[1] |
AGIWAL M , ROY A , SAXENA N . Next generation 5G wireless networks:a comprehensive survey[J]. IEEE Communications Surveys& Tutorials, 2016,18(3): 1617-1655.
|
[2] |
DING G , WANG J , WU Q ,et al. Cellular-base-station-assisted device-to-device communications in TV white space[J]. IEEE Journal on Selected Areas in Communications, 2016,34(1): 107-121.
|
[3] |
ALAM M , DU Y , RODRIGUEZ J ,et al. Secure device-to-device communication in LTE-A[J]. IEEE Communications Magazine, 2014,52(4): 66-73.
|
[4] |
ZHU D H , SWINDLEHURST A L , FAKOORIAN S A A ,et al. Device-to-device communications:the physical layer security advantage[C]// IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP). 2014: 1606-1610.
|
[5] |
CHU Z , CUMANAN K , XU M ,et al. Robust secrecy rate optimizations for multiuser multiple-input-single-output channel with device-to-device communications[J]. IET Communications, 2015,9(3): 396-403.
|
[6] |
康小磊, 季新生, 黄开枝 . 基于人工噪声辅助的D2D异构蜂窝安全通信方法[J]. 通信学报, 2015,36(10): 149-156.
|
|
KANG X L , JI X S , HUANG K Z . Secure D2D underlaying cellular communication based on artificial noise assisted[J]. Journal on Communications, 2015,36(10): 149-156.
|
[7] |
KANG X L , JI X S , HUANG K Z ,et al. Secure D2D communication underlaying cellular networks:artificial noise assisted[C]// IEEE International Conference on Vehicular Technology (VTC). 2017: 1-5.
|
[8] |
MA C , LIU J Q , TIAN X H ,et al. Interference exploitation in D2D-enabled cellular networks:a secrecy perspective[J]. IEEE Transactions on Communications, 2015,63(1): 229-242.
|
[9] |
YUE J T , MA C , YU H ,et al. Secrecy-based channel assignment for device-to-device communication:an auction approach[C]// IEEE International Conference on Wireless Communications & Signal Processing (WCSP). 2013: 1-6.
|
[10] |
ZHANG R , CHENG X , YANG L . Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks[J]. IEEE Transactions on Wireless Communications, 2016,15(8): 5651-5663.
|
[11] |
WANG L , WU H Q , SONG M ,et al. Secrecy-oriented resource sharing for cellular device-to-device underlay[C]// IEEE International Conference on Global Communications Conference (GLOBECOM). 2015: 1-5.
|
[12] |
SUN L , DU Q H , REN P Y ,et al. Two birds with one stone:towards secure and interference-free D2D transmissions via constellation rotation[J]. IEEE Transactions on Vehicular Technology, 2016,65(10): 8767-8774.
|
[13] |
陈亚军, 季新生, 黄开枝 ,等. 基于安全中断概率的D2D安全接入策略[J]. 通信学报, 2016,37(8): 86-94.
|
|
CHEN Y J , JI X S , HUANG K Z ,et al. Secrecy-outage- probability-based access strategy for device-to-device communications underlaying cellular networks[J]. Journal on Communications, 2016,37(8): 86-94.
|
[14] |
ZHANG H , WANG T Y , SONG L Y ,et al. Radio resource allocation for physical-layer security in D2D underlay communications[C]// IEEE International Conference on Communications (ICC). 2014: 2319-2324.
|
[15] |
KANG X L , JI X S , HUANG K Z ,et al. Secure-oriented distributed access selection for D2D underlaying cellular networks[J]. Electronics letters, 2017,53(1): 32-34.
|
[16] |
WANG C , WANG H M , XIA X G ,et al. Uncoordinated jammer selection for securing SIMOME wiretap channels:a stochastic geometry approach[J]. IEEE Transactions on Wireless Communications, 2015,14(5): 2596-2612.
|
[17] |
XU X , HE B , YANG W ,et al. Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers[J]. IEEE Transactions on Information Forensics and Security, 2016,11(2): 373-387.
|
[18] |
JUNE C R , BHASKAR D R . Transmit beamforming in multiple-antenna systems with finite rate feedback:a vq-based approach[J]. IEEE Transactions on Information Theory, 2006,52(3): 1101-1112.
|
[19] |
STOYAN D , KENDALL W , MECKE J . Stochastic geometry and its applications(2nd ed)[M]. Hoboken,NJ,USA: Wiley, 1996.
|
[20] |
ALI O B S , CQARDINAL C , GAGNON F . Performance of optimum combining in a Possion field of interferes and rayleigh fading channels[J]. IEEE Transactions on Wireless Communications, 2010,9(8): 2461-2467.
|
[21] |
HAENGGI M , GANTI R K . Interference in large wireless networks[J]. Foundations and Trends in Networking, 2008,3(2): 127-248.
|
[22] |
HAENGGI M . On distances in uniformly random networks[J]. IEEE Transactions on Information Theory, 2005,51(10): 3584-3586.
|
[23] |
陈宝林 . 最优化理论与算法(第二版)[M]. 北京: 清华大学出版社, 2005.
|
|
CHEN B L . Optimization:theories and algorithms(2nd ed)[M]. Beijing: Tsinghua University Press, 2005.
|