Joint Relay and Eavesdropper Selection Strategy Against Multiple Eavesdroppers over Nakagami- $m$ Fading Channels in Cooperative Decode-and-Forward Relay Networks
暂无分享,去创建一个
[1] An Liu,et al. Secrecy outage probability of cognitive decode-and-forward relay networks , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[2] Xuelong Li,et al. Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective , 2016, IEEE Network.
[3] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[4] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[5] Jia Zhu,et al. Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks , 2017, IEEE Access.
[6] Su Hu,et al. Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges , 2018, IEEE Access.
[7] Qian Xu,et al. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.
[8] Guan Gui,et al. Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels , 2017, Secur. Commun. Networks.
[9] Wei-Ping Zhu,et al. Security–Reliability Tradeoff Analysis of Multirelay-Aided Decode-and-Forward Cooperation Systems , 2015, IEEE Transactions on Vehicular Technology.
[10] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[11] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[12] Lutz Lampe,et al. Physical layer security in MIMO power line communication networks , 2014, 18th IEEE International Symposium on Power Line Communications and Its Applications.
[13] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[14] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[15] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[16] Stamatios V. Kartalopoulos,et al. A primer on cryptography in communications , 2006, IEEE Communications Magazine.
[17] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..
[18] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[19] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[20] Wuyang Zhou,et al. Dynamic Spectrum Access With Physical Layer Security: A Game-Based Jamming Approach , 2018, IEEE Access.
[21] Manu,et al. Encryption algorithm using dual modulus , 2017, 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT).
[22] Jia Zhu,et al. Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks , 2017, IEEE Transactions on Communications.
[23] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.