Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise
暂无分享,去创建一个
[1] Kaibin Huang,et al. Opportunistic Wireless Energy Harvesting in Cognitive Radio Networks , 2013, IEEE Transactions on Wireless Communications.
[2] François Baccelli,et al. An Aloha protocol for multihop mobile wireless networks , 2006, IEEE Transactions on Information Theory.
[3] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[4] Wan Choi,et al. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.
[5] Mikael Skoglund,et al. Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.
[6] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[7] Moe Z. Win,et al. Cognitive network secrecy with interference engineering , 2014, IEEE Network.
[8] Xiangyun Zhou,et al. Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.
[9] Hui Li,et al. Toward a unified elastic computing platform for smartphones with cloud support , 2013, IEEE Network.
[10] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[11] Athanasios V. Vasilakos,et al. Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[12] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[13] Shihao Yan,et al. Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.
[14] Donald F. Towsley,et al. Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.
[15] Wei Zhang,et al. Opportunistic Spectrum Sharing With Limited Feedback in Poisson Cognitive Radio Networks , 2014, IEEE Transactions on Wireless Communications.
[16] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[17] Xiangyun Zhou,et al. Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.
[18] J. L. Massey,et al. An introduction to contemporary cryptology , 1988, Proc. IEEE.
[19] Jeffrey G. Andrews,et al. The Guard Zone in Wireless Ad hoc Networks , 2007, IEEE Transactions on Wireless Communications.
[20] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[21] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[22] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.