Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network
暂无分享,去创建一个
[1] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[2] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[3] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[4] Liang Jin,et al. A physical layer security transmission mechanism based on joint channel characteristics in relay system , 2012, 2012 IEEE 14th International Conference on Communication Technology.
[5] Huiming Wang,et al. Joint relay selection and artificial jamming power allocation for secure DF relay networks , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[6] Junni Zou,et al. Auction-Based Power Allocation for Multiuser Two-Way Relaying Networks , 2013, IEEE Transactions on Wireless Communications.
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[9] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[10] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[11] A. Lee Swindlehurst,et al. Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[12] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[13] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[14] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[15] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[16] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[17] Guanghan Xu,et al. Low complexity power allocation and joint relay-jammer selection in cooperative jamming DF relay wireless secure networks , 2013, 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID).
[18] Zhu Han,et al. Distributed Relay Selection and Power Control for Multiuser Cooperative Communication Networks Using Stackelberg Game , 2009, IEEE Transactions on Mobile Computing.
[19] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[20] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[21] Jianhua Ge,et al. Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay Networks , 2014, IEEE Communications Letters.
[22] Armin Wittneben,et al. Power Allocation Schemes for Amplify-and-Forward MIMO-OFDM Relay Links , 2007, IEEE Transactions on Wireless Communications.
[23] Aria Nosratinia,et al. Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.
[24] Luigi Grippo,et al. On the convergence of the block nonlinear Gauss-Seidel method under convex constraints , 2000, Oper. Res. Lett..
[25] Urbashi Mitra,et al. Optimization of Amplify-and-Forward Multicarrier Two-Hop Transmission , 2011, IEEE Transactions on Communications.
[26] Di Zhao,et al. Secrecy Balancing over Two-User MISO Interference Channels with Rician Fading , 2013 .
[27] Ioannis Lambadaris,et al. Optimal Joint Resource Allocation and Power Control in Bidirectional Relaying Networks , 2014, IEEE Transactions on Vehicular Technology.
[28] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[29] Zhu Han,et al. Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[30] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[31] Yasutada Oohama,et al. Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.
[32] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[33] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[34] Ya-Feng Liu,et al. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.
[35] Yingbo Hua,et al. A Dual-Phase Power Allocation Scheme for Multicarrier Relay System With Direct Link , 2014, IEEE Transactions on Signal Processing.