Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
暂无分享,去创建一个
Kai-Kit Wong | Ali Kuhestani | Milad Tatar Mamaghani | Ali Kuhestani | Kai‐Kit Wong | Milad Tatar Mamaghani
[1] Rahim Tafazolli,et al. A Novel Equivalent Definition of Modified Bessel Functions for Performance Analysis of Multi-Hop Wireless Communication Systems , 2017, IEEE Access.
[2] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[3] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[4] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[5] Meng Zhang,et al. Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.
[6] Moslem Noori,et al. Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay , 2016, IET Commun..
[7] Sennur Ulukus,et al. Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.
[8] Li Sun,et al. Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach , 2015, IEEE Communications Letters.
[9] Siad Daboul,et al. The Lah Numbers and the nth Derivative of e1/x , 2013 .
[10] Branka Vucetic,et al. Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation , 2009, IEEE Transactions on Wireless Communications.
[11] Jinhong Yuan,et al. Cooperative jamming protocols in two hop amplify-and-forward wiretap channels , 2013, 2013 IEEE International Conference on Communications (ICC).
[12] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[13] Phee Lep Yeoh,et al. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer , 2018, IEEE Transactions on Communications.
[14] Adrish Banerjee,et al. Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[15] Steven W. McLaughlin,et al. Coding for Cryptographic Security Enhancement Using Stopping Sets , 2011, IEEE Transactions on Information Forensics and Security.
[16] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[17] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[18] Hien Quoc Ngo,et al. Massive MIMO in Spectrum Sharing Networks: Achievable Rate and Power Efficiency , 2017, IEEE Systems Journal.
[19] Anant Sahai,et al. Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.
[20] Jaesung Lim,et al. Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays , 2015, IEEE Transactions on Wireless Communications.
[21] K. J. Ray Liu,et al. Advances in Energy Harvesting Communications: Past, Present, and Future Challenges , 2016, IEEE Communications Surveys & Tutorials.
[22] Mengyu Liu,et al. Power Allocation for Secure SWIPT Systems With Wireless-Powered Cooperative Jamming , 2017, IEEE Communications Letters.
[23] Ali A. Nasir,et al. Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis , 2013, IEEE Transactions on Communications.
[24] Steven W. McLaughlin,et al. Tandem coding and cryptography on wiretap channels: EXIT chart analysis , 2009, 2009 IEEE International Symposium on Information Theory.
[25] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[26] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.
[27] Gayan Amarasuriya Aruma Baduge,et al. Wireless Energy Harvesting in Cognitive Massive MIMO Systems With Underlay Spectrum Sharing , 2017, IEEE Wireless Communications Letters.
[28] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[29] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[30] A. Lee Swindlehurst,et al. Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[31] Erik G. Larsson,et al. Wireless Information and Power Transfer in Multiway Massive MIMO Relay Networks , 2016, IEEE Transactions on Wireless Communications.
[32] Toshiaki Miyazaki,et al. Antieavesdropping With Selfish Jamming in Wireless Networks: A Bertrand Game Approach , 2017, IEEE Transactions on Vehicular Technology.
[33] Salman Durrani,et al. Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.
[34] Phee Lep Yeoh,et al. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[35] Antonia Maria Tulino,et al. High-SNR power offset in multiantenna communication , 2005, IEEE Transactions on Information Theory.
[36] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[37] Ali Kuhestani,et al. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.