|
[1] A. D. Wyner, ”The wire-tap channel,” Bell System Techical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. [2] S. K. Leung-Yan-Cheong and M. E. Hellman, ”The Gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, pp. 451-456, Jul. 1978. [3] L. Dong, H. Yousefi’zadeh and H. Jafarkhani, ”Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper,” IEEE International Conference on Communication, Kyoto, Japan, June. 2011. [4] Z. Ding, K. K. Leung, D. L. Goeckel and D. Towsley, ”Opportunistic Relaying for Se- crecy Communications: Cooperative Jamming vs. Relay Chatting,” IEEE Transactions on Wireless Communications, vol. 10, no. 6, pp. 1725-1729, April. 2011. [5] Y. Liu, J. Li and A. P. Petropulu, ”Destination Assisted Cooperative Jamming forWireless Physical-Layer Security,” IEEE Trans. Inf. Forensics Secure, vol. 8, no. 4, pp. 682-694, Feb. 2013. [6] K. H. Park, T. Wang and M. S. Alouini, ”On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1741-1750, Aug. 2013. [7] L. Dong, Z. Han and A. P. Petropulu, ”Improving Wireless Physical Layer Security via Cooperating Relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875- 1888, Dec. 2009. [8] J. Li, A. P. Petropulu and S. Weber, ”On Cooperative Relaying Schemes for Wireless Physical Layer Security,” IEEE Transactions on Signal Processing, vol. 59, no. 10, pp. 4985-4997, Oct. 2011. [9] H. Deng, H. M. Wang and W. Guo, ”Secrecy Transmission With a Helper: To Relay or to Jam,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, Feb. 2015. [10] Y. Zou, X. Wang and W. Shen, ”Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 10, Sep. 2013. [11] S. Ghose and R. Bose, ”Outage optimal relay selection strategy using destination-based jamming for secure communication in amplify-and-forward relay networks,” IEEE workshop on Statistical Signal Processing, Aug. 2014. [12] X. Ding, T. Song, Y. Zou and X. Chen, ”Intercept probability analysis of relay selection for wireless communications in the presence of multiple eavesdroppers,” IEEE Wireless Communications and Networking Conference, Apr. 2016. [13] D. K. Sarker, M. Z. I. Sarkar and M. S. Anower, ”Wireless security in selection decode-and- forward relay networks,” IEEE Electrical, Computer and Telecommunication Engineering, Dec. 2016. [14] C. Dang, L. J. Rodriguez and N. Tran, ”On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel,” IEEE Transactions on Vehicular Technology, vol. 66, no. 9, pp. 3887-3899, Aug. 2016. [15] X. Wu and L. L. Xie, ”On the Optimal Compressions in the Compress-and-Forward Relay Schemes,” IEEE Transactions on Information Theory , vol. 59, no. 5, pp. 2613-2628, Feb. 2013.
|