Amplify-and-forward-based cooperative jamming strategy with power allocation for secure communication
暂无分享,去创建一个
An Li | Yizhu Xu | Yuhao Wang | Lihua Sun
[1] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[2] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[3] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[4] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[5] Mohamed-Slim Alouini,et al. On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.
[6] Jia Hou,et al. Decode‐and‐forward with full‐duplex relaying , 2012, Int. J. Commun. Syst..
[7] Ananthanarayanan Chockalingam,et al. Decode-and-Forward Relay Beamforming for Secrecy with Finite-Alphabet Input , 2013, IEEE Communications Letters.
[8] M. Yuksel,et al. Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.
[9] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[10] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[11] Raef Bassily,et al. Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.
[12] Wenbo Wang,et al. Achievable rate region with secrecy constraints for secure communication in two‐way relay networks , 2015, Int. J. Commun. Syst..
[13] Sami Muhaidat,et al. Amplify-and-Forward Selection Cooperation over Rayleigh Fading Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.
[14] Zhiguo Ding,et al. Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.
[15] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.