1 |
N. Romero-Zurita, D. McLernon, M. Ghogo, and A. Swami, "PHY layer security based on protected zone and artificial noise," IEEE Signal Processing Letters, vol. 20, no. 5, pp. 487-490, May 2013.
DOI
|
2 |
P. C. Pinto, J. Barros, and M. Z. Win, "Secure Communication in stochastic wireless networks-Part I: Connectivity," IEEE Trans. Info. Foren. and Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
DOI
|
3 |
M. Ghogo and A. Swami, "Physical-layer secrecy of MIMO communications in the presence of a Poisson random field of eavesdroppers," in Proc. IEEE Int. Conf. Commun. (ICC), Kyoto, Japan, pp. 1-5, Jun. 2011.
|
4 |
S. H. Chae, W. Choi, J. H. Lee, and T. Q. S. Quek, "Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zones," IEEE Trans. Info. Forens. and security, vol. 9, no. 10, pp. 1617-1628, Oct. 2014.
DOI
|
5 |
X. Zhou, R. Ganti, J. Andrews, and A. Hjorungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. on Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
DOI
|
6 |
H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, "Modeling and analysis of K-tier downlink heterogeneous cellular networks," IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550-560, Apr. 2012.
DOI
|