共 17 条
[1]
Gupta P., Kumar P., The capacity of wireless networks, IEEE Transactions on Information Theory, 46, 2, pp. 388-404, (2000)
[2]
Wyner A.D., The wire-tap channel, Bell System Technical Journal, 54, 8, pp. 1355-1387, (1975)
[3]
Liu R., Maric I., Spasojevic P., Et al., Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions, IEEE Transactions on Information Theory, 54, 6, pp. 2493-2507, (2008)
[4]
Jorswieck E., Lai L.-F., Ma W.-K., Signal processing for wireless physical layer security, IEEE Journal on Selected Areas in Communications, 31, 9, pp. 1657-1659, (2013)
[5]
Marano S., Matta V., Achieving perfect secrecy by pdf band limited jamming, IEEE Signal Processing Letters, 21, 1, pp. 83-87, (2014)
[6]
Liu B., Zhang L., Xin X., Physical layer security in OFDMPON based on dimension-transformed chaotic permutation, IEEE Photonics Technology Letters, 26, 2, pp. 127-130, (2014)
[7]
Lin P.H., Lai S.H., Lin S.C., On secrecy rate of the generalized artificial-Noise assisted secure beamforming for wiretap channels, IEEE Journal on Selected Areas in Communications, 31, 9, pp. 1728-1740, (2013)
[8]
Zhang R.-Q., Song L.-Y., Physical layer security for two-way untrusted relaying with friendly jammers, IEEE Transactions on Vehicular Technology, 61, 8, pp. 3693-3704, (2012)
[9]
Zhou J., Security of wireless communication based on game theory, (2013)
[10]
Manzoor A.K., Hamidou T., Athanasios V., Evolutionary coalitional games: design and challenges in wireless networks, IEEE Wireless Communications, 19, 2, pp. 50-56, (2012)