[1] |
CHEN G , YU G , PEI X ,et al. Physical layer network security in the full-duplex relay system[J]. IEEE Transactions on Information Forensics & Security, 2015,10(3): 574-583.
|
[2] |
YANG S , BELFIORE J C . Towards the optimal amplify-and-forward cooperative diversity scheme[J]. IEEE Transactions on Information Theory, 2006,53(9): 3114-3126.
|
[3] |
RANKOV B , WITTNEBEN A . Spectral efficient protocols for half-duplex fading relay channels[J]. IEEE Journal on Selected Areas in Communications, 2007,25(2): 379-389.
|
[4] |
LUO C , GONG Y , ZHENG F . Full interference cancellation for two-path relay cooperative networks[J]. IEEE Transactions on Vehicular Technology, 2011,60(1): 343-347.
|
[5] |
WICAKSANA H , TING S H , GUAN Y L ,et al. Decode-and-forward two-path half-duplex relaying:diversity-multiplexing tradeoff analysis[J]. IEEE Transactions on Communications, 2011,59(7): 1985-1994.
|
[6] |
REN C , CHEN J , KUO Y ,et al. Differential successive relaying scheme for fast and reliable data delivery in vehicular ad hoc,networks[J]. IET Communications, 2015,9(8): 1088-1095.
|
[7] |
NOMIKOS N , CHARALAMBOUS T , KRIKIDIS I ,et al. A buffer-aided successive opportunistic relay selection scheme with power adaptation and inter-relay interference cancellation for cooperative diversity systems[J]. IEEE Transactions on Communications, 2014,63(5): 1623-1634.
|
[8] |
HE X , YENER A . Cooperation with an untrusted relay:a secrecy perspective[J]. IEEE Transactions on Information Theory, 2009,56(8): 3807-3827.
|
[9] |
SUN L , ZHANG T , LI Y ,et al. Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes[J]. IEEE Transactions on Vehicular Technology, 2012,61(8): 3801-3807.
|
[10] |
JEONG C , KIM I M , DONG I K . Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system[J]. IEEE Transactions on Signal Processing, 2012,60(1): 310-325.
|
[11] |
MO J , TAO M , LIU Y ,et al. Secure beamforming for MIMO two-way communications with an untrusted relay[J]. IEEE Transactions on Signal Processing, 2013,62(9): 2185-2199.
|
[12] |
JU M C , KIM D H , HWANG K S . Opportunistic transmission of nonregenerative network with untrusted relay[J]. IEEE Transactions on Vehicular Technology, 2015,64(6): 2703-2709.
|
[13] |
HUANG J , MUKHERJEE A , SWINDLEHURST A L . Secure communication via an untrusted non-regenerative relay in fading channels[J]. IEEE Transactions on Signal Processing, 2013,61(10): 2536-2550.
|
[14] |
KIM J B , LIM J , CIOFFI J M . Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays[J]. IEEE Transactions on Wireless Communications, 2015,14(7): 3866-3876.
|
[15] |
WANG W , TEH K C , LI K H . Relay selection for secure successive af relaying networks with untrusted nodes[J]. IEEE Transactions on Information Forensics & Security, 2016,11(11): 2466-2476.
|