Relay selection for secure 5G green communications
暂无分享,去创建一个
Javier López | Charalabos Skianis | Panagiotis Rizomiliotis | Nikolaos Nomikos | Demosthenes Vouyioukas | Ana Nieto | Dimitrios N. Skoutas | Prodromos Makris
[1] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[2] Ching-Yao Huang,et al. Energy Efficient Subcarrier-Power Allocation and Relay Selection Scheme for OFDMA-Based Cooperative Relay Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[3] Dusit Niyato,et al. Cooperative transmission for meter data collection in smart grid , 2012, IEEE Communications Magazine.
[4] Özgür B. Akan,et al. Energy efficient network coding-based MAC for cooperative ARQ wireless networks , 2013, Ad Hoc Networks.
[5] Vera Stavroulaki,et al. 5G on the Horizon: Key Challenges for the Radio-Access Network , 2013, IEEE Vehicular Technology Magazine.
[6] Christos V. Verikoukis,et al. Multi-Player Game Theoretic MAC Strategies for Energy Efficient Data Dissemination , 2014, IEEE Transactions on Wireless Communications.
[7] Taneli Riihonen,et al. Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.
[8] H. Vincent Poor,et al. Relaying technologies for smart grid communications , 2012, IEEE Wireless Communications.
[9] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[10] Bhaskar Krishnamachari,et al. Base Station Operation and User Association Mechanisms for Energy-Delay Tradeoffs in Green Cellular Networks , 2011, IEEE Journal on Selected Areas in Communications.
[11] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[12] P. Ubaidulla,et al. Regenerative Cooperative Diversity Networks With Co-channel Interference: Performance Analysis and Optimal Energy Allocation , 2013, IEEE Transactions on Vehicular Technology.
[13] Bhawani Sankar Panda,et al. Energy-Efficient Greedy Forwarding Protocol for Wireless Sensor Networks , 2010, 2010 IEEE 71st Vehicular Technology Conference.
[14] Farshad Lahouti,et al. Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.
[15] Yi Xu,et al. Wireless Mesh Network in Smart Grid: Modeling and Analysis for Time Critical Communications , 2013, IEEE Transactions on Wireless Communications.
[16] Leila Musavian,et al. Effective capacity for interference and delay constrained cognitive radio relay channels , 2010, IEEE Transactions on Wireless Communications.
[17] Xiaoyan Hong,et al. A new set of passive routing attacks in mobile ad hoc networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[18] Kin K. Leung,et al. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.
[19] Carl H. Hauser,et al. Security, trust, and QoS in next-generation control and communication for large power systems , 2008, Int. J. Crit. Infrastructures.
[20] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[21] Ioannis Krikidis,et al. Distributed joint relay-pair selection for buffer-aided successive opportunistic relaying , 2013, 2013 IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[22] Luis Alonso,et al. Wireless Energy Harvesting in Two-Way Network Coded Cooperative Communications: A Stochastic Approach for Large Scale Networks , 2014 .
[23] Dirk Kutscher,et al. Self-organized energy efficient cellular networks , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[24] Robert Schober,et al. Max-Max Relay Selection for Relays with Buffers , 2012, IEEE Transactions on Wireless Communications.
[25] L. M. Varalakshmi,et al. A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks , 2014, Telecommun. Syst..
[26] Cicek Cavdar,et al. 5GrEEn: Towards Green 5G mobile networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[27] Jean-Marc Seigneur,et al. Security Adaptation Based on Autonomic and Trust Systems for Ubiquitous mobile network and Green IT , 2013 .
[28] Vyacheslav Kharchenko,et al. Green computing and communications in critical application domains: Challenges and solutions , 2013, The International Conference on Digital Technologies 2013.
[29] Javier López,et al. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet , 2014, Secur. Commun. Networks.
[30] Wei Xiang,et al. Radio resource allocation in LTE-advanced cellular networks with M2M communications , 2012, IEEE Communications Magazine.
[31] George K. Karagiannidis,et al. Performance analysis of single relay selection in rayleigh fading , 2008, IEEE Transactions on Wireless Communications.
[32] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[33] Ioannis Krikidis,et al. Hybrid cooperation through full-duplex opportunistic relaying and max-link relay selection with transmit power adaptation , 2014, 2014 IEEE International Conference on Communications (ICC).
[34] Liang Zhou,et al. Green service over Internet of Things: a theoretical analysis paradigm , 2013, Telecommun. Syst..
[35] Shweta Pandit,et al. Throughput maximization with reduced data loss rate in cognitive radio network , 2014, Telecommun. Syst..
[36] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[37] Raef Bassily,et al. Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.
[38] Zdenek Becvar,et al. Optimization of association procedure in WiMAX networks with relay stations , 2013, Telecommun. Syst..
[39] Hakima Chaouchi,et al. Path selection algorithms for fault tolerance in wireless mesh networks , 2013, Telecommun. Syst..
[40] Slavisa Aleksic,et al. Energy-efficient communication networks for improved global energy productivity , 2013, Telecommun. Syst..
[41] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[42] Aggelos Bletsas,et al. A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.
[43] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[44] Gordon L. Stüber,et al. Outage Probability of Decode-and-Forward Cooperative Relaying Systems with Co-Channel Interference , 2012, IEEE Transactions on Wireless Communications.
[45] Ioannis Krikidis,et al. Buffer-aided successive opportunistic relaying with inter-relay interference cancellation , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[46] Suili Feng,et al. Relay selection and power allocation for cooperative network based on energy pricing , 2010, IEEE Communications Letters.
[47] John S. Thompson,et al. Stability Analysis and Power Optimization for Energy Harvesting Cooperative Networks , 2012, IEEE Signal Processing Letters.
[48] Christos V. Verikoukis,et al. Capacity Maximization through Energy-Aware Multi-Mode Relaying , 2014, Wirel. Pers. Commun..
[49] John S. Thompson,et al. Buffer-Aided Relay Selection for Cooperative Diversity Systems without Delay Constraints , 2012, IEEE Transactions on Wireless Communications.
[50] Armin Wittneben,et al. Spectral efficient protocols for half-duplex fading relay channels , 2007, IEEE Journal on Selected Areas in Communications.
[51] Devavrat Shah,et al. Optimal Throughput–Delay Scaling in Wireless Networks—Part II: Constant-Size Packets , 2006, IEEE Transactions on Information Theory.
[52] Zhi Chen,et al. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.