Energy-Efficient Secure Transmission for Wireless Powered Internet of Things With Multiple Power Beacons
暂无分享,去创建一个
Yida Wang | Yueming Cai | Yuzhen Huang | Weiwei Yang | Jianwei Hu | Xiaohui Shang | Yueming Cai | Weiwei Yang | Yu-zhen Huang | Yida Wang | Jianwei Hu | Xiaohui Shang
[1] George K. Karagiannidis,et al. Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.
[2] Chao Zhang,et al. Distributed relay selection protocols for simultaneous wireless information and power transfer , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[3] Yong Liang Guan,et al. Throughput Optimization for Massive MIMO Systems Powered by Wireless Energy Transfer , 2014, IEEE Journal on Selected Areas in Communications.
[4] Eduard A. Jorswieck,et al. Energy Efficiency in Wireless Networks via Fractional Programming Theory , 2015, Found. Trends Commun. Inf. Theory.
[5] Gerhard P. Hancke,et al. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.
[8] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[9] Minghua Xia,et al. Ieee Transactions on Signal Processing, Accepted for Publication on the Efficiency of Far-field Wireless Power Transfer , 2022 .
[10] MinChul Ju,et al. Maximum Transmission Rate of PSR/TSR Protocols in Wireless Energy Harvesting DF-Based Relay Networks , 2015, IEEE Journal on Selected Areas in Communications.
[11] He Chen,et al. Cooperative Strategies for Wireless-Powered Communications: An Overview , 2018, IEEE Wireless Communications.
[12] Ali A. Nasir,et al. Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.
[13] Aylin Yener,et al. Throughput Maximization for Two-Way Relay Channels With Energy Harvesting Nodes: The Impact of Relaying Strategies , 2015, IEEE Transactions on Communications.
[14] Bayan S. Sharif,et al. Wireless Information and Power Transfer in Cooperative Networks With Spatially Random Relays , 2014, IEEE Transactions on Wireless Communications.
[15] Zhu Han,et al. Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.
[16] Salman Durrani,et al. Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.
[17] H. Vincent Poor,et al. Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.
[18] Kuang-Hao Liu,et al. Performance Improvement for RF Energy-Harvesting Relays via Relay Selection , 2017, IEEE Transactions on Vehicular Technology.
[19] Chakchai So-In,et al. Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy , 2018, IEEE Access.
[20] He Chen,et al. Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[21] Gongpu Wang,et al. Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.
[22] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[23] Zhiguo Ding,et al. Improving Secrecy Performance of a Wirelessly Powered Network , 2017, IEEE Transactions on Communications.
[24] Branka Vucetic,et al. Distributed and Optimal Resource Allocation for Power Beacon-Assisted Wireless-Powered Communications , 2015, IEEE Transactions on Communications.
[25] Hongbo Zhu,et al. Optimal Harvest-Use-Store Strategy for Energy Harvesting Wireless Systems , 2015, IEEE Transactions on Wireless Communications.
[26] Chao Zhai,et al. Cooperative wireless energy harvesting and information transfer in stochastic networks , 2015, EURASIP Journal on Wireless Communications and Networking.
[27] Dac-Binh Ha,et al. Secrecy Performance Analysis of Energy Harvesting Wireless Sensor Networks With a Friendly Jammer , 2017, IEEE Access.
[28] Adrish Banerjee,et al. Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[29] Richard Demo Souza,et al. Energy Efficiency of Repetition Coding and Parallel Coding Relaying Under Partial Secrecy Regime , 2016, IEEE Access.
[30] Jia Zhu,et al. Physical-Layer Security for Cooperative Relay Networks , 2016, Wireless Networks.
[31] Jammer. Physical Layer Security in Cooperative Energy Harvesting Networks with a Friendly Jammer , 2017 .
[32] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[33] Zhen Yang,et al. Joint Source-Relay Selection for Improving Wireless Physical-Layer Security , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[34] Maurizio Rebaudengo,et al. Key Management for Static Wireless Sensor Networks With Node Adding , 2014, IEEE Transactions on Industrial Informatics.
[35] Ahmed Wasif Reza,et al. Energizing wireless sensor networks by energy harvesting systems: Scopes, challenges and approaches , 2014 .
[36] Werner Dinkelbach. On Nonlinear Fractional Programming , 1967 .
[37] Caijun Zhong,et al. Secrecy Performance of Wirelessly Powered Wiretap Channels , 2016, IEEE Transactions on Communications.
[38] Hien Quoc Ngo,et al. Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach , 2016, IEEE Access.
[39] Salman Durrani,et al. Outage Probability of Ad Hoc Networks With Wireless Information and Power Transfer , 2015, IEEE Wireless Communications Letters.
[40] Yueming Cai,et al. Energy-Efficient Secure Transmission Design for the Internet of Things With an Untrusted Relay , 2018, IEEE Access.
[41] Dac-Binh Ha,et al. Secrecy performance analysis of energy harvesting wireless networks with multiple power transfer stations and destinations in the presence of multiple eavesdroppers , 2016, 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS).
[42] R. Zane,et al. Resistor Emulation Approach to Low-Power RF Energy Harvesting , 2008, IEEE Transactions on Power Electronics.
[43] He Chen,et al. Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.
[44] Robert W. Brennan,et al. A Comparison of Alternative Distributed Dynamic Cluster Formation Techniques for Industrial Wireless Sensor Networks , 2016, Sensors.
[45] Trung Q. Duong,et al. Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model , 2016, IEEE Transactions on Communications.
[46] Chao Zhai,et al. Wireless Power Transfer-Based Multi-Pair Two-Way Relaying With Massive Antennas , 2017, IEEE Transactions on Wireless Communications.
[47] He Chen,et al. Distributed Power Splitting for SWIPT in Relay Interference Channels Using Game Theory , 2014, IEEE Transactions on Wireless Communications.
[48] Ioannis Krikidis,et al. Relay Selection in Wireless Powered Cooperative Networks With Energy Storage , 2015, IEEE Journal on Selected Areas in Communications.
[49] Furqan Jameel,et al. Secrecy Outage for Wireless Sensor Networks , 2017, IEEE Communications Letters.
[50] Caijun Zhong,et al. Optimum Wirelessly Powered Relaying , 2015, IEEE Signal Processing Letters.