-
1
-
-
84959499960
-
Wireless physical-layer security: Lessons learned from information theory
-
Oct
-
A. Yener and S. Ulukus, "Wireless physical-layer security: Lessons learned from information theory," Proc. IEEE, vol. 103, no. 10, pp. 1814-1825, Oct. 2015.
-
(2015)
Proc. IEEE
, vol.103
, Issue.10
, pp. 1814-1825
-
-
Yener, A.1
Ulukus, S.2
-
2
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb
-
C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
3
-
-
84927712570
-
Safeguarding 5G wireless communication networks using physical layer security
-
Apr
-
N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. Di Renzo, "Safeguarding 5G wireless communication networks using physical layer security," IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.4
, pp. 20-27
-
-
Yang, N.1
Wang, L.2
Geraci, G.3
Elkashlan, M.4
Yuan, J.5
Di Renzo, M.6
-
4
-
-
84961815117
-
Physical layer security in wireless cooperative relay networks: State of the art and beyond
-
Dec
-
L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and S. Shetty, "Physical layer security in wireless cooperative relay networks: State of the art and beyond," IEEE Commun. Mag., vol. 53, no. 12, pp. 32-39, Dec. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.12
, pp. 32-39
-
-
Rodriguez, L.J.1
Tran, N.H.2
Duong, T.Q.3
Le-Ngoc, T.4
Elkashlan, M.5
Shetty, S.6
-
5
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Sep
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. Inf. Theory Workshop, Sep. 2001, pp. 87-89.
-
(2001)
Proc. Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
6
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
New Orleans, LA, USA, Dec
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), New Orleans, LA, USA, Dec. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
7
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper, and friendly jammer
-
Mar
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: Interaction between source, eavesdropper, and friendly jammer," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 452907-1-452907-10, Mar. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
, pp. 4529071-45290710
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
8
-
-
84891350212
-
Cooperative jamming protocols in two hop amplify-and-forward wiretap channels
-
Budapest, Hungary, Nov
-
D. Fang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Cooperative jamming protocols in two hop amplify-and-forward wiretap channels," in Proc. IEEE Int. Conf. Commun. (ICC), Budapest, Hungary, Nov. 2013, pp. 2188-2192.
-
(2013)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 2188-2192
-
-
Fang, D.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
-
9
-
-
45249101530
-
The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
10
-
-
84982305842
-
Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays
-
Aug
-
L. Wang, Y. Cai, Y. Zou, W. Yang, and L. Hanzo, "Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays," IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6259-6274, Aug. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.8
, pp. 6259-6274
-
-
Wang, L.1
Cai, Y.2
Zou, Y.3
Yang, W.4
Hanzo, L.5
-
11
-
-
85029212593
-
Antieavesdropping with selfish jamming in wireless networks: A bertrand game approach
-
Jul
-
K. Wang, L. Yuan, T. Miyazaki, S. Guo, and Y. Sun, "Antieavesdropping with selfish jamming in wireless networks: A bertrand game approach," IEEE Trans. Veh. Technol., vol. 66, no. 7, pp. 6268-6279, Jul. 2017.
-
(2017)
IEEE Trans. Veh. Technol.
, vol.66
, Issue.7
, pp. 6268-6279
-
-
Wang, K.1
Yuan, L.2
Miyazaki, T.3
Guo, S.4
Sun, Y.5
-
12
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
13
-
-
84903317482
-
Secure transmission with optimal power allocation in untrusted relay networks
-
Jun
-
L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure transmission with optimal power allocation in untrusted relay networks," IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
-
(2014)
IEEE Wireless Commun. Lett.
, vol.3
, Issue.3
, pp. 289-292
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
Tran, N.H.4
Duong, T.Q.5
-
14
-
-
84969546646
-
Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay
-
May
-
A. Kuhestani, A. Mohammadi, and M. Noori, "Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay," IET Commun., vol. 10, no. 8, pp. 962-968, May 2016.
-
(2016)
IET Commun.
, vol.10
, Issue.8
, pp. 962-968
-
-
Kuhestani, A.1
Mohammadi, A.2
Noori, M.3
-
15
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Oct
-
L. Sun, T. Zhang, Y. Li, and N. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, N.4
-
16
-
-
84937132656
-
Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays
-
Jul
-
J.-B. Kim, J. Lim, and J. M. Cioffi, "Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays," IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3866-3876, Jul. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.7
, pp. 3866-3876
-
-
Kim, J.-B.1
Lim, J.2
Cioffi, J.M.3
-
17
-
-
85029158278
-
Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers
-
Feb
-
A. Kuhestani, A. Mohammadi, and M. Mohammadi, "Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers," IEEE Trans. Inf. Forensics Security, vol. 13, no. 2, pp. 341-355, Feb. 2018.
-
(2018)
IEEE Trans. Inf. Forensics Security
, vol.13
, Issue.2
, pp. 341-355
-
-
Kuhestani, A.1
Mohammadi, A.2
Mohammadi, M.3
-
18
-
-
84961675624
-
Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network
-
Mar
-
A. Kuhestani, A. Mohammadi, and M. Masoudi, "Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network," IET Netw., vol. 5, no. 2, pp. 30-36, Mar. 2016.
-
(2016)
IET Netw.
, vol.5
, Issue.2
, pp. 30-36
-
-
Kuhestani, A.1
Mohammadi, A.2
Masoudi, M.3
-
19
-
-
84994153133
-
EE-RS and PA for untrusted relay network at high signal-to-noise ratio regime
-
Oct
-
H. Zarrabi, A. Kuhestani, and M. Moradikia, "EE-RS and PA for untrusted relay network at high signal-to-noise ratio regime," IET Commun., vol. 10, no. 16, pp. 2143-2148, Oct. 2016.
-
(2016)
IET Commun.
, vol.10
, Issue.16
, pp. 2143-2148
-
-
Zarrabi, H.1
Kuhestani, A.2
Moradikia, M.3
-
20
-
-
84937019957
-
Resource management based on security satisfaction ratio with fairness-aware in two-way relay networks
-
Jan
-
J. Zhao, Z. Lu, X. Wen, H. Zhang, S. He, and W. Jing, "Resource management based on security satisfaction ratio with fairness-aware in two-way relay networks," Int. J. Distrib. Sensor Netw., vol. 2015, no. 11, pp. 1-11, Jan. 2015.
-
(2015)
Int. J. Distrib. Sensor Netw.
, vol.2015
, Issue.11
, pp. 1-11
-
-
Zhao, J.1
Lu, Z.2
Wen, X.3
Zhang, H.4
He, S.5
Jing, W.6
-
21
-
-
84877685502
-
Secure resource allocation for OFDMA two-way relay networks
-
Anaheim, CA, USA, Dec
-
H. Zhang, H. Xing, X. Chu, A. Nallanathan, W. Zheng, and X. Wen, "Secure resource allocation for OFDMA two-way relay networks," in Proc. IEEE Globecom, Anaheim, CA, USA, Dec. 2012, pp. 3649-3654.
-
(2012)
Proc. IEEE Globecom
, pp. 3649-3654
-
-
Zhang, H.1
Xing, H.2
Chu, X.3
Nallanathan, A.4
Zheng, W.5
Wen, X.6
-
22
-
-
85027732333
-
Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming
-
Oct
-
H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. C. M. Leung, "Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming," IEEE Trans. Ind. Informat., vol. 12, no. 5, pp. 1714-1725, Oct. 2016.
-
(2016)
IEEE Trans. Ind. Informat.
, vol.12
, Issue.5
, pp. 1714-1725
-
-
Zhang, H.1
Xing, H.2
Cheng, J.3
Nallanathan, A.4
Leung, V.C.M.5
-
23
-
-
84940732183
-
Resource allocation for OFDMA two-way relay networks with the smart grid
-
Sydney, NSW, Australia, Sep
-
D. Zhan, H. Zhang, Z. Lu, X. Wen, and Y. Chen, "Resource allocation for OFDMA two-way relay networks with the smart grid," in Proc. IEEE Wireless Pers. Multimedia Commun. (WPMC), Sydney, NSW, Australia, Sep. 2014, pp. 657-662.
-
(2014)
Proc. IEEE Wireless Pers. Multimedia Commun. (WPMC)
, pp. 657-662
-
-
Zhan, D.1
Zhang, H.2
Lu, Z.3
Wen, X.4
Chen, Y.5
-
24
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
25
-
-
84901257838
-
Joint transmit design and node selection for one-way and two-way untrusted relay channels
-
Syst. Comput., Nov
-
J. Huang and A. L. Swindlehurst, "Joint transmit design and node selection for one-way and two-way untrusted relay channels," in Proc. Asilomar Conf. Signals, Syst. Comput., Nov. 2013, pp. 1555-1559.
-
(2013)
Proc. Asilomar Conf. Signals
, pp. 1555-1559
-
-
Huang, J.1
Swindlehurst, A.L.2
-
26
-
-
84898039745
-
Secure beamforming for MIMO two-way communications with an untrusted relay
-
May
-
J. Mo, M. Tao, Y. Liu, and R. Wang, "Secure beamforming for MIMO two-way communications with an untrusted relay," IEEE Trans. Signal Process., vol. 62, no. 9, pp. 2185-2199, May 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.9
, pp. 2185-2199
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Wang, R.4
-
27
-
-
85009956145
-
Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network
-
Jan
-
K. P. Roshandeh, A. Kuhestani, M. Ardakani, and C. Tellambura, "Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network," IET Commun., vol. 11, no. 2, pp. 211-217, Jan. 2017.
-
(2017)
IET Commun.
, vol.11
, Issue.2
, pp. 211-217
-
-
Roshandeh, K.P.1
Kuhestani, A.2
Ardakani, M.3
Tellambura, C.4
-
28
-
-
85046342087
-
Optimal power allocation and secrecy sum rate in two-way untrusted relaying
-
Singapore, Dec
-
A. Kuhestani, P. L. Yeoh, and A. Mohammadi, "Optimal power allocation and secrecy sum rate in two-way untrusted relaying," in Proc. IEEE Globecom, Singapore, Dec. 2017, pp. 1-5.
-
(2017)
Proc. IEEE Globecom
, pp. 1-5
-
-
Kuhestani, A.1
Yeoh, P.L.2
Mohammadi, A.3
-
29
-
-
84928642759
-
Secure compute-andforward in a bidirectional relay
-
May
-
S. Vatedka, N. Kashyap, and A. Thangaraj, "Secure compute-andforward in a bidirectional relay," IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2531-2556, May 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.5
, pp. 2531-2556
-
-
Vatedka, S.1
Kashyap, N.2
Thangaraj, A.3
-
30
-
-
84928974649
-
Weak secrecy in the multiway untrusted relay channel with computeand-forward
-
Jun
-
J. Richter, C. Scheunert, S. Engelmann, and E. A. Jorswieck, "Weak secrecy in the multiway untrusted relay channel with computeand-forward," IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1262-1273, Jun. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.6
, pp. 1262-1273
-
-
Richter, J.1
Scheunert, C.2
Engelmann, S.3
Jorswieck, E.A.4
-
31
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
32
-
-
67651180823
-
Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation
-
Jun
-
R. H. Y. Louie, Y. Li, H. A. Suraweera, and B. Vucetic, "Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation," IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 3132-3141, Jun. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.6
, pp. 3132-3141
-
-
Louie, R.H.Y.1
Li, Y.2
Suraweera, H.A.3
Vucetic, B.4
-
33
-
-
84893403880
-
Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
-
Feb
-
L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.2
, pp. 247-258
-
-
Wang, L.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
-
34
-
-
0003498504
-
-
7th ed. New York, NY, USA: Academic
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
35
-
-
84919781032
-
Random matrix theory and wireless communications
-
A. M. Tulino and S. Verdú, "Random matrix theory and wireless communications," Found. Trends Commun. Inf. Theory, vol. 1, no. 1, pp. 1-182, 2004.
-
(2004)
Found. Trends Commun. Inf. Theory
, vol.1
, Issue.1
, pp. 1-182
-
-
Tulino, A.M.1
Verdú, S.2
-
36
-
-
84881085687
-
An accurate approximation of the exponential integral function using a sum of exponentials
-
Jul
-
A. A. Alkheir and M. Ibnkahla, "An accurate approximation of the exponential integral function using a sum of exponentials," IEEE Commun. Lett., vol. 17, no. 7, pp. 1364-1367, Jul. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.7
, pp. 1364-1367
-
-
Alkheir, A.A.1
Ibnkahla, M.2
-
37
-
-
84964855005
-
Secrecy outage probability of selective relaying wiretap channels with collaborative eavesdropping
-
San Diego, CA, USA, Dec
-
P. L. Yeoh, N. Yang, and K. J. Kim, "Secrecy outage probability of selective relaying wiretap channels with collaborative eavesdropping," in Proc. IEEE Globecom, San Diego, CA, USA, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE Globecom
, pp. 1-6
-
-
Yeoh, P.L.1
Yang, N.2
Kim, K.J.3
|