Physical layer security with its applications in 5G networks: A review
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[3] E. Tekin. Secrecy Sum-Rates for the Multiple-Access WireTap Channel with Ergodic Block Fading , 2007 .
[4] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[5] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[6] Joong Bum Rhim,et al. Fountain Codes , 2010 .
[7] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[8] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[9] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[10] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[11] Qian Zhang,et al. Cooperative communications based on rateless network coding in distributed MIMO systems [Coordinated and Distributed MIMO] , 2010, IEEE Wireless Communications.
[12] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[13] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.
[14] Raef Bassily,et al. Ergodic Secret Alignment , 2010, IEEE Transactions on Information Theory.
[15] Farshad Lahouti,et al. Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.
[16] Athina P. Petropulu,et al. Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.
[17] Xiangyun Zhou,et al. Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.
[18] Iain B. Collings,et al. Secrecy sum-rates with regularized channel inversion precoding under imperfect CSI at the transmitter , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[19] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[20] Li Sun,et al. Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.
[21] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[22] Xiaofeng Tao,et al. Ergodic Secrecy Sum-Rate for Downlink Multiuser MIMO Systems With Limited CSI Feedback , 2014, IEEE Communications Letters.
[23] Yuan-Pei Lin,et al. On Quantization for Masked Beamforming Secrecy Systems , 2015, IEEE Transactions on Wireless Communications.
[24] Huiming Wang,et al. Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.
[25] Do-Hoon Kim,et al. Opportunistic Transmission of Nonregenerative Network With Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[26] Li Sun,et al. Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach , 2015, IEEE Communications Letters.
[27] Xiangyun Zhou,et al. A Versatile Secure Transmission Strategy in the Presence of Outdated CSI , 2016, IEEE Transactions on Vehicular Technology.
[28] Victor C. M. Leung,et al. Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.
[29] Qimei Cui,et al. Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.
[30] Jia Zhu,et al. Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks , 2017, IEEE Transactions on Communications.
[31] Zhi Chen,et al. MIMO Secret Communications Against an Active Eavesdropper , 2016, IEEE Transactions on Information Forensics and Security.
[32] Zhu Han,et al. Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.
[33] Lajos Hanzo,et al. Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection , 2017, IEEE Transactions on Vehicular Technology.