1 |
X. Teng, J. B. Wendt, and M. Potkonjak, "Security of IoT systems: Design challenges and opportunities," in Proc. IEEE/ACM International Conference on Computer-Aided Design, Nov. 2014, pp. 417-423.
|
2 |
M. Centenaro, L. Vangelista, A. Zanella, and M. Zorzi, "Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios," IEEE Wireless Communications, vol. 23, no. 5, pp. 60-67, Oct. 2016.
DOI
|
3 |
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Transactiona on Information Theory, vol. 24, pp. 451-456, July 1978.
DOI
|
4 |
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
DOI
|
5 |
K.-H. Park, T. Wang, and M.-S. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1741-1750, Sep. 2013.
DOI
|
6 |
H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, "Secure relay and jammer selection for physical layer security," IEEE Signal Processing Letters, vol. 22, no. 8, pp. 1147-1151, Aug. 2015.
DOI
|
7 |
Y. Wang, Z. Chen, Y. Yao, M. Shen, and B. Xia, "Secure communications of cellular users in Device-to-device communication underlaying cellular networks," in 2014 Sixth International Conference on Wireless Communications and Signal Processing. (WCSP), 2014.
|