Physical Detection of Misbehavior in Relay Systems With Unreliable Channel State Information
暂无分享,去创建一个
[1] Tiejun Lv,et al. Detecting substitution attacks against non-colluding relays , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[2] Sang Wu Kim. Physical Integrity Check in Cooperative Relay Communications , 2015, IEEE Transactions on Wireless Communications.
[3] Helmut Bölcskei,et al. Fading relay channels: performance limits and space-time signal design , 2004, IEEE Journal on Selected Areas in Communications.
[4] Wan-Jen Huang,et al. Misbehavior Detection Without Channel Information in Cooperative Networks , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).
[5] Min Wu,et al. Tracing Malicious Relays in Cooperative Wireless Communications , 2007, IEEE Transactions on Information Forensics and Security.
[6] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[7] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[8] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[9] H.T. Sencar,et al. Cooperative diversity in the presence of a misbehaving relay : Performance analysis , 2007, 2007 IEEE Sarnoff Symposium.
[10] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[11] Wei-Ho Chung,et al. Noncoherent Detection of Misbehaving Relays in Decode-and-Forward Cooperative Networks , 2015, IEEE Communications Letters.
[12] Elza Erkip,et al. User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..
[13] Wan-Jen Huang,et al. Noncoherent misbehavior detection in space-time coded cooperative networks , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[14] Gregory W. Wornell,et al. Energy-efficient antenna sharing and relaying for wireless networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[15] M. Haardt,et al. Analysis of Multihop Relaying Networks: Communication Between Range-Limited and Cooperative Nodes , 2012, IEEE Vehicular Technology Magazine.
[16] Eric Graves,et al. Detection of channel degradation attack by Intermediary Node in Linear Networks , 2012, 2012 Proceedings IEEE INFOCOM.
[17] Gerhard Fettweis,et al. Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.
[18] Xianbin Wang,et al. Misbehavior detection in amplify-and-forward cooperative OFDM systems , 2013, 2013 IEEE International Conference on Communications (ICC).
[19] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[20] P. Takis Mathiopoulos,et al. Performance Analysis of Dual-Hop AF Relaying Systems over Mixed $\eta{-}\mu$ and $\kappa{-} \mu$ Fading Channels , 2013, IEEE Transactions on Vehicular Technology.
[21] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[22] Nasir D. Memon,et al. Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[23] Jitendra K. Tugnait,et al. Self-Contamination for Detection of Pilot Contamination Attack in Multiple Antenna Systems , 2015, IEEE Wireless Communications Letters.
[24] Panagiotis Papadimitratos,et al. Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[25] Ruohan Cao,et al. Detecting and Tracing i.i.d. Attacks in Networks With Any Number of Relays , 2016, IEEE Access.