References
- C. Shannon, "Communication theory of secrecy systems," Bell Syst. Technical J., vol. 28, no. 4, pp. 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- A. Wyner, "Wire-tap channel," Bell Syst. Technical J., vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008. https://doi.org/10.1109/TIT.2008.928272
- L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-2010, Mar. 2010. https://doi.org/10.1109/TSP.2009.2038412
- G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011. https://doi.org/10.1109/TSP.2010.2092774
- J. Zhang and M. Gursoy, "Relay beamforming strategies for physical-layer security," in Proc. CISS, Mar. 2010, pp. 1-6.
- R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE GLOBECOM, Dec. 2010.
- A. Wolf and E. A. Jorswieck, "On the zero forcing optimality for friendly jamming in MISO wiretap channels," in Proc. IEEE SPAWC, June 2010, p. 1.
- A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011. https://doi.org/10.1109/TSP.2010.2078810
- I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints,"IET Commun., vol. 4, no. 15, pp. 1787-1791, Oct. 2010. https://doi.org/10.1049/iet-com.2009.0634
- I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009. https://doi.org/10.1109/TWC.2009.090323
- J. Kim, A. Ikhlef, and R. Schober, "Combined relay selection and cooperative Beamforming for physical layer security," J. Commun. Netw., vol. 14, no. 14, Aug. 2012.
- G. H. Golub and C. F. V. Loan, Matrix Computations. 3rd ed., Baltimore, MD: The Johns Hopkins Univ. Press, 1996.