Joint PHY/MAC Layer Security Design Using ARQ With MRC and Null-Space Independent PAPR-Aware Artificial Noise in SISO Systems
暂无分享,去创建一个
[1] Yichen Wang,et al. Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks , 2017, IEEE Access.
[2] Chen-Mou Cheng,et al. Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.
[3] Jinho Choi,et al. On Channel-Aware Secure HARQ-IR , 2017, IEEE Transactions on Information Forensics and Security.
[4] Hüseyin Arslan,et al. Cyclic feature suppression for physical layer security , 2017, Phys. Commun..
[5] Haji M. Furqan,et al. Secure pre-coding and post-coding for OFDM systems along with hardware implementation , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[6] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[7] Haji M. Furqan,et al. Secret key generation using channel quantization with SVD for reciprocal MIMO channels , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).
[8] Jehad M. Hamamreh,et al. Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[9] Yong Xi,et al. Packet Error Rate Analysis and Power Allocation for CC-HARQ Over Rayleigh Fading Channels , 2014, IEEE Communications Letters.
[10] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[11] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[12] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[13] Yi Hong,et al. Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.
[14] Dimitris A. Pados,et al. Hybrid-ARQ as a communications security measure , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[15] Jehad M. Hamamreh,et al. A practical physical-layer security method for precoded OSTBC-based systems , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[16] Erik G. Larsson,et al. Optimal Power Allocation for Hybrid ARQ with Chase Combining in i.i.d. Rayleigh Fading Channels , 2013, IEEE Transactions on Communications.
[17] Hüseyin Arslan,et al. Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[18] Chan Wong Wong,et al. Secret sharing in fast fading channels based on reliability-based hybrid ARQ , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[19] Chong-Yung Chi,et al. Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.
[20] Leszek Szczecinski,et al. Secrecy & Rate Adaptation for secure HARQ protocols , 2013, 2013 IEEE Information Theory Workshop (ITW).
[21] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[22] Jehad M. Hamamreh,et al. OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.
[23] Jehad M. Hamamreh,et al. On physical-layer concepts and metrics in secure signal transmission , 2017, Phys. Commun..
[24] Jehad M. Hamamreh,et al. Secure Orthogonal Transform Division Multiplexing (OTDM) Waveform for 5G and Beyond , 2017, IEEE Communications Letters.
[25] Nicola Laurenti,et al. Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis , 2014, IEEE Transactions on Information Forensics and Security.
[26] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[27] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[28] Pierre Duhamel,et al. Rate-adaptive secure HARQ protocol for block-fading channels , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[29] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[30] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[31] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[32] Arafat J. Al-Dweik,et al. Low Complexity Power Optimization Algorithm for Multimedia Transmission Over Wireless Networks , 2015, IEEE Journal of Selected Topics in Signal Processing.
[33] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.