References
- J. Barros and M.R.D. Rodrigues, "Secrecy Capacity of Wireless Channels," IEEE Int. Symp. Inform. Theory, Seattle, USA, Jul. 2006, pp. 356-360.
- L. Lai and H.E. Gamal, "The Relay-Eavesdropper Channel: Cooperation for Secrecy," IEEE Trans. Inform. Theory, vol. 54, no. 9, Sept. 2008, pp. 4005-4019. https://doi.org/10.1109/TIT.2008.928272
- I. Krikidis, J.S. Thompson, and S. Mclaughlin, "Relay Selection for Secure Cooperative Networks with Jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, Oct. 2009, pp. 5003-5011. https://doi.org/10.1109/TWC.2009.090323
- Y. Zou, X. Wang, and W. Shen, "Optimal Relay Selection for Physical-layer Security in Cooperative Wireless Networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, Oct. 2013, pp. 2099-2111. https://doi.org/10.1109/JSAC.2013.131011
- I. Krikidis et al., "Full-Duplex Relay Selection for Amplifyand-Forward Cooperative Networks," IEEE Trans. Wireless Commun., vol. 11, no. 12, Dec. 2012, pp. 4381-4393. https://doi.org/10.1109/TWC.2012.101912.111944
- X. Ding et al., "Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection," IEEE Trans. Veh. Technol., vol. 66, no. 5, May 2017, pp. 3930-3941. https://doi.org/10.1109/TVT.2016.2601112
- G. Chen et al., "Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks," IEEE Trans. Inform. Forensics Security, vol. 9, no. 4,Apr. 2014, pp. 719-729. https://doi.org/10.1109/TIFS.2014.2307672
- Y. Liu et al., "Relay Selection for Security Enhancement in Cognitive Relay Networks," IEEE Wireless Commun. Lett., vol. 4, no. 1, Feb. 2015, pp. 46-49. https://doi.org/10.1109/LWC.2014.2365808
- X. Chen et al., "Multi-Antenna Relay Aided Wireless Physical Layer Security," IEEE Commun. Mag., vol. 53, no. 12, Dec. 2015, pp. 40-46. https://doi.org/10.1109/MCOM.2015.7355564
- X. Chen et al., "Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF?" IEEE Trans. Wireless Commun., vol. 14, no. 9, Sept. 2015, pp. 5135-5146. https://doi.org/10.1109/TWC.2015.2433291
- J. Lee, "Full-Duplex Relay for Enhancing Physical Layer Security in Multi-hop Relaying Systems," IEEE Commun. Lett., vol. 19, no. 4, Apr. 2015, pp. 525-528. https://doi.org/10.1109/LCOMM.2015.2401551
- J. Lee, "Optimal Power Allocation for Physical Layer Security in Multihop DF Relay Networks," IEEE Trans. Wireless Commun., vol. 15, no. 1, Jan. 2016, pp. 28-38. https://doi.org/10.1109/TWC.2015.2466091
- L. Wang et al., "Cluster-Based Cooperative Jamming in Wireless Multi-hop Networks," IEEE PIMRC, London, UK, Sept. 8-11, 2013, pp. 169-174.
- T.T. Duy and H.Y. Kong, "Secrecy Performance Analysis of Multihop Transmission Protocols in Cluster Networks," Wireless Personal Commun., vol. 82, no. 4, June 2015, pp. 2505-2518. https://doi.org/10.1007/s11277-015-2361-y
- O.O. Koyluoglu, C.E. Koksal and H.E. Gamal, "On Secrecy Capacity Scaling in Wireless Networks," IEEE Trans. Infrom. Theory, vol. 58, no. 5, May 2012, pp. 3000-3015. https://doi.org/10.1109/TIT.2012.2184692
- J. Mo, M. Tao and Y. Liu, "Relay Placement for Physical Layer Security: A Secure Connection Perspective," IEEE Commun. Lett., vol. 16, no. 6, June 2012, pp. 878-881. https://doi.org/10.1109/LCOMM.2012.042312.120582
- C. Cai et al., "Secure Connectivity Using Randomize-and-Forward Strategy in Cooperative Wireless Networks," IEEE Commun. Lett., vol. 17, no. 7, July 2013, pp. 1340-1343. https://doi.org/10.1109/LCOMM.2013.052013.122902
Cited by
- Reinforcement Learning-Based Multihop Relaying: A Decentralized Q-Learning Approach vol.23, pp.10, 2017, https://doi.org/10.3390/e23101310