[1] |
WU Y , KHISTI A , XIAO C ,et al. A survey of physical layer security techniques for 5G wireless networks and challenges ahead[J]. IEEE Journal on Selected Areas in Communications, 2018,36(4): 679-695.
|
[2] |
SHANNON C E . Communication theory of secrecy systems[J]. Bell System Technical Journal, 1948,28(4): 656-715.
|
[3] |
WYNER A D . The wire-tap channel[J]. Bell System Technical Journal, 1975,54(8): 1355-1387.
|
[4] |
CARLEIAL A B , HELLMAN M E . A note on Wyner’s wiretap channel[J]. IEEE Transactions on Information Theory, 1977,23(3): 387-390.
|
[5] |
LEUNGYC S K , HELLMAN M E . The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 1978,24(4): 451-456.
|
[6] |
BARROS J , RODRIGUES M R D . Secrecy capacity of wireless channels[C]// 2006 IEEE International Symposium on Information Theory. Piscataway:IEEE Press, 2006: 356-360.
|
[7] |
LI Z , YATES R , TRAPPE W . Secret communication with a fading eavesdropper channel[C]// 2007 IEEE International Symposium on Information Theory. Piscataway:IEEE Press, 2007: 1296-1300.
|
[8] |
BLOCH M , BARROS J , RODRIGUES M R D ,et al. An opportunistic physical-layer approach to secure wireless communications[C]// The 44th Allerton conference on Communication Control and Computing. Urbana:University of Illinois, 2006: 849-854.
|
[9] |
赵睿, 谭星, 李元健 ,等. 全双工加扰的非可信中继系统的渐近性能分析[J]. 通信学报, 2018,39(9): 20-30.
|
|
ZHAO R , TAN X , LI Y J ,et al. Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination[J]. Journal on Communications, 2018,39(9): 20-30.
|
[10] |
邓浩, 王慧明 . 人工噪声策略的临界信噪比和功率分配研究[J]. 通信学报, 2019,40(6): 66-73.
|
|
DENG H , WANG H M . Research on critical SNR and power allocation of artificial noise assisted secure transmission[J]. Journal on Communications, 2019,40(6): 66-73.
|
[11] |
SHIU D S , FOSCHINI G J , GANS M J ,et al. Fading correlation and its effect on the capacity of multielement antenna systems[J]. IEEE Transactions on Communications, 2000,48(3): 502-513.
|
[12] |
JEON H , KIM N , CHOI J ,et al. Bounds on secrecy capacity over correlated ergodic fading channels at high SNR[J]. IEEE Transactions on Information Theory, 2011,57(4): 1975-1983.
|
[13] |
SUN X , WANG J , XU W ,et al. Performance of secure communications over correlated fading channels[J]. IEEE Signal Processing Letters, 2012,19(8): 479-482.
|
[14] |
SARKAR M Z I , RATNARAJAH T . Secrecy capacity over correlated log-normal fading channel[C]// 2012 IEEE International Conference on Communications. Piscataway:IEEE Press, 2012: 883-887.
|
[15] |
LEE W C Y . Effects on correlation between two mobile radio base-station antennas[J]. IEEE Transactions on Communications, 1973,21(11): 1214-1224.
|
[16] |
JAKES W C , COX D C . Microwave mobile communications[M]. New Jersey: Wiley-IEEE Press, 1994.
|
[17] |
ZHANG X , BEAULIEU N C . Performance analysis of generalized selection combining in generalized correlated Nakagami-m fading[J]. IEEE Transactions on Communications, 2006,54(11): 2103-2112.
|
[18] |
SI J , LI Z , CHENG J ,et al. Secrecy performance of multi-antenna wiretap channels with diversity combining over correlated Rayleigh fading channels[J]. IEEE Transactions on Wireless Communications, 2019,18(1): 444-458.
|
[19] |
ZHU J X , JIANG X H , TAKAHASHI O ,et al. Secrecy capacity of correlated Rayleigh fading channels[C]// 2012 18th Asia-Pacific Conference on Communications. Piscataway:IEEE Press, 2012: 333-337.
|
[20] |
NUTTALL A H . Some integrals involving the Q_M function (Corresp)[J]. IEEE Transactions on Information Theory, 1975,21(1): 95-96.
|
[21] |
LI L , JINDAL N , GOLDSMITH A . Outage capacities and optimal power allocation for fading multiple-access channels[J]. IEEE Transactions on Information Theory, 2005,51(4): 1326-1347.
|
[22] |
BELMOUBARIK S , ANIBA G , ELGRAINI B . Secrecy capacity of a Nakagami-m fading channel in the presence of cooperative eavesdroppers[C]// Proceedings of 2014 Mediterranean Microwave Symposium. Piscataway:IEEE Press, 2014: 1-6.
|