Proposed relay selection scheme for physical layer security in Cognitive Radio networks
暂无分享,去创建一个
S. El-Rabaie | Hefdhallah Sakran | Mona Shokair | Omar Nasr | Omar A. Nasr | El-Sayed M. El-Rabaie | Atef E. Abou-El-azm | M. Shokair | Hefdhallah Sakran | S. El-Rabaie | E. El-Rabaie | A. Abou-El-azm | Atef Abou Elazm
[1] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[2] Paul J. Kolodzy,et al. Interference temperature: a metric for dynamic spectrum utilization , 2006, Int. J. Netw. Manag..
[3] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[4] Scott L. Miller,et al. Probability and Random Processes : With Applications to Signal Processing and Communications , 2012 .
[5] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[6] Han-Chieh Chao,et al. Transaction-Pattern-Based Anomaly Detection Algorithm for IP Multimedia Subsystem , 2011, IEEE Transactions on Information Forensics and Security.
[7] J. D. T. Oliveira,et al. The Asymptotic Theory of Extreme Order Statistics , 1979 .
[8] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[9] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[10] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[11] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[12] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[13] Hongke Zhang,et al. Two LIC-Based Fast Forwarding Schemes for Explicit Routing with Scalability, Flexibility and Security , 2011 .
[14] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[15] Yiyang Pei,et al. Achieving cognitive and secure transmissions using multiple antennas , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[16] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.