[1] |
WANG D , BAI B , ZHAO W B ,et al. A survey of optimization approaches for wireless physical layer security[J]. IEEE Communications Surveys & Tutorials, 2019,21(2): 1878-1911.
|
[2] |
JU Y , WANG H Y , PEI Q Q ,et al. Physical layer security in millimeter wave DF relay systems[J]. IEEE Transactions on Wireless Communications, 2019,18(12): 5719-5733.
|
[3] |
赵睿, 林鸿鑫, 贺玉成 ,等. Nakagami信道下MIMO解码转发中继系统的安全性能分析[J]. 电子与信息学报, 2016,38(8): 1913-1919.
|
|
ZHAO R , LIN H X , HE Y C ,et al. Secrecy performance analysis of MIMO decode-and-forward relay systems in Nakagami channels[J]. Journal of Electronics & Information Technology, 2016,38(8): 1913-1919.
|
[4] |
雷宏江, 张环, 刘俊杰 ,等. 解码转发中继选择系统的安全性能分析[J]. 中国科学:信息科学, 2017,47(9): 1242-1254.
|
|
LEI H J , ZHANG H , LIU J J ,et al. Security performance analysis of DF relay selection systems[J]. Scientia Sinica (Informationis), 2017,47(9): 1242-1254.
|
[5] |
冯友宏, 杨志, 丁绪星 ,等. 无线协作网络中的最优中继选择方案及中断概率分析[J]. 电信科学, 2018,34(11): 87-95.
|
|
FENG Y H , YANG Z , DING X X ,et al. Optimal relay selection scheme and outage probability analysis in cooperative wireless networks[J]. Telecommunications Science, 2018,34(11): 87-95.
|
[6] |
FENG Y H , YAN S H , YANG Z ,et al. User and relay selection with artificial noise to enhance physical layer security[J]. IEEE Transactions on Vehicular Technology, 2018,67(11): 10906-10920.
|
[7] |
任婷洁, 李光球, 程英 . 多中继与多用户选择的中继系统安全性能分析[J]. 电信科学, 2019,35(8): 111-119.
|
|
REN T J , LI G Q , CHENG Y . Secure performance analysis of relay systems with multi-relay and multi-user selection[J]. Telecommunications Science, 2019,35(8): 111-119.
|
[8] |
FARHAT J , BRANTE G , SOUZA R D . On the secure energy efficiency of TAS/MRC with relaying and jamming strategies[J]. IEEE Signal Processing Letters, 2017,24(8): 1228-1232.
|
[9] |
DING Q F , LIU M X , DENG Y Q . Secrecy outage probability analysis for full-duplex relaying networks based on relay selection schemes[J]. IEEE Access, 2019(7): 105987-105995.
|
[10] |
CHEN X M , NG D W K , GERSTACKER W H ,et al. A survey on multiple-antenna techniques for physical layer security[J]. IEEE Communications Surveys & Tutorials, 2017,19(2): 1027-1053.
|
[11] |
KIM S W . Modify-and-forward for securing cooperative relay communications[J]. arXiv:1403.655, 2014.
|
[12] |
VIEN Q T , LE T A , NGUYEN H X ,et al. A physical layer network coding based modify-and-forward with opportunistic secure cooperative transmission protocol[J]. Mobile Networks and Applications, 2019,24(2): 464-479.
|
[13] |
CHU S I . Secrecy analysis of modify-and-forward relaying with relay selection[J]. IEEE Transactions on Vehicular Technology, 2019,68(2): 1796-1809.
|
[14] |
JAKES W C . Microwave mobile communications[M]. Piscataway: IEEE Press, 1994.
|
[15] |
XIA J J , FAN L S , XU W ,et al. Secure cache-aided multi-relay networks in the presence of multiple eavesdroppers[J]. IEEE Transactions on Communications, 2019,67(11): 7672-7685.
|
[16] |
PAPOULIS A , PILLAI S U . Probability,random variables,and stochastic processes,fourth edition[Z]. 2002.
|
[17] |
ZHAO R , TAN X , CHEN D H ,et al. Secrecy performance of untrusted relay systems with a full-duplex jamming destination[J]. IEEE Transactions on Vehicular Technology, 2018,67(12): 11511-11524.
|
[18] |
GRADSHTEYN I S , RYZHIK I M . Table of integrals,series,and products chapter 14-determinants[M]. Amsterdam: Elsevier, 1980: 1108-1113.
|