Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers
暂无分享,去创建一个
Lu Lv | Haiyang Ding | Kunrui Cao | Fengkui Gong | Buhong Wang | Runze Dong | Tianhao Cheng | Haiyang Ding | Buhong Wang | Lu Lv | F. Gong | Tianhao Cheng | Kunrui Cao | Runze Dong | Feng-kui Gong
[1] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[2] H. Vincent Poor,et al. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.
[3] Mengyu Liu,et al. Power Allocation for Secure SWIPT Systems With Wireless-Powered Cooperative Jamming , 2017, IEEE Communications Letters.
[4] Furqan Jameel,et al. A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.
[5] Jinhong Yuan,et al. Beamforming Design and Power Allocation for Secure Transmission With NOMA , 2018, IEEE Transactions on Wireless Communications.
[6] Fengkui Gong,et al. Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users , 2020, IEEE Transactions on Vehicular Technology.
[7] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[8] Fuhui Zhou,et al. Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach , 2019, IEEE Transactions on Information Forensics and Security.
[9] Lajos Hanzo,et al. Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.
[10] Pingzhi Fan,et al. Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions , 2016, IEEE Transactions on Vehicular Technology.
[11] Huiming Wang,et al. Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.
[12] Fengkui Gong,et al. Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping , 2020, IEEE Transactions on Information Forensics and Security.
[13] Trung Q. Duong,et al. Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.
[14] Salman Durrani,et al. Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.
[15] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[16] Yulong Zou,et al. Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.
[17] Cheng-Xiang Wang,et al. Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.
[18] Zhiguo Ding,et al. Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.
[19] George K. Karagiannidis,et al. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.
[20] Rui Zhang,et al. Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.
[21] Li Sun,et al. Physical layer security with its applications in 5G networks: A review , 2017, China Communications.
[22] Chenxi Liu,et al. Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access , 2019, IEEE Transactions on Information Forensics and Security.
[23] Abbas Jamalipour,et al. Accumulate Then Transmit: Toward Secure Wireless Powered Communication Networks , 2018, IEEE Transactions on Vehicular Technology.
[24] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[25] Mohamed-Slim Alouini,et al. Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes , 2018, IEEE Transactions on Communications.
[26] Shuangfeng Han,et al. Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.
[27] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[28] Bin Li,et al. Secrecy Outage Probability Analysis of Friendly Jammer Selection Aided Multiuser Scheduling for Wireless Networks , 2019, IEEE Transactions on Communications.
[29] Kun Lu,et al. A Survey of Non-Orthogonal Multiple Access for 5G , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[30] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[31] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[32] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[33] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[34] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.