References
- E. Silva et al., "Identity-based key management in mobile ad hoc networks: Techniques and applications," IEEE Wireless Commun., vol. 15, no. 5, pp. 46-52, 2008. https://doi.org/10.1109/MWC.2008.4653131
- J. Barros andM. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. ISIT, 2006, pp. 356-360.
- M. Bloch et al., "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, 2008. https://doi.org/10.1109/TIT.2008.921908
- S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, 2008. https://doi.org/10.1109/TWC.2008.060848
- H. Jing and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, 2011. https://doi.org/10.1109/TSP.2011.2161295
- A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas; part ii: The mimome wiretap channel," IEEE Trans. Inf. Theory, on, vol. 56, no. 11, pp. 5515-5532, 2010. https://doi.org/10.1109/TIT.2010.2068852
- I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, 2009. https://doi.org/10.1109/TWC.2009.090323
- F. Oggier and B. Hassibi, "The secrecy capacity of the mimo wiretap channel," in Proc. IEEE ISIT, 2008, pp. 524-528.
- P. Parada and R. Blahut, "Secrecy capacity of simo and slow fading channels," in Proc. IEEE ISIT, 2005, pp. 2152-2155.
- L. Ruoheng et al.,"Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, 2008. https://doi.org/10.1109/TIT.2008.921879
- S. Shafiee and S. Ulukus, "Achievable rates in Gaussian miso channels with secrecy constraints," in Proc. IEEE ISIT, 2007, pp. 2466-2470.
- X. Sun et al., "Opportunistic selection for decode-and-forward cooperative networks with secure probabilistic constraints," Wireless Personal Communi., vol. 70, no. 4, pp. 1633-1652, 2013. https://doi.org/10.1007/s11277-012-0771-7
- L. Yupeng, L. Jiangyuan, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, 2013. https://doi.org/10.1109/TIFS.2013.2248730
- D. Zhiguo et al., "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, 2011. https://doi.org/10.1109/TWC.2011.040511.101694
- R. Bustin, L. Ruoheng, and H. V. Poor, "An mmse approach to the secrecy capacity of the mimo gaussian wiretap channel," in Proc. IEEE ISIT, 2009, pp. 2602-2606.
- A. Khisti et al. "On the gaussian mimo wiretap channel," in Proc. IEEE ISIT, 2007, pp. 2471-2475.
- A. L. Swindlehurst, "Fixed sinr solutions for the mimo wiretap channel," in Proc. IEEE ICASSP 2009, 2009, pp. 2437-2440.
- V. Aggarwal et al. "Secrecy capacity of a class of orthogonal relay eavesdropper channels," in Proc. IEEE ITA, 2009, pp. 295-300.
- L. Jiangyuan, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, 2011. https://doi.org/10.1109/TSP.2011.2159598
- M. Yuksel and E. Erkip, "Secure communication with a relay helping the wire-tapper," in Proc. IEEE ITW, 2007, pp. 595-600.
- D. Lun et al., "Improving wireless physical layer security via cooperating relays," IEEE Proc. Signal Process., vol. 58, no. 3, pp. 1875-1888, 2010. https://doi.org/10.1109/TSP.2009.2038412
- J. MinChul and K. Il-Min, "Relay selection with anc and tdbc protocols in bidirectional relay networks," IEEE Trans. Commun., vol. 58, no. 12, pp. 3500-3511, 2010. https://doi.org/10.1109/TCOMM.2010.101210.090585
- P. Popovski and H. Yomo, "Wireless network coding by amplify-andforward for bi-directional traffic flows," IEEE Commun. Lett., vol. 11, no. 1, pp. 16-18, 2007. https://doi.org/10.1109/LCOMM.2007.061436
- L. Qiang et al., "Cognitive spectrum sharing with two-way relaying systems," IEEE Trans. Veh. Technol., vol. 60, no. 3, pp. 1233-1240, 2011. https://doi.org/10.1109/TVT.2010.2104334