Acknowledgement
This work was supported in part by the National Natural Science Foundation of China (No. 62001320), the Key Research and Development Program of Shanxi (No. 201903D121117), the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi (No. 201802090), Research Project Supported by Shanxi Scholarship Council of China (No. 2020-126), Graduate Education Innovation Project of Shanxi (No. 2020SY419).
References
- G. B. Satrya and S. Y. Shin, "Evolutionary computing approach to optimize superframe scheduling on industrial wireless sensor networks," Journal of King Saud University - Computer and Information Sciences, 2020. https://doi.org/10.1016/j.jksuci.2020.01.014
- A. Bagdadee, M. Hoque, and L. Zhang, "IoT based wireless sensor network for power quality control in smart grid," Procedia Computer Science, vol. 167, pp. 1148-1160, 2020. https://doi.org/10.1016/j.procs.2020.03.417
- D. Sun and S. Willmann, "Deep Learning-based dependability assessment method for industrial wireless network," IFAC-PapersOnLine, vol. 52, no. 24, pp. 219-224, 2019. https://doi.org/10.1016/j.ifacol.2019.12.411
- X. Li, D. Li, J. Wan, A. V. Vasilakos, C. F. Lai, and S. Wang, "A review of industrial wireless networks in the context of Industry 4.0," Wireless Networks, vol. 23, no. 1, pp. 23-41, 2017. https://doi.org/10.1007/s11276-015-1133-7
- M. Kumar, R. Tripathi, and S. Tiwari, "QoS guarantee towards reliability and timeliness in industrial wireless sensor networks," Multimedia Tools and Applications, vol. 77, no. 4, pp. 4491-4508, 2018. https://doi.org/10.1007/s11042-017-4832-5
- A. Khalil, A. Saadoui, M. Tabaa, M. Chehaitly, F. Moteiro, A. Oukaira, and A. Dandache, "Combined Reed-Solomon and convolutional codes for IWSN based on IDWPT/DWPT architecture," Procedia Computer Science, vol. 155, pp. 666-671, 2019. https://doi.org/10.1016/j.procs.2019.08.095
- Z. Liu, J. Wang, R. Sun, and Z. Wang, "Review on physical-layer security techniques of wireless communications," Communications Technology, vol. 47, no. 2, pp. 128-135, 2014. https://doi.org/10.3969/j.issn.1002-0802.2014.02.002
- Y. Zou, J. Zhu, X. Wang, and V. C. Leung, "Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29, no. 1, pp. 42-48, 2015. https://doi.org/10.1109/MNET.2015.7018202
- Q. Lv, G. Han, and X. Fu, "Physical layer security in multi-hop AF relay network based on compressed sensing," IEEE Communications Letters, vol. 22, no. 9, pp. 1882-1885, 2018. https://doi.org/10.1109/lcomm.2018.2853101
- W. Zhao, Z. Chen, K. Li, B. Xia, and P. Chen, "Artificial interference aided physical layer security in cacheenabled heterogeneous networks," in Proceedings of 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 2018, pp. 1-5.
- G. Cherukuri, S. Sharma, S. D. Roy, and S. Kundu, "Secrecy outage probability of dual hop amplify and forward relay in presence of an eavesdropper," in Proceedings of 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2017, pp. 694-698.
- H. Lei, Z. Yang, K. Park, I. S. Ansari, Y. Cao, G. Pan, and M. S. Alouini, "Secrecy outage analysis for cooperative NOMA systems with relay selection scheme," IEEE Transactions on Communications, vol. 67, no. 9, pp. 6282-6298, 2019. https://doi.org/10.1109/tcomm.2019.2916070
- S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wiretap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, 1978. https://doi.org/10.1109/TIT.1978.1055917
- Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2653-2661, 2014. https://doi.org/10.1109/TVT.2013.2292903
- Y. Zou and G. Wang, "Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack," IEEE Transactions on Industrial Informatics, vol. 12, no. 2, pp. 780-787, 2016. https://doi.org/10.1109/TII.2015.2399691
- J. M. Moualeu, W. Hamouda, and F. Takawira, "Intercept probability analysis of wireless networks in the presence of eavesdropping attack with co-channel interference," IEEE Access, vol. 6, pp. 41490-41503, 2018. https://doi.org/10.1109/access.2018.2854222
- D. Lee and B. J. Jeong, "Performance analysis of combining space-time block coding and scheduling over arbitrary Nakagami fading channels" IEEE Transactions on Wireless Communications, vol. 13, no. 5, pp. 2540-2551, 2014. https://doi.org/10.1109/TWC.2014.031920.131810
- S. Hussain and X. N. Fernando, "Closed-form analysis of relay-based cognitive radio networks over Nakagami-m fading channels," IEEE Transactions on Vehicular Technology, vol. 63, no. 3, pp. 1193-1203, 2014. https://doi.org/10.1109/TVT.2013.2283078
- A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- Y. Wang, T. Liao, and C. Wang, "An anti-eavesdrop transmission scheduling scheme based on maximizing secrecy outage probability in ad hoc networks," China Communications, vol. 13, no. 1, pp. 176-184, 2016. https://doi.org/10.1109/CC.2016.7405714