1 |
龙航, 袁广翔, 王静 等. 物理层安全技术:研究现状与展望. 电信科学 , 2011,27(9): 60~65
|
2 |
吴越, 易平, 李建华 . 无线通信中物理层安全问题及其解决方案. 中国通信 , 2011(5): 11~19
|
3 |
杨斌, . 无线通信物理层安全技术研究. 信息网络安全 , 2012(6): 76~79
|
4 |
Negi R , Goel S . Secret communications using artificial noise. Proceedings of IEEE VTC Fall, Dallas,TX,USA, 2005: 1906~1910
|
5 |
Goel S , Negi R . Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 2008,7(6): 2180~2189
|
6 |
Tekin E , Yener A . Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy. Proceedings of Allerton Conference on Communication, Control, and Computing(ACCCC), Monticello, IL, USA, 2006
|
7 |
Dong L , Han Z , Petropulu A P , et al. Cooperative jamming for wireless physical layer security. roceedings of IEEE Workshop on Statistical Signal Processing, Cardiff, UK, 2009: 417~420
|
8 |
Krikidis I , Thompson J , Mclaughlin S . Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 2009,8(10): 5003~5011
|
9 |
Dong L , Han Z , Petropulu A P , et al. Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 2010,58(3): 1875~1888
|
10 |
Jorgensen M L , Yanakiev B R , Kirkelund G E , et al. Shout to secure: physical-layer wireless security with known interference. Proceedings of IEEE Global Telecommunication Conference, Washington DC, USA, 2007: 33~38
|
11 |
He X , Yener A . Two-hop secure communication using an untrusted relay: a case for cooperative jamming. Proceedings of IEEE GLOBECOM, New Orleans, LA, USA, 2008: 1~5
|
12 |
Ding Z , Leung K K , Goeckel D L , et al. Opportunistic relaying for secrecy communications: cooperative jamming vs relay chatting. IEEE Transactions on Wireless Communications, 2011,10(6): 1725~1729
|
13 |
Huang J , Swindlehurst K K , Goeckel A L . Secure communications via cooperative jamming in two-hop relay systems. Proceedings of IEEE GLOBECOM, Miami, Florida, USA, 2010: 1~5
|
14 |
Han Z , Marina N , Debbah M , et al. Physical layer security game: interaction between source, eavesdropper and friendly jammer. Proceedings of IEEE GLOBECOM, 2009(11)
|
15 |
Han Z , Marina N , Debbah M , et al. Physical layer security game: how to date a girl with her boyfriend on the same table. Proceedings of International Conference on Game Theory for Networks, Istanbul, Turkey, 2009: 287~294
|
16 |
Zhang R , Song L , Han Z , et al. Distributed coalition formation of relay and friendly jamme rs for secure cooperative networks. Proceedings of IEEE ICC, Kyoto, Japan, 2011: 1~6
|
17 |
Tekin E , Yener A . The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming. IEEE Transactions on Information Theory, 2008,54(6): 2735~2751
|
18 |
Lai L , El Gamal H . The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory, 2008,54(9): 4005~4019
|
19 |
Tang X , Liu R , Spasojevic P , et al. Interference-assisted secret communication. IEEE Transactions on Information Theory, 2011,57(5): 3153~3167
|
20 |
Pierrot A J , Bloch M R , Spasojevic P . Strongly secure communications over the two-way wiretap channel. IEEE Transactions on Information Forensics and Security, 2011,6(3): 595~605
|
21 |
Simeone O , Popovski M R , Spasojevic P . Secure communications via cooperating base stations. IEEE Communications Letters, 2008,12(3): 188~190
|
22 |
Popovski P , Simeone O . Wireless secrecy in cellular systems with infrastructure-aided cooperation. IEEE Transactions on Information Forensics and Security, 2009,4(2): 242~256
|
23 |
Stanojev I , Yener A . Recruiting multi-antenna transmitters as cooperative jammers: an auction-theoretic approach. Proceedings of Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 2011: 1106~1112
|
24 |
Stanojev I , Yener A . Cooperative jamming via spectrum leasing. Proceedings of International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks(WiOpt), New Jersey, USA, 2011: 265~272
|
25 |
Sheikholeslami A , Goeckel D , Pishro-Nik H , et al. Physical layer security from inter-session interference in large wireless networks. Proceedings of IEEE INFOCOM, Orlando, FL, USA, 2012: 1179~1187
|
26 |
Zhou X , McKay M R . Physical layer security with artificial noise: secrecy capacity and optimal power allocation. roceedings of International Conference on Signal Processing and Communication Systems(ICSPCS), Omaha, NE, USA, 2009: 1~5
|
27 |
Khisti A , Wornell G , Wiesel A , et al. On the Gaussian MIMO wiretap channel. Proceedings of IEEE International Symposium on Information Theory, Nice, France, 2007: 2471~2475
|
28 |
Li Z , Trappe W , Yates R . Secret communication via multi-antenna transmission. Proceedings of Annual Conference on Information Sciences and Systems(CISS), Baltimore, MD, USA, 2007: 905~910
|
29 |
Swindlehurst A L . Fixed SINR solutions for the MIMO wiretap channel. Proceedings of IEEE Int Conf on Acoustic, Speech and Signal Processing ICASSP, Taipei, Taiwan, 2009: 2437~2440
|
30 |
Krikidis I , Thompson J S , Grant P M , et al. Power allocation for cooperative-based jamming in wireless networks with secrecy constraints. Proceedings of IEEE GLOBECOM Workshops, Miami, Florida, USA, 2010: 1177~1181
|
31 |
Gabry F , Thobaben R , Skoglund M . Outage performance and power allocation for decode-and-forward relaying and cooperative jamming for the wiretap channel. Proceedings of IEEE ICC Workshops, Kyoto, Japan, 2011: 1~5
|
32 |
Dehghan M , Goeckel D , Ghaderi M , et al. Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Transactions on Wireless Communications, 2012,11(9): 3025~3029
|
33 |
Zheng G , Choo L C , Wong K K . Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing, 2011,59(3): 1317~1322
|
34 |
Fakoorian S A A , Swindlehurst A L . Secrecy capacity of MISO Gaussian wiretap channel with a cooperative jammer. Proceedings of IEEE International Workshop on Signal Processing Advances in Wireless Communications(SPAWC), San Francisco, CA, USA, 2011: 416~420
|
35 |
Fakoorian S A A , Swindlehurst A L . Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Transactions on Signal Processing, 2011,59(10): 5013~5022
|
36 |
Sun L , Zhang T , Li Y , et al. Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Transactions on Vehicular Technology, 2012,61(8): 3801~3807
|
37 |
Huang J , Swindlehurst A L . Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI. Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP), Wuhan,China, 2011: 3424~3427
|
38 |
Huang J , Swindlehurst A L . Cooperative jamming for secure communications in MIMO relay networks. IEEE Transactions on Signal Processing, 2011,59(10): 4871~4884
|
39 |
Liu Y , Petropulu A P , Poor H V . Joint decode-and-forward and jamming for wireless physical layer security with destination assistance. Proceedings of Asilomar Conference on Signals, Systems and Computers(ASILOMAR), Pacific Grove, CA, USA, 2011: 109~113
|
40 |
Chen J , Zhang R , Song L , et al. oint relay and jammer selection for secure two-way relay networks. IEEE Transactions on Information Forensics and Security, 2012,7(1): 310~320
|
41 |
Goeckel D , Vasudevan S , Towsley D , et al. Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE Journal on Selected Areas in Communications, 2011,29(10): 2067~2076
|
42 |
Ding Z , Xu M , Lu J , et al. Improving wireless security for bidirectional communication scenarios. IEEE Transactions on Vehicular Technology, 2012,61(6): 2842~2848
|
43 |
Guan X , Cai Y , Wang Y , et al. Increasing secrecy capacity via joint design of cooperative beam forming and jamming. roceedings ofIEEE InternationalSymposiumonPersonal Indoor and Mobile Radio Communications(PIMRC), Toronto,ON,Canada, 2011: 1274~1278
|