Physical Layer Secure Data Transmission for Mobile Edge Computing: Beamforming and Artificial Noise
暂无分享,去创建一个
Yixin Jiang | Yonggang Zeng | Jie Tang | Hong Wen | Yunan Zhang | Aidong Xu | Li Cheng Li
[1] Guang Gong,et al. Physical layer assisted authentication for distributed ad hoc wireless sensor networks , 2010, IET Inf. Secur..
[2] Hong Wen,et al. Internet of Things Based Smart Grids Supported by Intelligent Edge Computing , 2019, IEEE Access.
[3] Yushan Li,et al. Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.
[4] Hong Wen,et al. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.
[5] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Xiaohua Li,et al. Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..
[8] Hong Wen,et al. A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT) , 2015, IEEE Transactions on Emerging Topics in Computing.
[9] Alexander M. Haimovich,et al. Performance analysis of optimum combining in wireless communications with Rayleigh fading and cochannel interference , 1998, IEEE Trans. Commun..
[10] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[11] Hong Wen,et al. Framework for MIMO cross-layer secure communication based on STBC , 2011, Telecommunication Systems.
[12] Lin Ding,et al. Cryptanalysis of Lightweight WG-8 Stream Cipher , 2014, IEEE Transactions on Information Forensics and Security.
[13] Hong Wen,et al. Physical layer assist authentication technique for smart meter system , 2013, IET Commun..
[14] Hong Wen,et al. Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.
[15] Hong Wen,et al. A framework of the PHY-layer approach to defense against security threats in cognitive radio networks , 2013, IEEE Network.
[16] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.