Cooperative jamming for energy harvesting multicast networks with an untrusted relay
暂无分享,去创建一个
[1] Jianfeng Ma,et al. Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[2] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[4] Huiming Wang,et al. Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.
[5] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[6] Rui Zhang,et al. Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.
[7] Abbas Mohammadi,et al. Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network , 2016, IET Networks.
[8] He Chen,et al. Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[9] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[10] Michele Zorzi,et al. Achievable Secrecy Rates of an Energy Harvesting Device , 2016, IEEE Journal on Selected Areas in Communications.
[11] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..
[12] Dongtang Ma,et al. Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.
[13] H. Vincent Poor,et al. Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel , 2016, IEEE Transactions on Information Theory.
[14] Adrish Banerjee,et al. Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[15] Mansoor Shafi,et al. Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge , 2010, IEEE Transactions on Vehicular Technology.
[16] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[17] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[18] Zhu Han,et al. Physical Layer Security for Two Way Relay Communications with Friendly Jammers , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[19] Jing Wang,et al. Cooperative jamming and power allocation with untrusty two-way relay nodes , 2014, IET Commun..
[20] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[21] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .
[22] Zhu Han,et al. Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach , 2016, IEEE Transactions on Communications.
[23] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[24] Jeffrey G. Andrews,et al. Multicast Outage Probability and Transmission Capacity of Multihop Wireless Networks , 2011, IEEE Transactions on Information Theory.
[25] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[26] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[27] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[28] Ioannis Krikidis,et al. Relay Selection in Wireless Powered Cooperative Networks With Energy Storage , 2015, IEEE Journal on Selected Areas in Communications.
[29] Xudong Wang,et al. Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.
[30] Tran Trung Duy,et al. Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.
[31] Yaming Wang,et al. Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.
[32] Minyi Guo,et al. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.
[33] Naofal Al-Dhahir,et al. Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks , 2016, IEEE Wireless Communications Letters.
[34] Lu Lv,et al. Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation , 2017, IET Commun..
[35] Anthony Ephremides,et al. On the Stability of Random Multiple Access With Stochastic Energy Harvesting , 2015, IEEE Journal on Selected Areas in Communications.
[36] Zhiguo Ding,et al. Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[37] Hai Jiang,et al. Cooperative Wireless Multicast: Performance Analysis and Time Allocation , 2016, IEEE Transactions on Vehicular Technology.
[38] Yupeng Liu,et al. Destination assisted cooperative jamming for wireless physical layer security , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[39] Salman Durrani,et al. Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.
[40] Do-Hoon Kim,et al. Opportunistic Transmission of Nonregenerative Network With Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.