[1] |
LI J , FENG Z , FENG Z ,et al. A survey of security issues in cognitive radio networks[J]. China Communications, 2015,12(3): 132-149.
|
[2] |
ZOU Y , ZHU J , WANG X . A survey on wireless security:technical challenges,recent advances,and future trends[J]. Proceedings of the IEEE, 2016,104(9): 1727-1765.
|
[3] |
MUKHERJEE A , FAKOORIAN S A , HUANG J ,et al. Principles of physical layer security in multiuser wireless networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2014,16(3): 1550-1573.
|
[4] |
都晨辉 . 协作网络中物理层安全关键技术研究[D]. 北京:北京邮电大学, 2014.
|
|
DU C H . Physical layer security in collaboration communications networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2014.
|
[5] |
LAI L , GAMAL H E . The relay-eavesdropper channel:cooperation for secrecy[J]. IEEE Transactions on Information Theory, 2008,54(9): 4005-4019.
|
[6] |
ZHANG J , GURSOY M . Collaborative relay beamforming for secrecy[J]. Mathematics, 2010: 1-5.
|
[7] |
GOECKEL D , VASUDEVAN S , TOWSLEY D ,et al. Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2011,29(10): 2067-2076.
|
[8] |
LIAO W , CHANG T , MA W ,et al. QoS-based transmit beamforming in the presence of eavesdroppers:an optimized artificial-noise-aided approach[J]. IEEE Transactions on Signal Processing, 2011,59(3): 1202-1216.
|
[9] |
ZOU Y , WANG X , SHEN W . Optimal relay selection for physical-layer security in cooperative wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013,31(10): 2099-2111.
|
[10] |
ZOU Y , WANG X , SHEN W . Security versus reliability analysis of opportunistic relaying[J]. IEEE Transactions on Vehicular Technology, 2014,63(6): 2653-2661.
|
[11] |
ZOU Y , ZHU J , WANG X ,et al. Improving physical-layer security in wireless communications using diversity techniques[J]. IEEE Network, 2014,29(1): 42-48.
|
[12] |
DAI B , MA Z . Multiple-access relay wiretap channel[J]. IEEE Transactions on Information Forensics and Security, 2015,10(9): 1835-184.
|
[13] |
CHEN J C , ZHANG R Q , SONG L ,et al. Joint relay and jammer selection for secure two-way relay networks[J]. IEEE Transactions on Information Forensics and Security, 2012,7(1): 310-320.
|
[14] |
DING X , SONG T , ZOU Y ,et al. Improving secrecy for multi-relay multi-eavesdropper wireless systems through relay selection[J]. Transactions on Emerging Telecommunications Technologies, 2016,27(7): 982-991.
|
[15] |
李美玲 . 基于中继的协作频谱感知性能分析及优化[J]. 通信学报, 2013,34(9): 33-40.
|
|
LI M L . Performance analysis and optimization of cooperative specterum sensing with relay[J]. Journal on Communications, 2013,34(9): 33-40.
|
[16] |
LIU T X , SONG L Y . A threshold-based hybrid relay selection scheme[C]// The Wireless Communications and Networking Conference Workshops. 2010: 1-5.
|