Secrecy outage of a multi-relay cooperative communication network with accumulation of harvesting energy at relays
暂无分享,去创建一个
[1] Hang Long,et al. Secure communication design for multi-user peer-to-peer wireless relay networks , 2016, IET Commun..
[2] A. Lee Swindlehurst,et al. Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.
[3] Zhongbao Zhang,et al. Exploration of influential people for viral marketing , 2018, China Communications.
[4] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[5] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.
[6] Rahim Tafazolli,et al. Full-Duplex Wireless-Powered Relay in Two Way Cooperative Networks , 2017, IEEE Access.
[7] Yueming Cai,et al. Secure Downlink Transmission in the Internet of Things: How Many Antennas Are Needed? , 2018, IEEE Journal on Selected Areas in Communications.
[8] Tiecheng Song,et al. Security-Reliability Tradeoff for Friendly Jammer Assisted User-Pair Selection in the Face of Multiple Eavesdroppers , 2016, IEEE Access.
[9] Li Sun,et al. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.
[10] He Chen,et al. Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[11] Yao Xu,et al. Performance analysis of physical layer security over α-η-κ-μ fading channels , 2018, China Communications.
[12] Zhongming Zheng,et al. RNP-SA: Joint Relay Placement and Sub-Carrier Allocation in Wireless Communication Networks with Sustainable Energy , 2012, IEEE Transactions on Wireless Communications.
[13] Cheng-Xiang Wang,et al. Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.
[14] Chakchai So-In,et al. Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy , 2018, IEEE Access.
[15] Yunfei Chen,et al. Performance analysis of energy harvesting communications using multiple time slots , 2019, IET Commun..
[16] Xilong Liu,et al. Green Relay Assisted D2D Communications With Dual Batteries in Heterogeneous Cellular Networks for IoT , 2017, IEEE Internet of Things Journal.
[17] Tho Le-Ngoc,et al. Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols , 2015, IEEE Transactions on Information Forensics and Security.
[18] Kamel Tourki,et al. AN-Aided Relay-Selection Scheme for Securing Untrusted RF-EH Relay Systems , 2017, IEEE Transactions on Green Communications and Networking.
[19] Cong Wang,et al. Combining Solar Energy Harvesting with Wireless Charging for Hybrid Wireless Sensor Networks , 2018, IEEE Transactions on Mobile Computing.
[20] Juan Xu,et al. Optimised power allocation to maximise secure rate in energy harvesting relay network , 2016 .
[21] Ling Tang,et al. Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization , 2016, IEEE Wireless Communications Letters.
[22] Jian Chen,et al. Cooperative jamming for energy harvesting multicast networks with an untrusted relay , 2017, IET Commun..
[23] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[24] Yupeng Liu,et al. Destination assisted cooperative jamming for wireless physical layer security , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[25] Biplab Sikdar,et al. An Energy and Delay Aware Downlink Power Control Strategy for Solar Powered Base Stations , 2016, IEEE Communications Letters.