Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer
暂无分享,去创建一个
[1] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[2] Xiaoli Chu,et al. Secure resource allocation for OFDMA two-way relay networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[3] Haijun Zhang,et al. Resource allocation for OFDMA two-way relay networks with the smart grid , 2014, 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC).
[4] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[5] A. Lee Swindlehurst,et al. Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[6] Jaesung Lim,et al. Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays , 2015, IEEE Transactions on Wireless Communications.
[7] Mohamed Ibnkahla,et al. An Accurate Approximation of the Exponential Integral Function Using a Sum of Exponentials , 2013, IEEE Communications Letters.
[8] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[9] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[10] Lifeng Wang,et al. Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[11] Toshiaki Miyazaki,et al. Antieavesdropping With Selfish Jamming in Wireless Networks: A Bertrand Game Approach , 2017, IEEE Transactions on Vehicular Technology.
[12] Eduard A. Jorswieck,et al. Secrecy in the two-way untrusted relay channel with compute-and-forward , 2015, 2015 IEEE International Conference on Communications (ICC).
[13] Ali Kuhestani,et al. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[14] Phee Lep Yeoh,et al. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[15] Masoud Ardakani,et al. Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network , 2017, IET Commun..
[16] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[17] Jun Zhao,et al. Resource Management Based on Security Satisfaction Ratio with Fairness-Aware in Two-Way Relay Networks , 2015, Int. J. Distributed Sens. Networks.
[18] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.
[19] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[20] Moslem Noori,et al. Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay , 2016, IET Commun..
[21] Victor C. M. Leung,et al. Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.
[22] Majid Moradikia,et al. EE-RS and PA for untrusted relay network at high signal-to-noise ratio regime , 2016, IET Commun..
[23] Andrew Thangaraj,et al. Secure Compute-and-Forward in , 2015 .
[24] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[25] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[26] Sennur Ulukus,et al. Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.
[27] Abbas Mohammadi,et al. Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network , 2016, IET Networks.
[28] Antonia Maria Tulino,et al. Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.
[29] Huiming Wang,et al. Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.
[30] Branka Vucetic,et al. Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation , 2009, IEEE Transactions on Wireless Communications.
[31] Jinhong Yuan,et al. Cooperative jamming protocols in two hop amplify-and-forward wiretap channels , 2013, 2013 IEEE International Conference on Communications (ICC).
[32] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[33] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[34] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[35] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..