Energy-Efficient Transmission Based on Direct Links: Toward Secure Cooperative Internet of Things
暂无分享,去创建一个
Yong Wang | Yida Wang | Aijun Liu | Xiaohui Shang | Qing Xie
[1] George K. Karagiannidis,et al. Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.
[2] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[3] Bin Wu,et al. Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming , 2016, 2016 IEEE International Conference on Communications (ICC).
[4] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[5] Feng Liu,et al. Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.
[6] Mikael Skoglund,et al. Outage performances for amplify-and-forward, decode-and-forward and cooperative jamming strategies for the wiretap channel , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[7] Gerhard P. Hancke,et al. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.
[8] Do-Hoon Kim,et al. Opportunistic Transmission of Nonregenerative Network With Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[9] Richard Demo Souza,et al. On the Secure Energy Efficiency of TAS/MRC With Relaying and Jamming Strategies , 2017, IEEE Signal Processing Letters.
[10] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[11] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[12] Farshad Lahouti,et al. Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.
[13] Pinyi Ren,et al. Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.
[14] Dac-Binh Ha,et al. Secrecy Performance Analysis of Energy Harvesting Wireless Sensor Networks With a Friendly Jammer , 2017, IEEE Access.
[15] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[16] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[17] Jaesung Lim,et al. Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays , 2015, IEEE Transactions on Wireless Communications.
[18] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[19] Billie F. Spencer,et al. Bridge monitoring using wireless smart sensors , 2011 .
[20] Bo Wang,et al. Secrecy Rate Maximization With Uncoordinated Cooperative Jamming by Single-Antenna Helpers Under Secrecy Outage Probability Constraint , 2015, IEEE Communications Letters.
[21] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[22] Mikael Skoglund,et al. High SNR performance of amplify-and-forward relaying in Rayleigh fading wiretap channels , 2013, 2013 Iran Workshop on Communication and Information Theory.