References
- A. Mukherjee et al., "Principles of Physical Layer Security in Multiuser Wireless Networks: a Survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, 2014, pp. 1550-1573. https://doi.org/10.1109/SURV.2014.012314.00178
- L. Dong et al., "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Process., vol. 58, no. 3, Mar. 2010, pp. 1875-1888. https://doi.org/10.1109/TSP.2009.2038412
- G. Zheng, L. Choo, and K. Wong, "Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays," IEEE Trans. Signal Process., vol. 59, no. 3, 2011, pp. 1317-1322. https://doi.org/10.1109/TSP.2010.2092774
- J. Li, A.P. Petropulu, and S. Weber, "On Cooperative Relaying Schemes for Wireless Physical Layer Security," IEEE Trans. Signal Process., vol. 59, no. 10, Oct. 2011, pp. 4985-4997. https://doi.org/10.1109/TSP.2011.2159598
- H.-M. Wang, F. Liu, and M. Yang, "Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems," IEEE Trans. Veh. Technol., vol. 64, no. 10, Oct. 2015, pp. 4893-4898. https://doi.org/10.1109/TVT.2014.2370754
- H.-M. Wang and X.-G. Xia, "Enhancing Wireless Secrecy via Cooperation: Signal Design and Optimization," IEEE Commun. Mag., vol. 53, no. 12, Dec. 2015, pp. 47-53. https://doi.org/10.1109/MCOM.2015.7355565
- H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks," IEEE Trans. Signal Process., vol. 60, no. 7, July 2012, pp. 3532-3545. https://doi.org/10.1109/TSP.2012.2191543
- A. Khisti, A. Tchamkerten, and G.W. Wornell, "Secure Broadcasting over Fading Channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, June 2008, pp. 2453-2469. https://doi.org/10.1109/TIT.2008.921861
- X. Wang, M. Tao, and Y. Xu, "Outage Analysis of Cooperative Secrecy Multicast Transmission," IEEE Wireless Commun. Lett., vol. 3, no. 2, Apr. 2014, pp. 161-164. https://doi.org/10.1109/WCL.2013.122113.130849
- Q. Li and W.-K. Ma, "Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming," IEEE Trans. Signal Process., vol. 59, no. 8, Aug. 2011, pp. 3799-3812. https://doi.org/10.1109/TSP.2011.2146775
- N.D. Sidiropoulos, T.N. Davidson, and Z. Lou, "Transmit Beamforming for Physical-Layer Multicasting," IEEE Trans. Signal Process., vol. 54, no. 6, June 2006, pp. 2239-2251. https://doi.org/10.1109/TSP.2006.872578
- S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge, UK: Cambridge University Press, 2004.
- Y. Zou et al., "Relay-Selection Improves the Security-Reliability Trade-off in Cognitive Radio Systems," IEEE Trans. Commun., vol. 63, no. 1, Jan. 2015, pp. 215-228. https://doi.org/10.1109/TCOMM.2014.2377239
- O.O. Koyluoglu, C.E. Koksal, and H.E. Gamal, "On Secrecy Capacity Scaling in Wireless Networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, May 2012, pp. 3000-3015. https://doi.org/10.1109/TIT.2012.2184692
- H.-M. Wang et al., "Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems with Individual Power Constraint and No Eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, Jan. 2013, pp. 39-42. https://doi.org/10.1109/LSP.2012.2227725
- M. Bloch et al., "Wireless Information-Theoretic Security," IEEE Trans. Inf. Theory, vol. 54, no. 6, June 2008, pp. 2515-2534. https://doi.org/10.1109/TIT.2008.921908
- A. Charnes and W.-W. Cooper, "Programming with Linear Fractional Functionals," Naval Res. Logist., vol. 9, 1962, pp. 181-186. https://doi.org/10.1002/nav.3800090303
- Z. Luo et al., "Semidefinite Relaxation of Quadratic Optimization Problems," IEEE Signal Process. Mag., vol. 27, no. 3, May 2010, pp. 20-34.
- J.F. Sturm, "Using SeDuMi 1.02, a Matlab Toolbox for Optimization over Symmetric Cones," Optimization Methods Softw., vol. 11, no. 1-4, 1999, pp. 625-653. https://doi.org/10.1080/10556789908805766
- J. Lofberg, "YALMIP: A Toolbox for Modeling and Optimization in MATLAB," Int. Symp. Comput. Aided Contr. Syst. Design, Taipei, Taiwan, Sept. 2-4, 2004, pp. 284-289.
- H. Wang et al., "Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, Dec. 2013, pp. 2007-2020. https://doi.org/10.1109/TIFS.2013.2287046