[1] |
PINTO P C , BARROS J O , WIN M Z . Secure communication in stochastic wireless networks-part I:connectivity[J]. IEEE Trans Inf Forensics Security, 2011,7(1): 125-138.
|
[2] |
HAENGGI M , . The secrecy graph and some of its properties[C]// ISIT. 2008: 539-543.
|
[3] |
PINTO P C , BARROS J O , WIN M Z . Secure communication in stochastic wireless networks - part ii:maximum rate and collusion[J]. IEEE Trans Inf Forensics Security, 2011,7(1): 139-147.
|
[4] |
GOEL S , AGGARWAL V , YENER A ,et al. The effect of eavesdroppers on network connectivity:a secrecy graph approach[J]. IEEE Trans Inf Forensics Security, 2011,6(3): 712-724.
|
[5] |
PINTO P C , WIN M Z . Percolation and connectivity in the intrinsically secure communications graph[J]. IEEE Trans Inf Theory, 2012,58(3): 1716-1730.
|
[6] |
VILELA J P , BLOCH M , BARROS J ,et al. Wireless secrecy regions with friendly jamming[J]. IEEE Trans Inf Forensics and Security, 2011,6(2): 256-266.
|
[7] |
GOEL S , NEGI R . Guaranteeing secrecy using artificial noise[J]. IEEE Trans Wireless Communications, 2008,7(6): 2180-2189.
|
[8] |
GOECKEL D , VASUDEVAN S , TOWSLEY D ,et al. Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks[J]. IEEE J Select Areas Commun, 2011,29(10): 2067-2076.
|
[9] |
LAI L , GAMAL H E . The relay-eavesdropper channel:cooperation for secrecy[J]. IEEE Trans Inf Theory, 2008,54(9): 4005-4019.
|
[10] |
TEKIN E , YENER A . The general Gaussian multiple-access and two-way wire-tap channels:achievable rates and cooperative jamming[J]. IEEE Trans.Inf.Theory, 2008,54(6): 2735-2751.
|
[11] |
HE X , YENER A . Securing wireless communications at the physical layer,chapter cooperative jamming:the tale of friendly interference for secrecy[M]. New York: SpringerPress, 2009: 65-88.
|
[12] |
GOLLAKOTA S , HASSANIEH H , RANSFORD B ,et al. They can hear your heartbeats:non-invasive security for implantable medical devices[C]// In ACM SIGCOMM, 2011: 2-13.
|
[13] |
MARTINOVIC I , PICHOTA P , SCHMITT J B . Jamming for good:a fresh approach to authentic communication in WSNs[C]// ACM WiSec. 2009: 161-168.
|
[14] |
WILHELM M , MARTINOVIC I , SCHMITT J ,et al. WiFire:a firewall for wireless networks[C]// In ACM SIGCOMM. New York,NY,USA, 2011: 456-457.
|
[15] |
BERGER D S , GRINGOLI F , FACCHI N ,et al. Gaining insight on friendly jamming in a real-world IEEE 802.11 network[C]// ACM WiSec'14, 2014: 23-25.
|
[16] |
AGATAY C , APAR C , GOECKEL D ,et al. Secret communication in large wireless networks without eavesdropper location information[C]// Proc INFOCOM. 2012: 1152-1160.
|
[17] |
KOYLUOGLU O , KOKSAL C , GAMAL H E . On the secrecy capacity scaling in wireless networks[J]. IEEE Trans Inf Theory, 2012,58(11): 3000-3015.
|
[18] |
CHIU S N , STOYAN D , KENDALL W S ,et al. Stochastic geometry and its applications,third edition[M]. John Wiley & Sons,Ltd, 2013.
|
[19] |
HAN B , LI J . Secrecy capacity maximization for secure cooperative ad-hoc networks[C]// In INFOCOM,2013 Proceedings IEEE, 2013: 2796-2804.
|
[20] |
HAENGGI M . On distances in uniformly random networks[J]. IEEE Trans Inf Theory, 2005,51(10): 3584-3586.
|
[21] |
GOECKEL D , CAPAR C , TOWSLEY D . Physical layer security in wireless communications,chapter physical layer secrecy in large multihop wireless networks[M]. CRC Press, 2014: 271-285.
|
[22] |
LAI L , GAMAL H E , POOR H V . The wiretap channel with feedback:encryption over the channel[J]. IEEE Trans Inf Theory, 2008,54(11): 5059-5067.
|