References
- A. D. Wyner, "The Wire-tap Channel," Bell Syst. Technology Journal, vol.54, no.8, pp.1355-1387, Jan.1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- S. K. Leung-Yan-Cheong and M. E. Hellman, "The gaussian wiretap channel," IEEE Transactions Information Theory, vol.24, pp.451-456, Jul.1978. https://doi.org/10.1109/TIT.1978.1055917
- Hong Wen and Pin-Han Ho, "Physical layer technique to assist authentication based on PKI for Vehicular communication networks," KSII Trans. on Internet and information systems, vol.5, no.2, pp.440-456, Feb.2011.
- F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. of IEEE International Symposium on Information Theory, pp.524-528, Jul.2008. Article (CrossRef Link).
- H. Kim and J. D. Villasenor, "Secure MIMO communications in a system with equal numbers of transmit and receive antennas," IEEE Communication Letters, vol.12, no.5, pp.386-388, 2008.
- A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas—Part I: The MISOME Wiretap Channel," IEEE Transactions on Information Theory, vol.56, no.7, pp.3088-3104, 2009.
- S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 Channel," IEEE Transactions on Information Theory, vol.55, no.9, pp.4033-4039, 2009.
- Oussama Souihli and Tomoaki Ohtsuki, "The two-way MIMO wire-tap channel," in Proc. of IEEE International Conference on Communication, pp.1-6, Jun.2009.
- A Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME Wiretap Channel," IEEE Transactions on Information Theory, vol.56, no.11, pp.5515-5532, 2010. https://doi.org/10.1109/TIT.2010.2068852
- L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Secure wireless communications via cooperation," in Proc. of 46th Annual Allerton Conference Commuication, Control, and Computing, pp.1132-1138, Sep.2008.
- L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Amplify-and-forward based cooperation for secure wireless communications," in Proc. of IEEE Intl Conference Acoust. Speech Signal Processing, pp.2613-2616, Apr.2009.
- J. Zhang and M. C. Gursoy, "Collaborative relay beamforming for secrecy," in Proc. of the IEEE International Conference on Communication (ICC), pp.1-5, May.2010. Article (CrossRef Link).
- J. Zhang and M. C. Gursory, "Relay beamforming strategies for physical layer security," in Proc. of 44th Annual Conference on Information Sciences and Systems, pp.1-6, Mar.2010. Article (CrossRef Link).
- L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperative relays," IEEE Transactions on Signal Processing, vol.58, no.3, pp.1875-1888, Mar.2010. https://doi.org/10.1109/TSP.2009.2038412
- S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol.7, no.6, pp.2180-2189, Jun.2008. https://doi.org/10.1109/TWC.2008.060848
- J. Zhu, J. Mo, and M. Tao, "Cooperative secret communication with artificial noise in symmetric interference channel," IEEE Communications Letters, vol.14, no.10, Oct.2010. Article (CrossRef Link).
- R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. of IEEE GLOBECOM, pp.1-6, Dec.6-10, 2010.
- L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Cooperative jamming for wireless physical layer security", in Proc. of IEEE SSP, pp.417-420, Aug.2009.
- M. Bloch, J. O. Barrors, M. R. D. Rodrigues, and S. W. Mclaughlin, "Wireless information-theoretical security," IEEE Transactions on Information Theory, vol.54, no.6, pp.2515-25, Jun.2008. https://doi.org/10.1109/TIT.2008.921908
Cited by
- Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration vol.9, pp.3, 2012, https://doi.org/10.3837/tiis.2015.03.012