[1] |
钟州, 张波, 戚晓慧 ,等. 多天线全双工中继辅助的异构蜂窝网物理层安全性能分析[J]. 通信学报, 2019,40(5): 24-31.
|
|
ZHONG Z , ZHANG B , QI X H ,et al. Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network[J]. Journal on Communications, 2019,40(5): 24-31.
|
[2] |
WYNER A D . The wire-tap channel[J]. Bell System Technical Journal, 1975,54(8): 1355-1387.
|
[3] |
张丽娟, 刘志宏, 张洪波 ,等. 协作干扰下的无线安全增强[J]. 通信学报, 2017,38(2): 183-195.
|
|
ZHANG L J , LIU Z H , ZHANG H B ,et al. Wireless secure enhancement with cooperative jamming[J]. Journal on Communications, 2017,38(2): 183-195.
|
[4] |
HONGLIANG H , QINGHE D , PINYI R ,et al. Joint feedback and artificial noise design for secure communications over fading channels without eavesdropper’s CSI[J]. IEEE Transactions on Vehicular Technology, 2017,66(12): 11414-11418.
|
[5] |
CHAKRABORTY P , PRAKRIYA S . Secrecy performance of an idle receiver assisted underlay secondary network[J]. IEEE Transactions on Vehicular Technology, 2017,66(10): 9555-9560.
|
[6] |
ANJOS G , CASTANHEIRA D , SILVA A ,et al. Exploiting reciprocal channel estimations for jamming to secure wireless communications[C]// 2017 Wireless Days. IEEE, 2017: 136-142.
|
[7] |
CHOI Y , LEE J H . Power allocation for cooperative jamming in amplify-and-forward relaying network with eavesdropper[C]// 2015 IEEE 81st Vehicular Technology Conference. IEEE, 2015: 1-5.
|
[8] |
KUHESTANI A , MOHAMMADI A , MOHAMMADI M . Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers[J]. IEEE Transactions on Information Forensics and Security, 2017,13(2): 341-355.
|
[9] |
HE B , NI Q , CHEN J ,et al. User-pair selection in multiuser cooperative networks with an untrusted relay[J]. IEEE Transactions on Vehicular Technology, 2019,68(1): 869-882.
|
[10] |
LEE J H . Full-duplex relay for enhancing physical layer security in multi-hop relaying systems[J]. IEEE Communications Letters, 2015,19(4): 525-528.
|
[11] |
ZHANG M , LIU Y , ZHANG R . Artificial noise aided secrecy information and power transfer in OFDMA systems[J]. IEEE Transactions on Wireless Communications, 2016,15(4): 3085-3096.
|
[12] |
王伟, 李鑫睿, 殷柳国 ,等. 联合能量收集中继与全双工目的节点的安全资源分配方案[J]. 通信学报, 2019,40(1): 114-122.
|
|
WANG W , LI X R , YIN L G ,et al. Secure resource allocation in hybird energy-harvesting relay and full-duplex receiver[J]. Journal on Communications, 2019,40(1): 114-122.
|
[13] |
SHEIKHOLESLAMI A , GOECKEL D PISHRO-NIK H . Jamming based on an ephemeral key to obtain everlasting security in wireless environments[J]. IEEE Transactions on Wireless Communications, 2015,14(11): 6072-6081.
|
[14] |
SICHITIU M L , VEERARITTIPHAN C . Simple,accurate time synchronization for wireless sensor networks[C]// Wireless Communications & Networking. IEEE, 2003: 1266-1273.
|
[15] |
DONG L , HAN Z , PETROPULU A P ,et al. Cooperative jamming for wireless physical layer security[C]// IEEE/SP Workshop on Statistical Signal Processing. IEEE, 2009: 417-420.
|
[16] |
PARK K H , WANG T , ALOUINI M S . On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming[J]. IEEE Journal on Selected Areas in Communications, 2013,31(9): 1741-1750.
|
[17] |
ZHENG G , CHOO L C , WONG K K . Optimal cooperative jamming to enhance physical layer security using relays[J]. IEEE Transactions on Signal Processing, 2011,59(3): 1317-1322.
|