Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT With Multiple Access Mobile Edge Computing in Smart City
暂无分享,去创建一个
Dong Wang | Zhu Han | Bo Bai | Kai Lei | Wenbo Zhao | Yanping Yang | Zhu Han | B. Bai | Kai Lei | Wenbo Zhao | Yanping Yang | Dong Wang
[1] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[2] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[3] H. Vincent Poor,et al. MIMO Beamforming for Secure and Energy-Efficient Wireless Communication , 2017, IEEE Signal Processing Letters.
[4] Li Zhou,et al. Energy-Latency Tradeoff for Energy-Aware Offloading in Mobile Edge Computing Networks , 2018, IEEE Internet of Things Journal.
[5] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.
[6] Lajos Hanzo,et al. Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.
[7] Qiang Li,et al. Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.
[8] Xiaohui Liang,et al. Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.
[9] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[10] Mahdi H. Miraz,et al. A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) , 2015, 2015 Internet Technologies and Applications (ITA).
[11] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[12] Tobias J. Oechtering,et al. Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.
[13] Aydin Behnad,et al. Relay authentication by exploiting I/Q imbalance in amplify-and-forward system , 2014, 2014 IEEE Global Communications Conference.
[14] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[15] Jie Zhang,et al. FiWi-Enhanced Vehicular Edge Computing Networks: Collaborative Task Offloading , 2019, IEEE Vehicular Technology Magazine.
[16] Jia Zhu,et al. Physical-Layer Security for Cooperative Relay Networks , 2016, Wireless Networks.
[17] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[18] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[19] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[20] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[21] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[22] Jiajia Liu,et al. Collaborative Mobile Edge Computation Offloading for IoT over Fiber-Wireless Networks , 2018, IEEE Network.
[23] Tarik Taleb,et al. On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration , 2017, IEEE Communications Surveys & Tutorials.
[24] Huiming Wang,et al. Improving the Physical-Layer Security of Wireless Two-Way Relaying via Analog Network Coding , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[25] Akbar Rahman,et al. Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[26] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[27] Remi A. Chou,et al. Polar Coding for the Broadcast Channel With Confidential Messages: A Random Binning Analogy , 2016, IEEE Transactions on Information Theory.
[28] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[29] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[30] Huiming Wang,et al. Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things , 2018, IEEE Access.
[31] Remi A. Chou,et al. Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[32] Cong Ling,et al. Polar Coding for the Cognitive Interference Channel With Confidential Messages , 2018, IEEE Journal on Selected Areas in Communications.
[33] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[34] Xuemin Shen,et al. Secrecy-Based Energy-Efficient Data Offloading via Dual Connectivity Over Unlicensed Spectrums , 2016, IEEE Journal on Selected Areas in Communications.
[35] Ke Xu,et al. A tutorial on the internet of things: from a heterogeneous network integration perspective , 2016, IEEE Network.
[36] Yan Dong,et al. PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[37] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[38] Zhu Han,et al. Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying , 2016, IEEE Transactions on Wireless Communications.
[39] Zhu Han,et al. Energy Efficient Secure Communication Over Decode-and-Forward Relay Channels , 2015, IEEE Transactions on Communications.
[40] Huiming Wang,et al. Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.
[41] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[42] Jinho Choi,et al. Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming , 2017, IEEE Transactions on Information Forensics and Security.
[43] Jie Zhang,et al. Mobile-Edge Computation Offloading for Ultradense IoT Networks , 2018, IEEE Internet of Things Journal.
[44] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[45] Mahmoud Ahmadian,et al. Adaptive secure channel coding based on punctured turbo codes , 2006 .
[46] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[47] Khaled Ben Letaief,et al. Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices , 2016, IEEE Journal on Selected Areas in Communications.
[48] Hong Wen,et al. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.
[49] Michael A. Jensen,et al. Improved Radiometric Identification of Wireless Devices Using MIMO Transmission , 2011, IEEE Transactions on Information Forensics and Security.
[50] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[51] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[52] Aylin Yener,et al. Providing Secrecy With Structured Codes: Two-User Gaussian Channels , 2014, IEEE Transactions on Information Theory.
[53] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[54] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[55] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[56] Jie Zhang,et al. Computation Offloading for Multi-Access Mobile Edge Computing in Ultra-Dense Networks , 2018, IEEE Communications Magazine.
[57] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[58] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[59] Sennur Ulukus,et al. Secrecy in Cooperative Relay Broadcast Channels , 2011, IEEE Trans. Inf. Theory.
[60] Jörg Kliewer,et al. Coding Schemes for Achieving Strong Secrecy at Negligible Cost , 2017, IEEE Transactions on Information Theory.
[61] Lei Cui,et al. Security and Privacy in Smart Cities: Challenges and Opportunities , 2018, IEEE Access.
[62] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[63] A. Lee Swindlehurst,et al. Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[64] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[65] Abdulmotaleb El-Saddik,et al. Toward Social Internet of Vehicles: Concept, Architecture, and Applications , 2015, IEEE Access.
[66] Raheem A. Beyah,et al. A Passive Approach to Wireless NIC Identification , 2006, 2006 IEEE International Conference on Communications.
[67] Hui Tian,et al. Adaptive sequential offloading game for multi-cell Mobile Edge Computing , 2016, 2016 23rd International Conference on Telecommunications (ICT).
[68] Jinhong Yuan,et al. Transmit Antenna Selection with Alamouti Coding and Power Allocation in MIMO Wiretap Channels , 2014, IEEE Transactions on Wireless Communications.
[69] Zhu Han,et al. Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach , 2016, IEEE Transactions on Communications.
[70] Victor C. M. Leung,et al. Green Internet of Things for Smart World , 2015, IEEE Access.
[71] H. Vincent Poor,et al. Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.
[72] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.