Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
暂无分享,去创建一个
[1] Ioannis Chatzigeorgiou,et al. Rethinking the Intercept Probability of Random Linear Network Coding , 2015, IEEE Communications Letters.
[2] Shuai Chang,et al. Energy Harvesting for Physical Layer Security in Cooperative Networks Based on Compressed Sensing , 2017, Entropy.
[3] Yueming Cai,et al. Secrecy Outage Analysis of Buffer-Aided Cooperative MIMO Relaying Systems , 2018, IEEE Transactions on Vehicular Technology.
[4] Trung Q. Duong,et al. Secure Energy Harvesting Relay Networks With Unreliable Backhaul Connections , 2018, IEEE Access.
[5] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[6] Houbing Song,et al. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes , 2018, Wirel. Commun. Mob. Comput..
[7] Yan Wang,et al. Improving the Security and Spectrum Efficiency in Overlay Cognitive Full-Duplex Wireless Networks , 2019, IEEE Access.
[8] Junqing Zhang,et al. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview , 2017, Entropy.
[9] Honglin Zhao,et al. Relay Selection for Improved Security in Cognitive Relay Networks With Jamming , 2017, IEEE Wireless Communications Letters.
[10] Rose Qingyang Hu,et al. Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks , 2019, IEEE Transactions on Communications.
[11] Zhigang Cao,et al. A Rateless Coding Based Multi-Relay Cooperative Transmission Scheme for Cognitive Radio Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[12] Andreas F. Molisch,et al. Performance of Fountain Codes in Collaborative Relay Networks , 2007, IEEE Transactions on Wireless Communications.
[13] Gaofeng Pan,et al. Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.
[14] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[15] Qingqing Wu,et al. Wireless Powered Cooperative Jamming for Secure OFDM System , 2017, IEEE Transactions on Vehicular Technology.
[16] Adrish Banerjee,et al. Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[17] Shankar Prakriya,et al. Secrecy Outage Performance of a Cooperative Cognitive Relay Network , 2017, IEEE Communications Letters.
[18] Chen Sun,et al. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities , 2019, Entropy.
[19] Yueming Cai,et al. Analysis and Optimization of Wireless-Powered Cooperative Jamming for Sensor Network Over Nakagami- $m$ Fading Channels , 2019, IEEE Communications Letters.
[20] Tran Trung Duy,et al. Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming , 2019, EAI Endorsed Trans. Ind. Networks Intell. Syst..
[21] Zhenling Wang,et al. Secrecy Performance Analysis of Relay Selection in Cooperative NOMA Systems , 2019, IEEE Access.
[22] Ioannis Chatzigeorgiou,et al. Opportunistic Relaying and Random Linear Network Coding for Secure and Reliable Communication , 2018, IEEE Transactions on Wireless Communications.
[23] Tran Trung Duy,et al. Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.
[24] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[25] Chau Yuen,et al. Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.
[26] Hak-Lim Ko,et al. Secrecy Outage Performance Analysis for Cooperative NOMA Over Nakagami- $m$ Channel , 2019, IEEE Access.
[27] Jinlong Wang,et al. Secrecy Performance of Wireless Powered Communication Networks With Multiple Eavesdroppers and Outdated CSI , 2018, IEEE Access.
[28] Fuhui Zhou,et al. Performance Analysis of AF Relaying With Selection Combining in Nakagami-$m$ Fading , 2019, IEEE Systems Journal.
[29] Miroslav Voznák,et al. Secrecy Performance of Underlay Cooperative Cognitive Network Using Non-Orthogonal Multiple Access with Opportunistic Relay Selection , 2019, Symmetry.
[30] Kai-Kit Wong,et al. Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback , 2015, IEEE Transactions on Information Forensics and Security.
[31] Mohamed-Slim Alouini,et al. Secrecy Outage of Max–Min TAS Scheme in MIMO-NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.
[32] Meixia Tao,et al. Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.
[33] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[34] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[35] Ke Liu,et al. Secure Communication for Two-Way Relay Networks with Imperfect CSI , 2017, Entropy.
[36] Yueming Cai,et al. Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.
[37] S. Amari,et al. Closed-form expressions for distribution of sum of exponential random variables , 1997 .
[38] Li Sun,et al. Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.
[39] Zhongshan Zhang,et al. Secure Full-Duplex Two-Way Relaying Networks With Optimal Relay Selection , 2017, IEEE Communications Letters.
[40] Trung Q. Duong,et al. Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.
[41] Li Sun,et al. Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback , 2019, IEEE Transactions on Vehicular Technology.
[42] Mazen O. Hasna,et al. Physical Layer Security for TAS/MRC Systems With and Without Co-Channel Interference Over $\eta$–$\mu$ Fading Channels , 2018, IEEE Transactions on Vehicular Technology.
[43] Yunfei Chen,et al. On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI , 2016, IEEE Transactions on Communications.
[44] Yuan Liu,et al. Secrecy Rate Maximization With Outage Constraint in Multihop Relaying Networks , 2018, IEEE Communications Letters.
[45] Phu Tran Tin,et al. Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments , 2019, Entropy.
[46] Joong Bum Rhim,et al. Fountain Codes , 2010 .
[47] Tran Trung Duy,et al. Secondary Spectrum Access in Cognitive Radio Networks Using Rateless Codes over Rayleigh Fading Channels , 2014, Wirel. Pers. Commun..
[48] Hong-Chuan Yang,et al. Simultaneous Wireless Information and Power Transfer in Cooperative Relay Networks With Rateless Codes , 2015, IEEE Transactions on Vehicular Technology.
[49] Phu Tran Tin,et al. Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments , 2019, Entropy.
[50] Yongyi Mao,et al. Rateless coding over fading channels , 2006, IEEE Communications Letters.
[51] Mohamed-Slim Alouini,et al. On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.
[52] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[53] Yongming Huang,et al. Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems With Outdated CSI , 2018, IEEE Transactions on Communications.
[54] Ali Kuhestani,et al. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[55] Nan Yang,et al. Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks , 2016, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[56] Li Sun,et al. Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.
[58] Wei Ni,et al. Analysis on Secrecy Capacity of Cooperative Non-Orthogonal Multiple Access With Proactive Jamming , 2019, IEEE Transactions on Vehicular Technology.
[59] Le-Nam Tran,et al. On Transmission Efficiency for Wireless Broadcast Using Network Coding and Fountain Codes , 2011, IEEE Communications Letters.