-
1
-
-
84964818200
-
Secure multi-antenna transmission in three-tier wireless sensor networks
-
Dec.
-
Y. Deng, L. Wang, M. Elkashlan, R. K. Mallik, A. Nallanathan, "Secure multi-antenna transmission in three-tier wireless sensor networks," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Dec. 2015, pp. 1-5.
-
(2015)
Proc IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
Deng, Y.1
Wang, L.2
Elkashlan, M.3
Mallik, R.K.4
Nallanathan, A.5
-
2
-
-
0036688074
-
A survey on sensor networks
-
Aug.
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
84858162419
-
Information and inference in the wireless physical layer
-
Feb.
-
H. V. Poor, "Information and inference in the wireless physical layer," IEEE Wireless Commun., vol. 19, no. 1, pp. 40-47, Feb. 2012.
-
(2012)
IEEE Wireless Commun.
, vol.19
, Issue.1
, pp. 40-47
-
-
Poor, H.V.1
-
5
-
-
84903148893
-
Physical layer security in downlink multi-antenna cellular networks
-
Jun.
-
G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, I. B. Collings, "Physical layer security in downlink multi-antenna cellular networks," IEEE Trans. Commun., vol. 62, no. 6, pp. 2006-2021, Jun. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.6
, pp. 2006-2021
-
-
Geraci, G.1
Dhillon, H.S.2
Andrews, J.G.3
Yuan, J.4
Collings, I.B.5
-
6
-
-
84880159277
-
Physical layer security in cellular networks: A stochastic geometry approach
-
Jun.
-
H. Wang, X. Zhou, M. C. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, Jun. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2776-2787
-
-
Wang, H.1
Zhou, X.2
Reed, M.C.3
-
7
-
-
77951274829
-
Secure communication over MISO cognitive radio channels
-
Apr.
-
Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.4
, pp. 1494-1502
-
-
Pei, Y.1
Liang, Y.-C.2
Zhang, L.3
Teh, K.C.4
Li, K.H.5
-
8
-
-
84953729290
-
On the security of large scale spectrum sharing networks
-
Jun.
-
Y. Deng, L. Wang, S. A. R. Zaidi, J. Yuan, M. Elkashlan, "On the security of large scale spectrum sharing networks," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2015, pp. 4877-4882.
-
(2015)
Proc IEEE Int. Conf. Commun. (ICC)
, pp. 4877-4882
-
-
Deng, Y.1
Wang, L.2
Zaidi, S.A.R.3
Yuan, J.4
Elkashlan, M.5
-
9
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
10
-
-
84884537599
-
Optimal relay selection for physicallayer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
11
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
Dec.
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Dec. 2008, pp. 1-5.
-
(2008)
Proc IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
12
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
13
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. K. Ganti, J. G. Andrews, A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjørungnes, A.4
-
14
-
-
84887058800
-
Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
-
Nov.
-
X. Zhang, X. Zhou, M. R. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1802-1814
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
15
-
-
84975700626
-
Safeguarding massive MIMO aided hetnets using physical layer security
-
Oct.
-
Y. Deng, L. Wang, K.-K. Wong, A. Nallanathan, M. Elkashlan, S. Lambotharan, "Safeguarding massive MIMO aided hetnets using physical layer security," in Proc. Int. Wireless Commun. Signal Process. (WCSP), Oct. 2015, pp. 1-5.
-
(2015)
Proc. Int. Wireless Commun. Signal Process. (WCSP)
, pp. 1-5
-
-
Deng, Y.1
Wang, L.2
Wong, K.-K.3
Nallanathan, A.4
Elkashlan, M.5
Lambotharan, S.6
-
16
-
-
27744501279
-
Array-transmission based physicallayer security techniques for wireless sensor networks
-
Jul.
-
X. Li, M. Chen, E. P. Ratazzi, "Array-transmission based physicallayer security techniques for wireless sensor networks," in Proc. IEEE Int. Conf. Mechatron. Autom. (ICMA), Jul. 2005, pp. 1618-1623.
-
(2005)
Proc IEEE Int. Conf. Mechatron. Autom. (ICMA)
, pp. 1618-1623
-
-
Li, X.1
Chen, M.2
Ratazzi, E.P.3
-
17
-
-
65649139984
-
Distributed detection with censoring sensors under physical layer secrecy
-
May
-
S. Marano, V. Matta, P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, May 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.5
, pp. 1976-1986
-
-
Marano, S.1
Matta, V.2
Willett, P.K.3
-
18
-
-
84863928823
-
Scalable PHY-layer security for distributed detection in wireless sensor networks
-
Aug.
-
R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1118-1126
-
-
Soosahabi, R.1
Naraghi-Pour, M.2
-
19
-
-
84899636821
-
Amplify-andforward compressed sensing as a physical-layer secrecy solution in wireless sensor networks
-
May
-
J. E. Barcelo-Llado, A. Morell, G. Seco-Granados, "Amplify-andforward compressed sensing as a physical-layer secrecy solution in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 839-850, May 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.5
, pp. 839-850
-
-
Barcelo-Llado, J.E.1
Morell, A.2
Seco-Granados, G.3
-
20
-
-
84859052098
-
Modeling and analysis of K-tier downlink heterogeneous cellular networks
-
Apr.
-
H. S. Dhillon, R. K. Ganti, F. Baccelli, J. G. Andrews, "Modeling and analysis of K-tier downlink heterogeneous cellular networks," IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550-560, Apr. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.3
, pp. 550-560
-
-
Dhillon, H.S.1
Ganti, R.K.2
Baccelli, F.3
Andrews, J.G.4
-
21
-
-
85028099494
-
Interference and outage in Poisson cognitive networks
-
Apr.
-
C.-H. Lee and M. Haenggi, "Interference and outage in Poisson cognitive networks," IEEE Trans. Wireless Commun., vol. 11, no. 4, pp. 1392-1401, Apr. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.4
, pp. 1392-1401
-
-
Lee, C.-H.1
Haenggi, M.2
-
22
-
-
84880180988
-
Random deployment of data collectors for serving randomly-located sensors
-
Jun.
-
T. Kwon and J. M. Cioffi, "Random deployment of data collectors for serving randomly-located sensors," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2556-2565, Jun. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2556-2565
-
-
Kwon, T.1
Cioffi, J.M.2
-
23
-
-
79952985353
-
Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel
-
Mar.
-
M. Yuksel and E. Erkip, "Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 762-771, Mar. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.3
, pp. 762-771
-
-
Yuksel, M.1
Erkip, E.2
-
24
-
-
84893403880
-
Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
-
Feb.
-
L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.2
, pp. 247-258
-
-
Wang, L.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
-
25
-
-
84963967276
-
-
Hoboken, NJ, USA: Wiley
-
D. Stoyan, W. S. Kendall, J. Mecke, Stochastic Geometry and Its Applications, vol. 2. Hoboken, NJ, USA: Wiley, 1987.
-
(1987)
Stochastic Geometry, Its Applications 2
-
-
Stoyan, D.1
Kendall, W.S.2
Mecke, J.3
|