Pilot and Data Power Allocation in Poisson Interference Field with Protected Zone for Physical-Layer Security
暂无分享,去创建一个
[1] Joonhyuk Kang,et al. Physical-layer security enhancement via power allocation between pilot and data jamming , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Andreas Antoniou,et al. Practical Optimization: Algorithms and Engineering Applications , 2007, Texts in Computer Science.
[4] Yao-Win Peter Hong,et al. How much training is enough for secrecy beamforming with artificial noise , 2012, 2012 IEEE International Conference on Communications (ICC).
[5] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[6] D. Hunter,et al. A Tutorial on MM Algorithms , 2004 .
[7] Jinhong Yuan,et al. Optimization of Code Rates in SISOME Wiretap Channels , 2015, IEEE Transactions on Wireless Communications.
[8] Mounir Ghogho,et al. Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Wan Choi,et al. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.
[11] B. Shihada,et al. What should 6G be? , 2019, Nature Electronics.
[12] William H. Press,et al. Numerical recipes in Fortran 77 : the art of scientificcomputing. , 1992 .
[13] Hui-Ming Wang,et al. Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.
[14] Xiangyun Zhou,et al. Channel training design in full-duplex wiretap channels to enhance physical layer security , 2017, 2017 IEEE International Conference on Communications (ICC).
[15] Matthew R. McKay,et al. Analysis and Design of Wireless Ad Hoc Networks With Channel Estimation Errors , 2013, IEEE Transactions on Signal Processing.
[16] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[17] Naofal Al-Dhahir,et al. On the Delay/Throughput-Security Tradeoff in Wiretap TDMA Networks With Buffered Nodes , 2019, IEEE Transactions on Wireless Communications.