Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective
暂无分享,去创建一个
Xiaohong Jiang | Norio Shiratori | Yulong Shen | Jia Liu | Yeqiu Xiao | Xiaohong Jiang | Jia Liu | Yulong Shen | N. Shiratori | Yeqiu Xiao
[1] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[2] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[3] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[4] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[5] Min Lin,et al. Secure transmission in multi-antenna hybrid satellite-terrestrial relay networks in the presence of eavesdropper , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[6] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[7] Fredrik Tufvesson,et al. 5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice , 2017, IEEE Journal on Selected Areas in Communications.
[8] Xiangyun Zhou,et al. Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.
[9] Donald F. Towsley,et al. Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.
[10] Robert K. Crane,et al. Propagation Handbook for Wireless Communication System Design , 2003 .
[11] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[12] Tarik Taleb,et al. Security/QoS-aware route selection in multi-hop wireless ad hoc networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[13] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[14] Symeon Papavassiliou,et al. Secrecy Capacity for Satellite Networks under Rain Fading , 2011, IEEE Transactions on Dependable and Secure Computing.
[15] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[16] João Barros,et al. Position-Based Jamming for Enhanced Wireless Secrecy , 2011, IEEE Transactions on Information Forensics and Security.
[17] Yue Gao,et al. Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[18] Dennis Roddy,et al. Satellite Communications , 1989 .
[19] Zhu Han,et al. Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications , 2015, IEEE Transactions on Information Forensics and Security.
[20] Meixia Tao,et al. Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.
[21] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[22] A. Lee Swindlehurst,et al. Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.
[23] Xiaohong Jiang,et al. SOQR: Secure Optimal QoS Routing in Wireless Ad Hoc Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[24] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[25] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[26] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[27] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[28] Riccardo De Gaudenzi,et al. MIMO over Satellite: A Review , 2011, IEEE Communications Surveys & Tutorials.
[29] Ali Abdi,et al. A new simple model for land mobile satellite channels: first- and second-order statistics , 2003, IEEE Trans. Wirel. Commun..
[30] Min Lin,et al. Average secrecy capacity of land mobile satellite wiretap channels , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[31] Hao Chen,et al. Social Tie Based Cooperative Jamming for Physical Layer Security , 2015, IEEE Communications Letters.
[32] Sastri L. Kota,et al. A survey on mobile satellite systems , 2010, Int. J. Satell. Commun. Netw..
[33] Björn E. Ottersten,et al. Physical Layer Security in Multibeam Satellite Systems , 2012, IEEE Transactions on Wireless Communications.
[34] Panayotis G. Cottis,et al. Satellite communications at KU, KA, and V bands: Propagation impairments and mitigation techniques , 2004, IEEE Communications Surveys & Tutorials.
[35] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[36] Kurt Binder,et al. Monte Carlo Simulation in Statistical Physics , 1992, Graduate Texts in Physics.
[37] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[38] Jean-Philippe Aumasson,et al. The impact of quantum computing on cryptography , 2017 .