless networks:theories,technologies,and challenges[J]. IEEE Communications Surveys & Tutorials, 2017,19(1): 347-376.
|
[4] |
LV L , ZHOU F , CHEN J ,et al. Secure cooperative communications with an untrusted relay:a NOMA-inspired jamming and relaying approach[J]. IEEE Transactions on Information Forensics and Security, 2019,14(12): 3191-3205.
|
[5] |
NG K , LO E , SCHOBER R . Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks[J]. IEEE Transactions on Wireless Communications, 2011,10(10): 3528-3540.
|
[6] |
DING Z , LEUNG K , GOECKEL D ,et al. On the application of cooperative transmission to secrecy communications[J]. IEEE Journal On Selected Areas in Communications, 2012,30(2): 359-368.
|
[7] |
YAN S , YANG N , LAND I ,et al. Three artificial-noise-aided secure transmission schemes in wiretap channels[J]. IEEE Transactions on Vehicular Technology, 2018,67(4): 3669-3673.
|
[8] |
ZHANG H , XING H , CHENG J ,et al. Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming[J]. IEEE Transactions on Information Forensics and Security, 2016 12(5): 1714-1725.
|
[9] |
DENG H , WANG H , GUO W ,et al. Secrecy transmission with a helper:to relay or to jam[J]. IEEE Transactions on Information Forensics and Security, 2015,10(2): 293-307.
|
[10] |
JIANG X , LIN H , ZHONG C ,et al. Proactive eavesdropping in relaying systems[J]. IEEE Signal Processing Letter, 2017,24(6): 917-921.
|
[11] |
ZOU Y L , WANG X B , SHEN W M ,et al. Security versus reliability analysis of opportunistic relaying[J]. IEEE Transactions on Vehicular Technology, 2014,63(6): 2653-2661.
|
[12] |
LIU J , LIU Z , ZENG Y ,et al. Cooperative jammer placement for physical layer security enhancement[J]. IEEE Network, 2016,30(6): 56-61.
|
[13] |
YANG L , CHEN J , JIANG H ,et al. Optimal relay selection for secure cooperative communications with an adaptive eavesdropper[J]. IEEE Transactions on Wireless Communications, 2017,16(1): 26-42.
|
[14] |
CHEN X , ZHONG C , YUEN C ,et al. Multi-antenna relay aided wireless physical layer security[J]. IEEE Communications Magazine, 2015,53(12): 40-46.
|
[15] |
LIU Y W , WANG L F , DUY T T ,et al. Relay selection for security enhancement in cognitive relay networks[J]. IEEE Wireless Communications Letters, 2015,4(1): 46-49.
|
[16] |
PEI M Y , SWINDLEHURST A L , MA D T ,et al. Adaptive limited feedback for MISO wiretap channels with cooperative jamming[J]. IEEE Transactions on Signal Processing, 2014,62(4): 993-1004.
|
[17] |
LIU Y , LI L , ALEXANDROPOULOS G ,et al. Securing relay networks with artificial noise:an error performance-based approach[J]. Entropy, 2017,19(8): 384.
|
[18] |
CUMANAN K , ALEXANDROPOULOS G , KARAGIANNIDIS . Secure communications with cooperative jamming:optimal power allocation and secrecy outage analysis[J]. IEEE Transactions on Vehicular Technology, 2017,66(8): 7495-7505.
|
[19] |
FAN L , LEI X , DUONG T Q ,et al. Secure multiuser communications in multiple amplify-and-forward relay networks[J]. IEEE Transactions on Communications, 2014,62(9): 3299-3310.
|
[20] |
JEON H , KIM N , CHOI J ,et al. Bounds on secrecy capacity over correlated ergodic fading channels at high SNR[J]. IEEE Transactions on Information Theory, 2011,57(4): 1975-1983.
|
[21] |
SUN X J , WANG J H , XU W ,et al. Performance of secure communications over correlated fading channels[J]. IEEE Signal Processing Letters, 2012,19(8): 479-482.
|
[22] |
FERDINAND N S , DA COSTA D B , DE ALMEIDA A L F ,et al. Physical layer secrecy performance of TAS wiretap channels with correlated main and eavesdropper channels[J]. IEEE Wireless Communications Letters, 2014,3(1): 86-89.
|
[23] |
FAN L S , ZHAO R , GONG F K ,et al. Secure multiple amplify-and-forward relaying over correlated fading channels[J]. IEEE Transactions on Communications, 2017,65(7): 2811-2820.
|
[24] |
FAN L , LEI X , YANG N ,et al. Secrecy cooperative networks with outdated relay selection over correlated fading channels[J]. IEEE Transactions on Vehicular Technology, 2017,66(8): 7599-7603.
|
[25] |
XU S , HAN S , DU Y ,et al. AN-aided secure beamforming design for correlated MISO wiretap channels[J]. IEEE Communications Letters, 2019,23(4): 628-631.
|
[26] |
ZHENG G , KRIKIDIS I , LI J Y ,et al. Improving physical layer secrecy using full-duplex jamming receivers[J]. IEEE Transactions on Signal Processing, 2013,61(20): 4962-4974.
|
[27] |
XU S , HAN S , MENG W X ,et al. Multiple-jammer-aided secure transmission with receiver-side correlation[J]. IEEE Transactions on Wireless Communications, 2019,18(6): 3093-3103.
|
[28] |
XU S , HAN S , MENG W X ,et al. Correlation-based secure transmission for correlated MISO wiretap channels[J]. IEEE Wireless Communications Letters, 2020,9(3): 302-305.
|
[29] |
CHARNES A , COOPER W W . Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962,9(3/4): 181-186.
|
[30] |
BOYD S , VANDENBERGHE L . Convex Optimization[M]. UK: Cambridge University Press, 2004.
|
[31] |
TANG Y Q , XIONG J , MA D T ,et al. Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty[J]. IEEE Communications Letters, 2013,17(11): 2096-2099.
|
[32] |
MA S , HONG M Y , SONG E B ,et al. Outage constrained robust secure transmission for MISO wiretap channels[J]. IEEE Transactions on Wireless Communications, 2014,13(10): 5558-5570.
|
[33] |
WANG K Y , SO A M C , CHANG T H ,et al. Outage constrained robust transmit optimization for multiuser MISO downlinks:tractable approximations by conic optimization[J]. IEEE Transactions on Signal Processing, 2014,62(21): 5690-5705.
|