[1] |
JANIS P , YU C H , DOPPLER K ,et al. Device-to-device communication under-laying cellular communications systems[J]. International Journal Communications Network and System Sciences, 2009,2(3): 169-178.
|
[2] |
ALAM M , DU YANG , RODRIGUEZ J ,et al. Secure device-to-device communication in LTE-A[J]. IEEE Communications Magazine, 2014,52(4): 66-73.
|
[3] |
YUE J T , MA C , YU H ,et al. Secrecy-based channel assignment for device-to-device communication:an auction approach[A]. 2013 International Conference on Wireless Communications & Signal Processing(WCSP)[C]. Hangzhou,China, 2013. 1-6.
|
[4] |
ZHU D H , SWINDLEHURST A L , FAKOORIAN S A A ,et al. Device-to-device communications:the physical layer security advantage[A]. 2014 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP)[C]. Florence, 2014. 1606-1610.
|
[5] |
ZHANG H , WANG T Y , SONG L Y ,et al. Radio resource allocation for physical-layer security in D2D underlay communications[A]. 2014 IEEE International Conference on Communications(ICC)[C]. Sydney,NSW, 2014. 2319-2324.
|
[6] |
GOEL S , NEGI R . Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008,7(6): 2180-2189.
|
[7] |
LI J Y , PETROPULU A P . On ergodic secrecy rate for gaussian MISO wiretap channels[J]. IEEE Transactions on Wireless Communications, 2011,10(4): 1176-1187.
|
[8] |
XIONG Q , GONG Y , LIANG Y C ,et al. Achieving secrecy of MISO fading wiretap channels via jamming and precoding with imperfect channel state information[J]. IEEE Wireless Communications Letters, 2014,3(4): 357-360.
|
[9] |
DONG L , HAN Z , PETROPULU A P ,et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010,58(3): 1875-1888.
|
[10] |
KHISTI A,WORNELL , GREGORY W . Secure transmission with multiple antennas—part I:the MISOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010,56(7): 3088-3104.
|