Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
暂无分享,去创建一个
Muhammad R. A. Khandaker | Kai-Kit Wong | Phee Lep Yeoh | Majid Moradikia | Abbas Mohammadi | Ali Kuhestani
[1] Caijun Zhong,et al. Optimum Wirelessly Powered Relaying , 2015, IEEE Signal Processing Letters.
[2] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[3] Feng Zhao,et al. Spectral-Energy Efficiency Tradeoff in Relay-Aided Massive MIMO Cellular Networks With Pilot Contamination , 2016, IEEE Access.
[4] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[5] Wei Xu,et al. Wireless Information and Power Transfer in Secure Massive MIMO Downlink With Phase Noise , 2017, IEEE Wireless Communications Letters.
[6] Vijay K. Bhargava,et al. Physical layer security for massive MIMO systems impaired by phase noise , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[7] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[8] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[9] Derrick Wing Kwan Ng,et al. Analysis and Design of Secure Massive MIMO Systems in the Presence of Hardware Impairments , 2016, IEEE Transactions on Wireless Communications.
[10] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[11] Emil Björnson,et al. Massive MIMO Systems With Non-Ideal Hardware: Energy Efficiency, Estimation, and Capacity Limits , 2013, IEEE Transactions on Information Theory.
[12] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[13] Moslem Noori,et al. Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay , 2016, IET Commun..
[14] Emil Björnson,et al. On the impact of transceiver impairments on af relaying , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[15] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[16] Phee Lep Yeoh,et al. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[17] Derrick Wing Kwan Ng,et al. Resource Allocation for a Massive MIMO Relay Aided Secure Communication , 2016, IEEE Transactions on Information Forensics and Security.
[18] Kamel Tourki,et al. Secure cooperative untrusted-relay network with outdated CSI , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[19] Erik G. Larsson,et al. Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..
[20] Phee Lep Yeoh,et al. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer , 2018, IEEE Transactions on Communications.
[21] Lu Lv,et al. Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation , 2017, IET Commun..
[22] Erik G. Larsson,et al. Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.
[23] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[24] Abbas Mohammadi,et al. Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: resource allocation and performance study , 2016, IET Commun..
[25] Muhammad R. A. Khandaker,et al. Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.
[26] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[27] H. Vincent Poor,et al. Joint Decode-and-Forward and jamming for wireless physical layer security with destination assistance , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[28] Preben E. Mogensen,et al. Assessing and Modeling the Effect of RF Impairments on UTRA LTE Uplink Performance , 2007, 2007 IEEE 66th Vehicular Technology Conference.
[29] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[30] Vijay K. Bhargava,et al. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.
[31] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[32] Andreas Peter Burg,et al. MIMO transmission with residual transmit-RF impairments , 2010, 2010 International ITG Workshop on Smart Antennas (WSA).
[33] Ali Kuhestani,et al. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[34] Ling Wang,et al. Optimal power allocation for achievable secrecy rate in an untrusted relay network with bounded channel estimation error , 2017, 2017 26th Wireless and Optical Communication Conference (WOCC).
[35] Tim Schenk,et al. RF Imperfections in High-rate Wireless Systems: Impact and Digital Compensation , 2008 .
[36] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[37] George K. Karagiannidis,et al. How Much Does I/Q Imbalance Affect Secrecy Capacity? , 2016, IEEE Communications Letters.
[38] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.
[39] Robert W. Heath,et al. Performance analysis of maximum ratio combining with imperfect channel estimation in the presence of cochannel interferences , 2009, IEEE Transactions on Wireless Communications.
[40] Kwok Hung Li,et al. Secure Cooperative AF Relaying Networks with Untrustworthy Relay Nodes , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[41] Li Sun,et al. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.