Security/QoS-aware route selection in multi-hop wireless ad hoc networks
暂无分享,去创建一个
[1] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[2] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[3] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[4] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[5] Liang Chen,et al. Secure network coding for wireless routing , 2014, 2014 IEEE International Conference on Communications (ICC).
[6] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[7] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[8] Bruce Schneier,et al. Cryptographic Design Vulnerabilities , 1998, Computer.
[9] Walid Saad,et al. Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks , 2012, IEEE Transactions on Wireless Communications.
[10] Masoud Ardakani,et al. Asymptotically-Exact Performance Bounds of AF Multi-Hop Relaying over Nakagami Fading , 2011, IEEE Transactions on Communications.
[11] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[12] Yuguang Fang,et al. On the Price of Security in Large-Scale Wireless Ad Hoc Networks , 2011, IEEE/ACM Transactions on Networking.
[13] Donald F. Towsley,et al. Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.
[14] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[15] Xiangyun Zhou,et al. Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.
[16] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[17] Ariel Orda,et al. Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers , 2015, IEEE Transactions on Mobile Computing.
[18] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.
[19] João Barros,et al. Position-Based Jamming for Enhanced Wireless Secrecy , 2011, IEEE Transactions on Information Forensics and Security.