[1] |
JANIS P , YU C , DOPPLER K , et al. Device-to-device communication under-laying cellular communications systems[J]. International Jounal Communications,Network and System Sciences, 2009,2(3): 169-178.
|
[2] |
DOPPLER K , RINNE M , RIBEIRO C , et al. Device to-device com-munication as an underlay to LTE-advanced networks[J]. IEEE Com-munications Magazine, 2009,47(12): 42-49.
|
[3] |
FODOR , DAHLMAN G , MILDH E , et al. Design aspects of network assisted device-to-device communications[J]. IEEE Communications.Magazine, 2012,50(3): 170-177.
|
[4] |
DOPPLER K , RINNE M P , JANIS P , et al. Device-to-device commu-nications:functional prospects for LTE-advanced networks[C]// IEEE International Conference on Communications. c2009:1-6.
|
[5] |
ALAM M , DU Y , RODRIGUEZ J , et al. Secure device-to-device communication in LTE-A[J]. IEEE Communications Magazine, 2014,52(4): 66-73.
|
[6] |
ZHU D H , SWINDLEHURST A L , FAKOORIAN S A A , et al. De-vice-to-device communications:the physical layer security advan-tage[C]// 2014 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP). c2014:1606-1610.
|
[7] |
康小磊, 季新生, 黄开枝 . 基于人工噪声辅助的D2D异构蜂窝安全通信方法[J]. 通信学报, 2015,36(10):149-156. KANG X L , JI X S , HUANG K Z . Secure D2D underlaying cellular communication based on artificial noise assisted[J]. Journal on Com-munications, 2015,36(10):149-156.
|
[8] |
YUE J , MA C , YU H , et al. Secrecy-based channel assignment for device-to-device communication:an auction approach[C]// 2013 IEEE International Conference on Wireless Communications & Signal Processing (WCSP). Hangzhou,China, c2013:1-6.
|
[9] |
LIU Z , PENG T , XIANG S , et al. Mode selection for device-to-device (D2D) communication under LTE-Advance networks[C]// 2012 IEEE International Conference on Communications (ICC). c2012:5563-5567.
|
[10] |
ZHANG R , CHENG X , YANG L . Cooperation via spectrum sharing for physical layer security in device-to-device communications under-laying cellular networks[C]// 2015 IEEE Global Communications Conference (GLOBECOM). c2015:1-6.
|
[11] |
CHU Z , CUMANAN K , XU M , et al. Robust secrecy rate optimiza-tions for multiuser multiple-input-single-output channel with de-vice-to-device communications[J]. IET Communications, 2015,9(3): 396-403.
|
[12] |
ZHANG H , WANG T Y , SONG L Y , et al. Radio resource allocation for physical-layer security in D2D underlay communications[C]// 2014 IEEE International Conference on Communications (ICC). c2014:2319-2324.
|
[13] |
KHISTI A , WORNELL G W . Secure transmission with multiple an-tennas:the MISOME channel[J]. IEEE Transactions on Information Theory, 2010,56(7): 3088-3104.
|
[14] |
ZHOU X , GANTI R K , ANDREWS J G , et al. On the throughput cost of physical layer security in decentralized wireless networks[J]. IEEE Transactions on Wireless Communications, 2011,10(8): 2764-2775.
|
[15] |
ZHOU X , MCKAY M R . Secure transmission with artificial noise over fading channels:achievable rate and optimal power allocation[J]. IEEE Transactions on Vehicular Technology, 2010,59(8): 3831-3842.
|
[16] |
BLOCH M , BARROS J , RODRIGUES M , et al. Wireless Informa-tion-theoretic Security[J]. IEEE Transactions on Information Theory, 2011,54(6): 2515-2534.
|
[17] |
BASHAR S , DING Z , LI Y . Rethinking the secrecy outage formulation:a secure transmission design perspective[J]. IEEE Transac-tions on Wireless Communications, 2011,10(4): 1212-1223.
|
[18] |
ZHOU X , MCKAY M R , MAHAM B , et al. Rethinking the secrecy outage formulation:a secure transmission design perspective[J]. IEEE Communication Letters, 2011,15(3): 302-304.
|
[19] |
ROH J C , RAO B D , MAHAM B , et al. Transmit beamforming in multiple-antenna systems with finite rate feedback:a VQ-based approach[J]. IEEE Transactions on Information Theory, 2006,52(3): 1101-1112.
|