References
- A. Barenghi et al., Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures, Proc. IEEE 100, (2012), no. 11, 3056-3076. https://doi.org/10.1109/JPROC.2012.2188769
- A. Mukherjee et al., Principles of physical layer security in multiuser wireless networks: A survey, IEEE Commun. Sur. Tut. 16, (2014), no. 3, 1550-1573. https://doi.org/10.1109/SURV.2014.012314.00178
- N. Yang et al., Safeguarding 5G wireless communication networks using physical layer security, IEEE Commun. Mag. 53, (2015), no. 4, 20-27. https://doi.org/10.1109/MCOM.2015.7081071
- A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J. 54, (1975), no. 8, 1355-1387. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- S. Leung-Yan-Cheong and M. Hellman, The Gaussian wire-tap channel, IEEE Trans. Inform. Theory 24, (1978), no. 4, 451-456. https://doi.org/10.1109/TIT.1978.1055917
- J. N. Laneman, D. N. C. Tse, and G. W. Wornell, Cooperative diversity in wireless networks: Efficient protocols and outage behavior, IEEE Trans. Inform. Theory 50, (2004), no. 12, 3062-3080. https://doi.org/10.1109/TIT.2004.838089
- P. Xu, Z. Ding, and X. Dai, Achievable secrecy rates for relay-eavesdropper channel based on the application of noisy network coding, IEEE Trans. Inform. Forens. Security 13, (2018), no. 7 1736-1751. https://doi.org/10.1109/TIFS.2018.2805601
- L. Fan et al., Secure multiuser communications in multiple amplify-and-forward relay networks, IEEE Trans. Commun. 62, (2014), no. 9, 3299-3310. https://doi.org/10.1109/TCOMM.2014.2345763
- L. Fan et al., Secure multiple amplify-and-forward relaying with cochannel interference, IEEE J. Sel. Topics Signal Process. 10, (2016), no. 8, 1494-1505. https://doi.org/10.1109/JSTSP.2016.2607692
- X. He and A. Yener, Two-hop secure communication using an untrusted relay: A case for cooperative jamming, IEEE Global Telecommun. Conf. (GLOBECOM), New Orleans, LO, USA, Dec, 2008, pp. 1-5.
- R. Yao et al., Optimised power allocation to maximise secure rate in energy harvesting relay network, Electron. Lett. 52, (2016), no. 22, 1879-1881. https://doi.org/10.1049/el.2016.3201
- Y. Oohama, Capacity theorems for relay channels with confidential messages, IEEE Int. Symp. Inform. Theory (ISIT), Nice, France, 24-25, June 2007, pp. 926-930.
- X. He and A. Yener, Cooperation with an untrusted relay: A secrecy perspective, IEEE Trans. Inform. Theory 56, (2010), no. 8, 3807-3827. https://doi.org/10.1109/TIT.2010.2050958
- C. Wang, H. M. Wang, and X. G. Xia, Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, IEEE Trans. Wireless Commun. 14, (2015), no. 2, 589-605. https://doi.org/10.1109/TWC.2014.2354635
- L. Sun et al., Security-aware relaying scheme for cooperative networks with untrusted relay nodes, IEEE Commun. Lett. 19, (2015), no. 3, 463-466. https://doi.org/10.1109/LCOMM.2014.2385095
- A. Kuhestani, A. Mohammadi, and M. Mohammadi, Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers, IEEE Trans. Inform. Forens. Security 13, (2018), no. 2, 341-355. https://doi.org/10.1109/TIFS.2017.2750102
- H. M. Wang et al., Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks, IEEE Trans. Inform. Forens. Security 8, (2013), no. 12, 2007-2020. https://doi.org/10.1109/TIFS.2013.2287046
- H. M. Wang, Q. Yin, and X. G. Xia, Distributed beamforming for physical-layer security of two-way relay networks, IEEE Trans. Signal Process. 60, (2012), no. 7, 3532-3545. https://doi.org/10.1109/TSP.2012.2191543
- C. Jeong, I. M. Kim, and D. I. Kim, Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system, IEEE Trans. Signal Process. 60, (2012), no. 1, 310-325. https://doi.org/10.1109/TSP.2011.2172433
- J. Mo et al., Secure beamforming for MIMO two-way communications with an untrusted relay, IEEE Trans. Signal Process. 62, (2014), no. 9, 2185-2199. https://doi.org/10.1109/TSP.2014.2307276
- J. Xiong et al., Destination-aided cooperative jamming for dualhop amplify-and-forward MIMO untrusted relay systems, IEEE Trans. Veh. Technol. 65, (2016), no. 9, 7274-7284. https://doi.org/10.1109/TVT.2015.2490099
- J. Huang and A. L. Swindlehurst, Joint transmit design and node selection for one-way and two-way untrusted relay channels, Asilomar Conf. Signals, Syst. Comput. (ASILOMAR 2013), Pacific Grove, CA, USA, Nov. 2013, pp. 1555-1559.
- D. B. da Costa and S. Aissa, Beamforming in dual-hop fixed gain relaying systems, IEEE Int. Conf. Commun. (ICC), Dresden, Germany, 14-18, June 2009, pp. 1-5.
- J. Zhang and M. C. Gursoy, Relay beamforming strategies for physical-layer security, Annu. Conf. Inform. Sci. Syst. (CISS), Princeton, NJ, USA, Mar. 2010, pp. 1-6.
- X. Tang et al., Interference assisted secret communication, IEEE Trans. Infom., Theory 57 (2011), no. 5, May 2011, pp. 3153-3167. https://doi.org/10.1109/TIT.2011.2121450
- R. Yao et al., Secrecy rate-optimum energy splitting for an untrusted and energy harvesting relay network, IEEE Access 6, (2018), 19238-19246. https://doi.org/10.1109/ACCESS.2018.2819639
- A. Kuhestani, A. Mohammadi, and P. L. Yeoh, Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer, IEEE Trans. Commun. 66, (2018), no. 6, 2671-2684. https://doi.org/10.1109/TCOMM.2018.2802951
- D. S. Kalogerias et al., Mobile jammers for secrecy rate maximization in cooperative networks, IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Vancouver, Canada, May 2013, pp. 2901-2905.
- L. Lv et al., Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation, IET Commun. 11, (2017), no. 3, 393-399. https://doi.org/10.1049/iet-com.2016.0355
- S. A. A. Fakoorian and A. L. Swindlehurst, Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer, IEEE Trans. Signal Process. 59, (2011), no. 10, 5013-5022. https://doi.org/10.1109/TSP.2011.2161298
- A. Kuhestani and A. Mohammadi, Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: Resource allocation and performance study, IET Commun. 10, (2016), no. 1, 17-23. https://doi.org/10.1049/iet-com.2015.0078
- P. B. Bok et al., Distributed flow permission inspection for mission-critical communication of untrusted autonomous vehicles, IEEE Veh. Technol. Conf. (VTC2014-Fall), Vancouver, Canada, Sept. 2014, pp. 1-6.
- D. B. Rawat, R. Grodi, and C. Bajracharya, Enhancing connectivity for communication and control in unmanned aerial vehicle networks, IEEE Radio Wireless Symp. (RWS), San Diego, CA, USA, Jan. 2015, pp. 200-202.
- H. Chu and P. Xu, Relay selection with feedback beamforming information for NLoS 60 GHz mm wave WLANs/WPANs, IEEE Int. Conf. Commun. (ICC), Sydney, Australia, June 2014, pp. 5514-5519.
- W. W. Diab, N. Yousefi, and S. Powell, System and method for mirroring power over ethernet registers in a physical layer device over a single isolation boundary, U.S. Patent 8 428 248, April 23, 2013.
- T. Mekkawy et al., Joint beamforming alignment with suboptimal power allocation for a two-way untrusted relay network, IEEE Trans. Inform. Forens. Security 13, (2018), no. 10, 2464-2474. https://doi.org/10.1109/TIFS.2018.2819132
- R. Zhang et al., Optimal beamforming for two-way multi-antenna relay channel with analogue network coding, IEEE J. Sel. Areas Commun. 27, (2009), no. 5, 699-712. https://doi.org/10.1109/JSAC.2009.090611
- T. Mekkawy et al., Optimal power allocation for achievable secrecy rate in an untrusted relay network with bounded channel estimation error, Wireless Opt. Commun. Conf. (WOCC), Newark, NJ, USA, Apr. 2017, pp. 1-5.
- X. Chen et al., A survey on multiple-antenna techniques for physical layer security, IEEE Commun. Sur. Tut. 19, (2017), no. 2, 1027-1053. https://doi.org/10.1109/COMST.2016.2633387
- H. M. Wang, F. Liu, and X. G. Xia, Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks, IEEE Trans. Infom. Forens. Security 9, (2014), no. 8, 1240-1250. https://doi.org/10.1109/TIFS.2014.2327480
- N. Ouyang et al., Destination assisted jamming and beamforming for improving the security of AF relay systems, IEEE Access 5, (2017), 4125-4131. https://doi.org/10.1109/ACCESS.2017.2682838
- D. Senaratne and C. Tellambura, GSVD beamforming for twouser MIMO downlink channel, IEEE Trans. Veh. Technol. 62, (2013), no. 6, 2596-2606. https://doi.org/10.1109/TVT.2013.2241091
- D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge, U.K.: Cambridge Univ. Press, Sep. 2005.