Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis
暂无分享,去创建一个
George K. Karagiannidis | Zhiguo Ding | K. Cumanan | George C. Alexandropoulos | G. C. Alexandropoulos | G. Karagiannidis | Z. Ding | G. Alexandropoulos | K. Cumanan
[1] George K. Karagiannidis,et al. On Secrecy Performance of Antenna-Selection-Aided MIMO Systems Against Eavesdropping , 2015, IEEE Transactions on Vehicular Technology.
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[4] Bayan S. Sharif,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.
[5] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[6] Daniel Pérez Palomar,et al. Power Control By Geometric Programming , 2007, IEEE Transactions on Wireless Communications.
[7] Stéphane Y. Le Goff,et al. Signal Mapping for Bit-Interleaved Coded Modulation Schemes to Achieve Secure Communications , 2015, IEEE Wireless Communications Letters.
[8] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[9] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[10] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[11] Ami Wiesel,et al. Maximum likelihood estimation in linear models with a Gaussian model matrix , 2006, IEEE Signal Processing Letters.
[12] Stéphane Y. Le Goff,et al. Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel , 2015, IEEE Wireless Communications Letters.
[13] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[14] Jing Huang,et al. Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.
[15] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[16] Caijun Zhong,et al. Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.
[17] H. Vincent Poor,et al. Secrecy Rate Optimization for Secure Multicast Communications , 2016, IEEE Journal of Selected Topics in Signal Processing.
[18] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[19] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[20] Gordon P. Wright,et al. Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..
[21] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[22] Björn E. Ottersten,et al. Acquiring Partial CSI for Spatially Selective Transmission by Instantaneous Channel Norm Feedback , 2008, IEEE Transactions on Signal Processing.
[23] J. Boutros,et al. On communication over fading channels , 1996, Proceedings of ICUPC - 5th International Conference on Universal Personal Communications.
[24] Trung Quang Duong,et al. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[25] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[26] Athina P. Petropulu,et al. Outage constrained secrecy rate maximization using cooperative jamming , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).
[27] Athina P. Petropulu,et al. Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.
[28] Gongpu Wang,et al. Secrecy outage probability analysis of multi-user multi-eavesdropper wireless systems , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).
[29] Yinyu Ye,et al. Interior point algorithms: theory and analysis , 1997 .
[30] Mandy Eberhart,et al. Digital Communication Over Fading Channels , 2016 .
[31] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[32] Paschalis C. Sofotasios,et al. A Comparative Study of Relaying Schemes with Decode and Forward over Nakagami-m Fading Channels , 2011, J. Comput. Networks Commun..
[33] Kin K. Leung,et al. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.