Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying
暂无分享,去创建一个
[1] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[2] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[3] Xiangyun Zhou,et al. When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.
[4] Huiming Wang,et al. Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.
[5] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[6] G. Nemhauser,et al. Integer Programming , 2020 .
[7] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[8] Dimitri P. Bertsekas,et al. Data Networks , 1986 .
[9] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[10] Walid Saad,et al. Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks , 2012, IEEE Transactions on Wireless Communications.
[11] Il-Min Kim,et al. Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.
[12] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[13] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[14] Dennis Goeckel,et al. Jamming-aware minimum energy routing in wireless networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[15] Xiangyun Zhou,et al. Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.
[16] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[17] Meixia Tao,et al. Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.
[18] Feng Liu,et al. Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.
[19] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[20] Jeffrey G. Andrews,et al. Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.
[21] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[22] T. Mattfeldt. Stochastic Geometry and Its Applications , 1996 .
[23] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[24] Il-Min Kim,et al. Optimal power allocation for secure multi-carrier relay systems , 2011, 2011 8th International Workshop on Multi-Carrier Systems & Solutions.
[25] S. Amari,et al. Closed-form expressions for distribution of sum of exponential random variables , 1997 .
[26] Zhiguo Ding,et al. Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.
[27] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[28] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[29] Abbas Jamalipour,et al. Outage Performance Analysis of Imperfect-CSI-Based Selection Cooperation in Random Networks , 2014, IEEE Transactions on Communications.
[30] Mohamed Saad,et al. Joint Optimal Routing and Power Allocation for Spectral Efficiency in Multihop Wireless Networks , 2014, IEEE Transactions on Wireless Communications.
[31] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[32] Jeffrey G. Andrews,et al. Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.
[33] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.