[1] |
KARALOPOULOS S V . A primer on cryptography in communications[J]. IEEE Communications Magazine, 2006,44(4): 146-151.
|
[2] |
MUKHERJEE A , FAKOORIAN S A A , HUANG J ,et al. Principles of physical layer security in multiuser wireless networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2014,16(3): 1550-1573.
|
[3] |
ZOU Y , ZHU J , WANG X ,et al. Improving physical-layer security in wireless communications using diversity techniques[J]. IEEE Network, 2015,29(1): 42-48.
|
[4] |
MANU , GOEL A , . Encryption algorithm using dual modulus[C]// 2017 IEEE the 3rd International Conference on Computational Intelligence & Communication Technology (CICT),February 9-10,2017,Ghaziabad,India. Piscataway:IEEE Press, 2017: 1-4.
|
[5] |
SHANNON C E . Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949,28(4): 656-715.
|
[6] |
WYNER A D . The wire-tap channel[J]. The Bell System Technical Journal, 1975,54(8): 1355-1387.
|
[7] |
LEUNG-YAN-ChEONG S K , HELLMAN M E . The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 1978,24(4): 451-456.
|
[8] |
ZHUANG Y , LAMPE L . Physical layer security in MIMO power line communication networks[C]// 2011 the 18th IEEE International Symposium on Power Line Communications and its Applications,March 30-April 2,2014,Glasgow,UK. Piscataway:IEEE Press, 2014: 272-277.
|
[9] |
ZOU Y , ZHU J , WANG X ,et al. A survey on wireless security:technical challenges,recent advances,and future trends[J]. Proceedings of the IEEE, 2016,104(9): 1727-1765.
|
[10] |
ZOU Y , WANG X , SHEN W . Optimal relay selection for physical-layer security in cooperative wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013,31(10): 2099-2111.
|
[11] |
ZHU J , ZOU Y , CHAMPAGNE B ,et al. Security-reliability tradeoff analysis of multi-relay-aided decode-and-forward cooperation systems[J]. IEEE Transactions on Vehicular Technology, 2016,65(7): 5825-5831.
|
[12] |
ZOU Y , WANG X , SHEN W ,et al. Security versus reliability analysis of opportunistic relaying[J]. IEEE Transactions on Vehicular Technology, 2014,63(6): 2653-2661.
|
[13] |
ZOU Y , ZHU J , LI X ,et al. Relay selection for wireless communications against eavesdropping:a security reliability tradeoff perspective[J]. IEEE Network, 2016,30(9): 74-79.
|
[14] |
HUANG H , SUN W , YANG J ,et al. Relay selections for security and reliability in mobile communication networks over Nakagami-m fading channels[J]. Security and Communication Networks, 2017: 1-8.
|
[15] |
YUAN Y , ZHAO R,LIN , et al . Secrecy outage probability of cognitive decode-and-forward relay networks[C]// 2016 IEEE International Conference on Communications Workshops (ICCW),May 23-27,2016,Kuala Lumpur,Malaysia. Piscataway:IEEE Press, 2016: 260-265.
|