Journal on Communications ›› 2018, Vol. 39 ›› Issue (9): 20-30.doi: 10.11959/j.issn.1000-436x.2018155
• 5G and Cognitive and Cooperative Network • Previous Articles Next Articles
Rui ZHAO1,Xing TAN1,Yuanjian LI1,Yucheng HE1,Chunguo LI2
Revised:
2018-07-15
Online:
2018-09-01
Published:
2018-10-19
Supported by:
CLC Number:
Rui ZHAO,Xing TAN,Yuanjian LI,Yucheng HE,Chunguo LI. Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination[J]. Journal on Communications, 2018, 39(9): 20-30.
[30] | ZHAO R , LIN H , HE Y C ,et al. Secrecy performance of transmit antenna selection for MIMO relay systems with outdated CSI[J]. IEEE Transactions on Communications, 2018,66(2): 546-559. |
[31] | GRADSHTEYN I S , RYZHIK I M . Table of integrals,series,and products[M]. Manhattan: Academic PressPress, 2007. |
[32] | HUANG J , SWINDLEHURST A L . Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing, 2011,59(10): 4871-4884. |
[33] | 王伟, 安立源, 章国安 ,等. 能量受限全双工双向中继系统的波束成形设计[J]. 通信学报, 2018,39(2): 43-52. |
WANG W , AN L Y , ZHANG G A ,et al. Beamforming design for energy-constrained full-duplex two-way relaying system[J]. Journal on Communications, 2018,39(2): 43-52. | |
[34] | WANG R , TAO M , LIU Y . Optimal linear transceiver designs for cognitive two-way relay networks[J]. IEEE Transactions on Signal Processing, 2013,61(4): 992-1005. |
[1] | DONG L , HAN Z , PETROPULU A P ,et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010,58(3): 1875-1888. |
[2] | ZHAO R , HUANG Y , WANG W ,et al. Ergodic achievable secrecy rate of multiple antenna relay systems with cooperative jamming[J]. IEEE Transactions on Wireless Communications, 2016,15(4): 2537-2551. |
[3] | ZHAO R , YUAN Y , FAN L ,et al. Secrecy performance analysis of cognitive decode and-forward relay networks in nakagami fading channels[J]. IEEE Transactions on Communications, 2017,65(2): 549-563. |
[4] | JEONG C , KIM I M , KIM D I . Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system[J]. IEEE Transactions on Signal Processing, 2012,60(1): 310-325. |
[5] | SUN L , ZHANG T , LI Y ,et al. Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes[J]. IEEE Transactions on Vehicular Technology, 2012,61(8): 3801-3807. |
[6] | HUANG J , MUKHERJEE A , SWIND L A L . Secure communication via an untrusted non-regenerative relay in fading channels[J]. IEEE Transactions on Signal Processing, 2013,61(10): 2536-2550. |
[7] | KIM J B , LIM J , CIOFFI J M . Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays[J]. IEEE Transactions on Wireless Communications, 2015,14(7): 3866-3876. |
[8] | KALAMKAR S S , BANERJEE A . Secure communication via a wireless energy harvesting untrusted relay[J]. IEEE Transactions on Vehicular Technology, 2017,66(3): 2199-2213. |
[9] | 邓单, 周雯 . 不可信无线中继网络中基于用户选择的安全通信研究[J]. 电子学报, 2017,45(7): 1593-1600. |
DENG D , ZHOU W . Secure selection for decode-and-forward cooperative networks with untrusted relay[J]. Acta Electronica Sinica, 2017,45(7): 1593-1600. | |
[10] | KUHESTANI A , MOHAMMADI A . Destination-based cooperative jamming in untrusted amplify-and-forward relay networks:resource allocation and performance study[J]. IET Communications, 2016,10(1): 17-23. |
[11] | WANG L , ELKASHLAN M , HUANG J ,et al. Secure transmission with optimal power allocation in untrusted relay networks[J]. IEEE Wireless Communications Letters, 2014,3(3): 289-292. |
[12] | CHEN X , CHEN J , LIU T . Secure transmission in wireless powered massive MIMO relaying systems:performance analysis and optimization[J]. IEEE Transactions on Vehicular Technology, 2016,65(10): 8025-8035. |
[13] | CHEN X , LEI L , ZHANG H ,et al. Large-scale MIMO relaying techniques for physical layer security:AF or DF[J]. IEEE Transactions on Wireless Communications, 2015,14(9): 5135-5146. |
[14] | SHARIF M , HASSIBI B . On the capacity of MIMO broadcast channels with partial side information[J]. IEEE Transactions on Information Theory, 2005,51(2): 506-522. |
[15] | ZHENG T X , WANG H M , YANG Q ,et al. Safeguarding decentralized wireless networks using full-duplex jamming receivers[J]. IEEE Transactions on Wireless Communications, 2017,16(1): 278-292. |
[16] | MASOOD M , GHRAYEB A , BABU P ,et al. A minorization- maximization algorithm for maximizing the secrecy rate of the MIMOME wiretap channel[J]. IEEE Communications Letters, 2017,21(3): 520-523. |
[17] | LI Y , ZHAO R , FAN L ,et al. Antenna mode switching for full-duplex destination-based jamming secure transmission[J]. IEEE Access, 2018,6: 9442-9453. |
[18] | YANG K , CUI H , SONG L ,et al. Efficient full-duplex relaying with joint antenna-relay selection and self-interference suppression[J]. IEEE Transactions on Wireless Communications, 2015,14(7): 3991-4005. |
[19] | ZHOU M , SONG L , LI Y ,et al. Simultaneous bidirectional link selection in full duplex MIMO systems[J]. IEEE Transactions on Wireless Communications, 2015,14(7): 4052-4062. |
[20] | LV L , CHEN J , YANG L ,et al. Improving physical layer security in untrusted relay networks:cooperative jamming and power allocation[J]. IET Communications, 2017,11(3): 393-399. |
[21] | 李博轮, 梁涛, 鲍丽娜 . 基于全双工非可信中继的物理层安全性能分析[J]. 军事通信技术, 2016,37(4): 29-33. |
LI B L , LIANG T , BAO L N . Analysis of physical layer secure scheme for untrusted full-duplex relay system[J]. Military Communications Technology, 2016,37(4): 29-33. | |
[22] | LI C G , ZHANG S , LIU P ,et al. Overhearing protocol design exploiting intercell interference in cooperative green networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(1): 441-446. |
[23] | 吴飞, 邵士海, 唐友喜 . 一种基于多天线波束成形的全双工自干扰抵消算法[J]. 电子学报, 2017,45(1): 8-15. |
WU F , SHAO S H , TANG Y X . A novel self-interference cancellation algorithm using multi-antenna beamforming in full-duplex system[J]. Acta Electronica Sinica , 2017,45(1): 8-15. | |
[24] | ZHANG Z , CHAI X , LONG K ,et al. Full duplex techniques for 5G networks:self-interference cancellation,protocol design,and relay selection[J]. IEEE Communications Magazine, 2015,53(5): 128-137. |
[25] | GUO T , WANG B , WU W ,et al. Secrecy-oriented antenna assignment optimization at full-duplex receiver with self-interference[J]. IEEE Wireless Communications Letters, 2018,PP(99):1. |
[26] | LI L , CHEN Z , ZHANG D ,et al. A full-duplex Bob in the MIMO Gaussian wiretap channel:Scheme and performance[J]. IEEE Signal Processing Letters, 2016,23(1): 107-111. |
[27] | CHEN D , CHENG Y , YANG W ,et al. Physical layer security in cognitive untrusted relay networks[J]. IEEE Access, 2018,6: 7055-7065. |
[28] | CIRIK A C , BISWAS S , VUPPALA S ,et al. Beamforming design for full-duplex MIMO interference channels-QoS and energy efficiency considerations[J]. IEEE Transactions on Communications, 2016,64(11): 4635-4651. |
[29] | BLOCH M , BARROS J , RODRIGUES M R D ,et al. Wireless information-theoretic security[J]. IEEE Transactions on Information Theory, 2008,54(6): 2515-2534. |
[1] | Yu ZHANG, Xiongwen ZHAO, Xiaoqing WANG, Suiyan GENG, Peng QIN, Zhenyu ZHOU. Robust resource allocation algorithm for multicarrier NOMA security communication system [J]. Journal on Communications, 2022, 43(3): 42-52. |
[2] | Hancheng LU, Yazheng WANG, Dan ZHAO, Tao LUO, Jun WU. Survey of physical layer security of intelligent reflecting surface-assisted wireless communication systems [J]. Journal on Communications, 2022, 43(2): 171-184. |
[3] | Xiaorong JING, Zhenyuan SONG, Wei GAO, Weijia LEI, Qianbin CHEN. Design scheme of physical layer security for intelligent reflecting surface-assisted MISO communication system [J]. Journal on Communications, 2022, 43(1): 117-126. |
[4] | Zan LI, Junfan HU, Bing LI, Jia SHI, Jiangbo SI. Secrecy analysis for orthogonal time frequency space technique based LEO satellite communication [J]. Journal on Communications, 2021, 42(8): 25-32. |
[5] | Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG. Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption [J]. Journal on Communications, 2021, 42(5): 51-62. |
[6] | Pinyi REN,Qian XU. Delay and energy minimization for MEC-based secure communication [J]. Journal on Communications, 2020, 41(11): 52-63. |
[7] | Weijia LEI,Yang ZHOU,Xianzhong XIE,Hongjiang LEI. Design of precoding matrices in MIMO full duplex two-way security communication system [J]. Journal on Communications, 2020, 41(10): 156-171. |
[8] | DENG Hao,WANG Huiming. Research on critical SNR and power allocation of artificial noise assisted secure transmission [J]. Journal on Communications, 2019, 40(6): 66-73. |
[9] | Zhou ZHONG,Bo ZHANG,Xiaohui QI,Kaizhi HUANG. Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network [J]. Journal on Communications, 2019, 40(5): 24-31. |
[10] | Bo ZHANG,Kaizhi HUANG,Zhou ZHONG,Yajun CHEN. Artificial noise-aided robust secure information and power transmission scheme in heterogeneous networks with simultaneous wireless information and power transfer [J]. Journal on Communications, 2019, 40(3): 60-72. |
[11] | Keming MA,Yajun CHEN,Xin HU,Kaizhi HUANG,Xinsheng JI. Opportunistic secure transmission scheme for simultaneous wireless information and power transfer [J]. Journal on Communications, 2019, 40(2): 70-81. |
[12] | Wenbo GUO,Changqing SONG,Rong WEN,Hongzhi ZHAO,Youx TANG. Cooperative interference power allocation in physical layer security under imperfect time synchronization [J]. Journal on Communications, 2019, 40(11): 86-93. |
[13] | Wei WANG,Xinrui LI,Liuguo YIN,Guoan ZHANG,Shibing ZHANG. Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver [J]. Journal on Communications, 2019, 40(1): 110-118. |
[14] | WANG Wei, LI Xinrui, YIN Liuguo, ZHANG Guoan, ZHANG Shibing. Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver [J]. Journal on Communications, 2018, 99(99): 1-. |
[15] | Shuaifang XIAO,Yunfei GUO,Kaizhi HUANG,Liang JIN. Cooperative secret key generation for multi-hop relaying systems in Internet of things [J]. Journal on Communications, 2018, 39(3): 86-94. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|