On the Security Enhancement of Uplink NOMA Systems With Jammer Selection
暂无分享,去创建一个
Lu Lv | Haiyang Ding | Jiwei Tian | Kunrui Cao | Fengkui Gong | Buhong Wang | Haiyang Ding | Buhong Wang | Jiwei Tian | Lu Lv | F. Gong | Kunrui Cao | Feng-kui Gong
[1] Mohamed-Slim Alouini,et al. Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes , 2018, IEEE Transactions on Communications.
[2] Liran Ma,et al. A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks , 2019, IEEE Transactions on Vehicular Technology.
[3] Li Sun,et al. Physical layer security with its applications in 5G networks: A review , 2017, China Communications.
[4] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[5] L. Hanzo,et al. Non-Orthogonal Multiple Access for 5G and Beyond , 2018 .
[6] George K. Karagiannidis,et al. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.
[7] Hua Yu,et al. Non-Orthogonal Multiple Access for Cooperative Communications: Challenges, Opportunities, and Trends , 2018, IEEE Wireless Communications.
[8] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Anass Benjebbour,et al. Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).
[11] Haiyang Ding,et al. Adaptive Cooperative Jamming for Secure Communication in Energy Harvesting Relay Networks , 2019, IEEE Wireless Communications Letters.
[12] Huiming Wang,et al. Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.
[13] Shuangfeng Han,et al. Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.
[14] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[15] Trung Q. Duong,et al. Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.
[16] Fengkui Gong,et al. Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users , 2020, IEEE Transactions on Vehicular Technology.
[17] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[18] Pingzhi Fan,et al. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users , 2014, IEEE Signal Processing Letters.
[19] Pingzhi Fan,et al. Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions , 2016, IEEE Transactions on Vehicular Technology.
[20] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[21] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[22] Fengkui Gong,et al. Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping , 2020, IEEE Transactions on Information Forensics and Security.
[23] Fei Wang,et al. Security and reliability trade-off analysis of joint user and jammer selection in the face of co-channel interference , 2019, IET Commun..
[24] Bin Li,et al. Secrecy Outage Probability Analysis of Friendly Jammer Selection Aided Multiuser Scheduling for Wireless Networks , 2019, IEEE Transactions on Communications.
[25] Jing Wang,et al. Uplink Nonorthogonal Multiple Access in 5G Systems , 2016, IEEE Communications Letters.
[26] Fuhui Zhou,et al. Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach , 2019, IEEE Transactions on Information Forensics and Security.
[27] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.
[28] Lajos Hanzo,et al. Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.
[29] Vincent K. N. Lau,et al. On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.
[30] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[31] Qi Zhang,et al. Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.
[32] Yuan Liu,et al. Physical Layer Security in Heterogeneous Networks With Jammer Selection and Full-Duplex Users , 2017, IEEE Transactions on Wireless Communications.
[33] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[34] Wan Choi,et al. Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law , 2014, IEEE Transactions on Signal Processing.
[35] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[36] Jinhong Yuan,et al. Beamforming Design and Power Allocation for Secure Transmission With NOMA , 2018, IEEE Transactions on Wireless Communications.
[37] Furqan Jameel,et al. A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.
[38] Cheng-Xiang Wang,et al. Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.
[39] H. Vincent Poor,et al. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.
[40] Lajos Hanzo,et al. Nonorthogonal Multiple Access for 5G and Beyond , 2017, Proceedings of the IEEE.
[41] Zhiguo Ding,et al. Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.
[42] Yulong Zou,et al. Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.
[43] Chenxi Liu,et al. Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access , 2019, IEEE Transactions on Information Forensics and Security.
[44] Kun Lu,et al. A Survey of Non-Orthogonal Multiple Access for 5G , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).