[1] |
WYNER A D . The wiretap channel[J]. Bell Syst.Tech.J., 1975,54(8): 1355-1387.
|
[2] |
>LEUNG-YAN-LEUNG-YAN-CHEONG S K , HELLMAN M E . The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978,24(4): 451-456.
|
[3] |
CSISZAR I , KORNER J . Broadcast channels with confidential messages[J]. IEEE Transactions on Information Theory, 1978,24(3): 339-348.
|
[4] |
LAI L , GAMAL H E . The relay-eavesdropper channel:cooperation for secrecy[J]. IEEE Transactions on Information Theory, 2008,54(9): 4005-4019.
|
[5] |
EKREM E , ULUKUS S . Secrecy in cooperative relay broadcast channels[J]. IEEE Transactions on Information Theory, 2011,57(1): 137-155.
|
[6] |
DONG L , HAN Z , PETROPULU A P ,et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010,58(3): 1875-1888.
|
[7] |
韩帅, 台祥雪, 孟维晓 . 空天地通信网络的物理层安全系统模型与关键技术[J]. 电信科学, 2018,34(3): 23-31.
|
|
HAN S , TAI X X , MENG W X . Physical layer security for the air-space-ground communication networks[J]. Telecommunications Science, 2018,34(3): 23-31.
|
[8] |
LANWMAN J N , TSE D N C , WORNELL G W . Cooperative diversity in wireless networks:efficient protocols and outage behavior[J]. IEEE Transactions on Information Theory, 2004,50(12): 3062-3080.
|
[9] |
BLETSA A , SHIN H , WIN M Z . Cooperative communications with outage-optimal opportunistic relaying[J]. IEEE Transactions on Wireless Communications, 2007,6(9): 3450-3460.
|
[10] |
ZOU Y , WANG X , SHEN W . Optimal relay selection for physical-layer security in cooperative wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013,31(10): 2099-2111.
|
[11] |
ZOU Y , WANG X , SHEN W . Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack[C]// The 2013 IEEE Internation Conference on Communications,June 7-9,2013,Budapest,Hungary. Piscataway:IEEE Press, 2013.
|
[12] |
BAO V N Q , LINH T N , DEBBAH M . Realy selection schemes for dual-hop networks under security constraints with multiple eavesdroppers[J]. IEEE Transactions on Wireless Communications, 2013,12(12): 6076-6085.
|
[13] |
周巍, 高锐锋, 吉晓东 ,等. 基于协作干扰的全双工中继系统混合安全传输协议[J]. 电信科学, 2017,33(1): 16-23.
|
|
ZHOU W , GAO R F , JI X D ,et al. A hybrid cooperative jamming protocol for full-duplex relay wiretap system[J]. Telecommunications Science, 2017,33(1): 16-23.
|
[14] |
JU M C , HWANG K S , SONG H K . Relay selection of cooperative diversity networks with interference-limited destination[J]. IEEE Transactions on Vehicular Technology, 2013,62(9): 4658-4665.
|
[15] |
赵耀环, 谢梦非, 尚勇 . 物理层安全中的最优中继选择及协同干扰策略[J]. 电子学报, 2015,43(4): 791-794.
|
|
ZHAO Y H , XIE M F , SHANG Y . Cooperative Jamming with optimal relay selection and power allocation for physical layer security[J]. Acta Electronica Sinica, 2015,43(4): 791-794.
|
[16] |
阳俐君, 曹张华, 张士兵 ,等. 单窃听双跳协作网络的中继选择方案及其性能分析[J]. 重庆邮电大学学报(自然科学版), 2016,28(5): 648-657.
|
|
YANG L J , CAO Z H , ZHANG S B ,et al. Relay selection schemes for dual-hop cooperative networks with an eavesdropper and their performance analysis[J]. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition), 2016,28(5): 648-657.
|
[17] |
YANG L , CHEN J , JIANG H ,et al. Optimal relay selection for secure cooperative communications with an adaptive eavesdropper[J]. IEEE Transactions on Wireless Communications, 2017,16(1): 26-41.
|