Adaptive Wireless-Powered Relaying Schemes With Cooperative Jamming for Two-Hop Secure Communication
暂无分享,去创建一个
[1] Miodrag Potkonjak,et al. Security of IoT systems: Design challenges and opportunities , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[2] Saman Atapattu,et al. Optimal Energy Harvesting Protocols for Wireless Relay Networks , 2016, IEEE Transactions on Wireless Communications.
[3] Mohamed-Slim Alouini,et al. On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.
[4] Gordon L. Stüber,et al. Channel Estimation for Amplify and Forward Relay Based Cooperation Diversity Systems , 2007, IEEE Transactions on Wireless Communications.
[5] Kai-Kit Wong,et al. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.
[6] Salman Durrani,et al. Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.
[7] Zhu Han,et al. Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.
[8] A. Lee Swindlehurst,et al. Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.
[9] Ali A. Nasir,et al. Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.
[10] Yong Li,et al. Joint Power Splitting and Antenna Selection in Energy Harvesting Relay Channels , 2015, IEEE Signal Processing Letters.
[11] Kee Chaing Chua,et al. Wireless Information and Power Transfer: A Dynamic Power Splitting Approach , 2013, IEEE Transactions on Communications.
[12] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[13] Wouter A. Serdijn,et al. Co-Design of a CMOS Rectifier and Small Loop Antenna for Highly Sensitive RF Energy Harvesters , 2014, IEEE Journal of Solid-State Circuits.
[14] Feifei Gao,et al. On channel estimation and optimal training design for amplify and forward relay networks , 2008, IEEE Transactions on Wireless Communications.
[15] Ali A. Nasir,et al. Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis , 2013, IEEE Transactions on Communications.
[16] Thomas Watteyne,et al. Understanding the Limits of LoRaWAN , 2016, IEEE Communications Magazine.
[17] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[18] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[19] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[20] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[21] Adrish Banerjee,et al. Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[22] Kee Chaing Chua,et al. Wireless Information Transfer with Opportunistic Energy Harvesting , 2012, IEEE Transactions on Wireless Communications.
[23] Rui Zhang,et al. Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.
[24] He Chen,et al. Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).