[30] |
ZHAO R , LIN H , HE Y C ,et al. Secrecy performance of transmit antenna selection for MIMO relay systems with outdated CSI[J]. IEEE Transactions on Communications, 2018,66(2): 546-559.
|
[31] |
GRADSHTEYN I S , RYZHIK I M . Table of integrals,series,and products[M]. Manhattan: Academic PressPress, 2007.
|
[32] |
HUANG J , SWINDLEHURST A L . Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing, 2011,59(10): 4871-4884.
|
[33] |
王伟, 安立源, 章国安 ,等. 能量受限全双工双向中继系统的波束成形设计[J]. 通信学报, 2018,39(2): 43-52.
|
|
WANG W , AN L Y , ZHANG G A ,et al. Beamforming design for energy-constrained full-duplex two-way relaying system[J]. Journal on Communications, 2018,39(2): 43-52.
|
[34] |
WANG R , TAO M , LIU Y . Optimal linear transceiver designs for cognitive two-way relay networks[J]. IEEE Transactions on Signal Processing, 2013,61(4): 992-1005.
|
[1] |
DONG L , HAN Z , PETROPULU A P ,et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010,58(3): 1875-1888.
|
[2] |
ZHAO R , HUANG Y , WANG W ,et al. Ergodic achievable secrecy rate of multiple antenna relay systems with cooperative jamming[J]. IEEE Transactions on Wireless Communications, 2016,15(4): 2537-2551.
|
[3] |
ZHAO R , YUAN Y , FAN L ,et al. Secrecy performance analysis of cognitive decode and-forward relay networks in nakagami fading channels[J]. IEEE Transactions on Communications, 2017,65(2): 549-563.
|
[4] |
JEONG C , KIM I M , KIM D I . Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system[J]. IEEE Transactions on Signal Processing, 2012,60(1): 310-325.
|
[5] |
SUN L , ZHANG T , LI Y ,et al. Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes[J]. IEEE Transactions on Vehicular Technology, 2012,61(8): 3801-3807.
|
[6] |
HUANG J , MUKHERJEE A , SWIND L A L . Secure communication via an untrusted non-regenerative relay in fading channels[J]. IEEE Transactions on Signal Processing, 2013,61(10): 2536-2550.
|
[7] |
KIM J B , LIM J , CIOFFI J M . Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays[J]. IEEE Transactions on Wireless Communications, 2015,14(7): 3866-3876.
|
[8] |
KALAMKAR S S , BANERJEE A . Secure communication via a wireless energy harvesting untrusted relay[J]. IEEE Transactions on Vehicular Technology, 2017,66(3): 2199-2213.
|
[9] |
邓单, 周雯 . 不可信无线中继网络中基于用户选择的安全通信研究[J]. 电子学报, 2017,45(7): 1593-1600.
|
|
DENG D , ZHOU W . Secure selection for decode-and-forward cooperative networks with untrusted relay[J]. Acta Electronica Sinica, 2017,45(7): 1593-1600.
|
[10] |
KUHESTANI A , MOHAMMADI A . Destination-based cooperative jamming in untrusted amplify-and-forward relay networks:resource allocation and performance study[J]. IET Communications, 2016,10(1): 17-23.
|
[11] |
WANG L , ELKASHLAN M , HUANG J ,et al. Secure transmission with optimal power allocation in untrusted relay networks[J]. IEEE Wireless Communications Letters, 2014,3(3): 289-292.
|
[12] |
CHEN X , CHEN J , LIU T . Secure transmission in wireless powered massive MIMO relaying systems:performance analysis and optimization[J]. IEEE Transactions on Vehicular Technology, 2016,65(10): 8025-8035.
|
[13] |
CHEN X , LEI L , ZHANG H ,et al. Large-scale MIMO relaying techniques for physical layer security:AF or DF[J]. IEEE Transactions on Wireless Communications, 2015,14(9): 5135-5146.
|
[14] |
SHARIF M , HASSIBI B . On the capacity of MIMO broadcast channels with partial side information[J]. IEEE Transactions on Information Theory, 2005,51(2): 506-522.
|
[15] |
ZHENG T X , WANG H M , YANG Q ,et al. Safeguarding decentralized wireless networks using full-duplex jamming receivers[J]. IEEE Transactions on Wireless Communications, 2017,16(1): 278-292.
|
[16] |
MASOOD M , GHRAYEB A , BABU P ,et al. A minorization- maximization algorithm for maximizing the secrecy rate of the MIMOME wiretap channel[J]. IEEE Communications Letters, 2017,21(3): 520-523.
|
[17] |
LI Y , ZHAO R , FAN L ,et al. Antenna mode switching for full-duplex destination-based jamming secure transmission[J]. IEEE Access, 2018,6: 9442-9453.
|
[18] |
YANG K , CUI H , SONG L ,et al. Efficient full-duplex relaying with joint antenna-relay selection and self-interference suppression[J]. IEEE Transactions on Wireless Communications, 2015,14(7): 3991-4005.
|
[19] |
ZHOU M , SONG L , LI Y ,et al. Simultaneous bidirectional link selection in full duplex MIMO systems[J]. IEEE Transactions on Wireless Communications, 2015,14(7): 4052-4062.
|
[20] |
LV L , CHEN J , YANG L ,et al. Improving physical layer security in untrusted relay networks:cooperative jamming and power allocation[J]. IET Communications, 2017,11(3): 393-399.
|
[21] |
李博轮, 梁涛, 鲍丽娜 . 基于全双工非可信中继的物理层安全性能分析[J]. 军事通信技术, 2016,37(4): 29-33.
|
|
LI B L , LIANG T , BAO L N . Analysis of physical layer secure scheme for untrusted full-duplex relay system[J]. Military Communications Technology, 2016,37(4): 29-33.
|
[22] |
LI C G , ZHANG S , LIU P ,et al. Overhearing protocol design exploiting intercell interference in cooperative green networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(1): 441-446.
|
[23] |
吴飞, 邵士海, 唐友喜 . 一种基于多天线波束成形的全双工自干扰抵消算法[J]. 电子学报, 2017,45(1): 8-15.
|
|
WU F , SHAO S H , TANG Y X . A novel self-interference cancellation algorithm using multi-antenna beamforming in full-duplex system[J]. Acta Electronica Sinica , 2017,45(1): 8-15.
|
[24] |
ZHANG Z , CHAI X , LONG K ,et al. Full duplex techniques for 5G networks:self-interference cancellation,protocol design,and relay selection[J]. IEEE Communications Magazine, 2015,53(5): 128-137.
|
[25] |
GUO T , WANG B , WU W ,et al. Secrecy-oriented antenna assignment optimization at full-duplex receiver with self-interference[J]. IEEE Wireless Communications Letters, 2018,PP(99):1.
|
[26] |
LI L , CHEN Z , ZHANG D ,et al. A full-duplex Bob in the MIMO Gaussian wiretap channel:Scheme and performance[J]. IEEE Signal Processing Letters, 2016,23(1): 107-111.
|
[27] |
CHEN D , CHENG Y , YANG W ,et al. Physical layer security in cognitive untrusted relay networks[J]. IEEE Access, 2018,6: 7055-7065.
|
[28] |
CIRIK A C , BISWAS S , VUPPALA S ,et al. Beamforming design for full-duplex MIMO interference channels-QoS and energy efficiency considerations[J]. IEEE Transactions on Communications, 2016,64(11): 4635-4651.
|
[29] |
BLOCH M , BARROS J , RODRIGUES M R D ,et al. Wireless information-theoretic security[J]. IEEE Transactions on Information Theory, 2008,54(6): 2515-2534.
|