Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks
暂无分享,去创建一个
[1] Murat Uysal,et al. Cooperative diversity over log-normal fading channels: performance analysis and optimization , 2008, IEEE Transactions on Wireless Communications.
[2] Salama Ikki,et al. Performance Analysis of Cooperative Diversity Wireless Networks over Nakagami-m Fading Channel , 2007, IEEE Communications Letters.
[3] Jiangzhou Wang,et al. Chunk-Based Resource Allocation in OFDMA Systems—Part II: Joint Chunk, Power and Bit Allocation , 2012, IEEE Transactions on Communications.
[4] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[5] Aytac Azgin,et al. Cooperative MAC and routing protocols for wireless ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[6] Tung-Sang Ng,et al. Performance analysis on MIMO-OFCDM systems with multi-code transmission , 2009, IEEE Transactions on Wireless Communications.
[7] Yu-Dong Yao,et al. An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[8] Xianbin Wang,et al. Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack , 2013, 2013 IEEE International Conference on Communications (ICC).
[9] Salama Ikki,et al. Performance analysis of adaptive decode-and-forward cooperative diversity networks with best-relay selection , 2010, IEEE Transactions on Communications.
[10] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[11] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[12] Tung-Sang Ng,et al. MIMO-OFCDM systems with joint iterative detection and optimal power allocation , 2008, IEEE Transactions on Wireless Communications.
[13] Xianbin Wang,et al. Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior , 2013, Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[14] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.
[15] Aggelos Bletsas,et al. A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.
[16] M Mahalakshmi,et al. Implementing a Cooperative MAC Protocol for Wireless LANs , 2012 .
[17] Sathya Narayanan,et al. Implementing a Cooperative MAC Protocol for Wireless LANs , 2006, 2006 IEEE International Conference on Communications.
[18] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[19] Deniz Gündüz,et al. Opportunistic cooperation by dynamic resource allocation , 2007, IEEE Transactions on Wireless Communications.
[20] Lizhong Zheng,et al. Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.
[21] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[22] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[23] Andreas F. Molisch,et al. Wireless Communications , 2005 .
[24] A. Lee Swindlehurst,et al. Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[25] M. Yuksel,et al. Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.
[26] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[27] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[28] Jiangzhou Wang,et al. Chunk-based resource allocation in OFDMA systems - part I: chunk allocation , 2009, IEEE Transactions on Communications.