Exploiting Opportunistic Scheduling Schemes and WPT-Based Multi-Hop Transmissions to Improve Physical Layer Security in Wireless Sensor Networks
暂无分享,去创建一个
[1] Beongku An,et al. Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).
[2] Meixia Tao,et al. Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.
[3] Zhiguo Ding,et al. 3-D Hybrid VLC-RF Indoor IoT Systems With Light Energy Harvesting , 2019, IEEE Transactions on Green Communications and Networking.
[4] Lin Dai,et al. Routing Strategies in Multihop Cooperative Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[5] Caijun Zhong,et al. Wireless-Powered Communications: Performance Analysis and Optimization , 2015, IEEE Transactions on Communications.
[6] Dongwoo Kim,et al. Performance analysis with and without torch node in secure communications , 2015, 2015 International Conference on Advanced Technologies for Communications (ATC).
[7] Yindi Jing,et al. Physical-Layer Security in Full-Duplex Multi-Hop Multi-User Wireless Network With Relay Selection , 2019, IEEE Transactions on Wireless Communications.
[8] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[9] Zhiguo Ding,et al. Performance Analysis and Optimization for SWIPT Wireless Sensor Networks , 2017, IEEE Transactions on Communications.
[10] Ali A. Nasir,et al. Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.
[11] Tran Trung Duy,et al. Security enhancement for dual-hop RF protocols with Nth-best partial relay and EH-based jammer , 2015, 2015 International Conference on Communications, Management and Telecommunications (ComManTel).
[12] Hee Yong Youn,et al. A Novel Cluster Head Selection Method based on K-Means Algorithm for Energy Efficient Wireless Sensor Network , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[13] Daniel Benevides da Costa,et al. A New Efficient Low-Complexity Scheme for Multi-Source Multi-Relay Cooperative Networks , 2011, IEEE Transactions on Vehicular Technology.
[14] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[15] Gaofeng Pan,et al. Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.
[16] Beongku An,et al. Outage Performance Analysis of Relay Selection Schemes in Wireless Energy Harvesting Cooperative Networks over Non-Identical Rayleigh Fading Channels † , 2016, Sensors.
[17] Yunyoung Nam,et al. Underwater Wireless Sensor Networks: A Review of Recent Issues and Challenges , 2019, Wirel. Commun. Mob. Comput..
[18] Dac-Binh Ha,et al. Physical Layer Secrecy Performance of Multi-hop Decode-and-Forward Relay Networks with Multiple Eavesdroppers , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[19] Yiwei Thomas Hou,et al. Wireless power transfer and applications to sensor networks , 2013, IEEE Wireless Communications.
[20] Mohamed-Slim Alouini,et al. On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.
[21] Beongku An,et al. Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks , 2018, Wirel. Commun. Mob. Comput..
[22] H Vincent Poor,et al. Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.
[23] Phu Tran Tin,et al. Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments , 2019, Entropy.
[24] I. Miller. Probability, Random Variables, and Stochastic Processes , 1966 .
[25] Tran Trung Duy,et al. Exact outage analysis of energy-harvesting multihop cluster-based networks with multiple power beacons over Nakagami-m fading channels , 2018, 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom).
[26] George K. Karagiannidis,et al. Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.
[27] William Lumpkins,et al. Nikola Tesla's Dream Realized: Wireless power energy harvesting. , 2014, IEEE Consumer Electronics Magazine.
[28] Tran Dinh Hieu,et al. Performance Enhancement for Multihop Harvest-to-Transmit WSNs With Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises , 2018, IEEE Sensors Journal.
[29] M. Soljačić,et al. Wireless Power Transfer via Strongly Coupled Magnetic Resonances , 2007, Science.
[30] Jong-Ho Lee,et al. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.
[31] Beongku An,et al. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks , 2017, Sensors.
[32] Tran Trung Duy,et al. Exact outage probability of energy harvesting incremental relaying networks with MRC receiver , 2016, 2016 International Conference on Advanced Technologies for Communications (ATC).
[33] Nuwan S. Ferdinand,et al. Secrecy Outage Performance of MIMO Wiretap Channels with Multiple Jamming Signals , 2016 .
[34] Beongku An,et al. Performance Analysis of Wireless Energy Harvesting Multihop Cluster-Based Networks Over Nakagami- ${m}$ Fading Channels , 2018, IEEE Access.
[35] Hongbo Jiang,et al. Enabling Relay-Assisted D2D Communication for Cellular Networks: Algorithm and Protocols , 2018, IEEE Internet of Things Journal.
[36] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[37] Pei Liu,et al. Cooperative wireless communications: a cross-layer approach , 2006, IEEE Wireless Communications.
[38] Trung Q. Duong,et al. Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.
[39] Mubashir Husain Rehmani,et al. Applications of wireless sensor networks for urban areas: A survey , 2016, J. Netw. Comput. Appl..
[40] Tran Trung Duy,et al. Secrecy Performance Analysis of Multihop Transmission Protocols in Cluster Networks , 2015, Wirel. Pers. Commun..
[41] Daniel Benevides da Costa,et al. Exploiting Direct Links in Multiuser Multirelay SWIPT Cooperative Networks With Opportunistic Scheduling , 2017, IEEE Transactions on Wireless Communications.
[42] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[43] Stefan Parkvall,et al. Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.