1 |
R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE GLOBECOM, Dec. 2010.
|
2 |
A. Wolf and E. A. Jorswieck, "On the zero forcing optimality for friendly jamming in MISO wiretap channels," in Proc. IEEE SPAWC, June 2010, p. 1.
|
3 |
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
DOI
ScienceOn
|
4 |
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints,"IET Commun., vol. 4, no. 15, pp. 1787-1791, Oct. 2010.
DOI
ScienceOn
|
5 |
I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
DOI
ScienceOn
|
6 |
J. Kim, A. Ikhlef, and R. Schober, "Combined relay selection and cooperative Beamforming for physical layer security," J. Commun. Netw., vol. 14, no. 14, Aug. 2012.
|
7 |
G. H. Golub and C. F. V. Loan, Matrix Computations. 3rd ed., Baltimore, MD: The Johns Hopkins Univ. Press, 1996.
|
8 |
C. Shannon, "Communication theory of secrecy systems," Bell Syst. Technical J., vol. 28, no. 4, pp. 656-715, 1949.
DOI
|
9 |
A. Wyner, "Wire-tap channel," Bell Syst. Technical J., vol. 54, no. 8, pp. 1355-1387, 1975.
DOI
ScienceOn
|
10 |
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
DOI
ScienceOn
|
11 |
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-2010, Mar. 2010.
DOI
ScienceOn
|
12 |
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
DOI
ScienceOn
|
13 |
J. Zhang and M. Gursoy, "Relay beamforming strategies for physical-layer security," in Proc. CISS, Mar. 2010, pp. 1-6.
|