1 |
G. B. Satrya and S. Y. Shin, "Evolutionary computing approach to optimize superframe scheduling on industrial wireless sensor networks," Journal of King Saud University - Computer and Information Sciences, 2020. https://doi.org/10.1016/j.jksuci.2020.01.014
DOI
|
2 |
A. Bagdadee, M. Hoque, and L. Zhang, "IoT based wireless sensor network for power quality control in smart grid," Procedia Computer Science, vol. 167, pp. 1148-1160, 2020.
DOI
|
3 |
D. Sun and S. Willmann, "Deep Learning-based dependability assessment method for industrial wireless network," IFAC-PapersOnLine, vol. 52, no. 24, pp. 219-224, 2019.
DOI
|
4 |
X. Li, D. Li, J. Wan, A. V. Vasilakos, C. F. Lai, and S. Wang, "A review of industrial wireless networks in the context of Industry 4.0," Wireless Networks, vol. 23, no. 1, pp. 23-41, 2017.
DOI
|
5 |
M. Kumar, R. Tripathi, and S. Tiwari, "QoS guarantee towards reliability and timeliness in industrial wireless sensor networks," Multimedia Tools and Applications, vol. 77, no. 4, pp. 4491-4508, 2018.
DOI
|
6 |
A. Khalil, A. Saadoui, M. Tabaa, M. Chehaitly, F. Moteiro, A. Oukaira, and A. Dandache, "Combined Reed-Solomon and convolutional codes for IWSN based on IDWPT/DWPT architecture," Procedia Computer Science, vol. 155, pp. 666-671, 2019.
DOI
|
7 |
Z. Liu, J. Wang, R. Sun, and Z. Wang, "Review on physical-layer security techniques of wireless communications," Communications Technology, vol. 47, no. 2, pp. 128-135, 2014.
DOI
|
8 |
Y. Zou, J. Zhu, X. Wang, and V. C. Leung, "Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29, no. 1, pp. 42-48, 2015.
DOI
|
9 |
Q. Lv, G. Han, and X. Fu, "Physical layer security in multi-hop AF relay network based on compressed sensing," IEEE Communications Letters, vol. 22, no. 9, pp. 1882-1885, 2018.
DOI
|
10 |
W. Zhao, Z. Chen, K. Li, B. Xia, and P. Chen, "Artificial interference aided physical layer security in cacheenabled heterogeneous networks," in Proceedings of 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 2018, pp. 1-5.
|
11 |
G. Cherukuri, S. Sharma, S. D. Roy, and S. Kundu, "Secrecy outage probability of dual hop amplify and forward relay in presence of an eavesdropper," in Proceedings of 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2017, pp. 694-698.
|
12 |
H. Lei, Z. Yang, K. Park, I. S. Ansari, Y. Cao, G. Pan, and M. S. Alouini, "Secrecy outage analysis for cooperative NOMA systems with relay selection scheme," IEEE Transactions on Communications, vol. 67, no. 9, pp. 6282-6298, 2019.
DOI
|
13 |
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wiretap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, 1978.
DOI
|
14 |
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2653-2661, 2014.
DOI
|
15 |
Y. Wang, T. Liao, and C. Wang, "An anti-eavesdrop transmission scheduling scheme based on maximizing secrecy outage probability in ad hoc networks," China Communications, vol. 13, no. 1, pp. 176-184, 2016.
DOI
|
16 |
Y. Zou and G. Wang, "Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack," IEEE Transactions on Industrial Informatics, vol. 12, no. 2, pp. 780-787, 2016.
DOI
|
17 |
J. M. Moualeu, W. Hamouda, and F. Takawira, "Intercept probability analysis of wireless networks in the presence of eavesdropping attack with co-channel interference," IEEE Access, vol. 6, pp. 41490-41503, 2018.
DOI
|
18 |
D. Lee and B. J. Jeong, "Performance analysis of combining space-time block coding and scheduling over arbitrary Nakagami fading channels" IEEE Transactions on Wireless Communications, vol. 13, no. 5, pp. 2540-2551, 2014.
DOI
|
19 |
S. Hussain and X. N. Fernando, "Closed-form analysis of relay-based cognitive radio networks over Nakagami-m fading channels," IEEE Transactions on Vehicular Technology, vol. 63, no. 3, pp. 1193-1203, 2014.
DOI
|
20 |
A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
DOI
|