Physical layer security for multiuser two-way relay using distributed auction game
暂无分享,去创建一个
An Wang | Yueming Cai | Songqing Wang | Xinrong Guan | Yueming Cai | Xinrong Guan | An Wang | Songqing Wang
[1] Tracey Ho,et al. Memoryless relay strategies for two-way relay channels , 2009, IEEE Transactions on Communications.
[2] Mikael Skoglund,et al. Outage performances for amplify-and-forward, decode-and-forward and cooperative jamming strategies for the wiretap channel , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[3] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[4] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[5] Zhu Han,et al. Physical layer security: Coalitional games for distributed cooperation , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[6] Peter Marbach,et al. Downlink resource allocation and pricing for wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[7] RankovBoris,et al. Spectral efficient protocols for half-duplex fading relay channels , 2007 .
[8] Zhu Han,et al. Improve physical layer security in cooperative wireless network using distributed auction games , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[9] Lawrence M. Ausubel. An Efficient Ascending-Bid Auction for Multiple Objects , 2004 .
[10] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[11] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[12] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[13] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.
[14] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[15] Armin Wittneben,et al. Spectral efficient protocols for half-duplex fading relay channels , 2007, IEEE Journal on Selected Areas in Communications.
[16] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..