[1] Wyner AD,The wire-tap channel[J].Bell Syst Tech J,1975,54(8):1355-1387.
[2] Csiszár I,Kørner J,Broadcast channels with confidential messages[J].IEEE Trans IT,1978,24(3):339-348.
[3] Leung-Yan-Cheong SK,Hellman ME.The gaussian wire-tap channel[J].IEEE Trans IT,1978,24(4):451-456.
[4] Goel S,Negi R.Guaranteeing secrecy using artificial noise[J].IEEE Trans WC,2008,7(6):2180-2189.
[5] Khisti A,Wornell G.Secure transmission with multiple antennas II:The MIMOME siretap channel[J].IEEE Trans IT,2010,56(11):5515-5532.
[6] Lai L,Gamal HE.The relay-eavesdropper channel:cooperation for secrecy[J].IEEE Trans IT,2008,54(9):4005-4019.
[7] Ekrem E,Ulukus S.Secrecy in cooperative relay broadcast channels[J].IEEE Trans IT,2011,57(1):137-155.
[8] Zhang J,Gursoy MC.Collaborative relay beamforming for secure broadcasting[A].Proc IEEE Wireless Commun Netw Conf.(WCNC)[C].Princeton,IEEE,2010.1-6.
[9] Zhang J,Gursoy MC.Relay beamforming strategies for physical-layer security[A].Proc 44th Annu Conf Inform Sci Syst.(CISS)[C].Sydney,IEEE,2010.1-6.
[10] Dong L,Han Z,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Trans Signal Process,2010,58(3):1875-1888.
[11] Yang Y,Li Q,et al.Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J].IEEE Signal Proc Letters,2013,20(1):35-38.
[12] Long H,Xiang W,et al.Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems[J].IEEE Trans IFS,2013,8(1):229-238.
[13] Wang HM,Yin Q,et al.Distributed beamforming for physical-layer security of two-way relay networks[J].IEEE Trans SP,2012,60(7):3532-3545.
[14] Mo J,Tao M,et al.Secure beamforming for MIMO two-way transmission with an untrusted relay[A].Proc IEEE Wireless Commun Netw Conf.(WCNC)[C].Shanghai,IEEE,2013.4180-4185.
[15] Li J,Petropulu AP,et al.On cooperative relaying schemes for wireless physical layer security[J].IEEE Trans SP,2011,59(10):4985-4997.
[16] Wang HM,Luo M,et al.Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI[J].IEEE Signal Proc Letters,2013,20(1):39-42.
[17] Wang HM,Yin Q,et al.Joint null-space beamforming and jamming to secure AF relay systems with individual power constraint[A].Acoustics,Speech and Signal Proc.(ICASSP),2013 IEEE International Conference on[C].Vancouver,IEEE,2013.2911-2914.
[18] Wang HM,Luo M,et al.Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks[J].IEEE Trans IFS,2013,8(12):2007-2020.
[19] Zheng G,Choo LC,et al.Optimal cooperative jamming to enhance physical layer security using relays[J].IEEE Trans SP,2011,59(3):1317-1322.
[20] Dong L,Yousefi'zadeh H,et al.Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper[A].Communications (ICC),2011 IEEE International Conference on[C].Kyoto,IEEE,2011.1-5.
[21] Tang L,Gong X,et al.Secure wireless communications via cooperative relaying and jamming[A].GC'11 workshop on physical-layer security[C].Houston,IEEE,2011.849-853.
[22] Tang X,Liu R,et al.Interference assisted secret communication[J].IEEE Trans IT,2011,57(5):3153-3167.
[23] Liu Y,Li J,et al.Destination assisted cooperative jamming for wireless physical-layer security[J].IEEE Trans IFS,2013,8(4):682-694.
[24] Park KH,Wang T,et al.On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming[J].IEEE J Select Areas Commun,2013,31(9):1741-1750.
[25] Yang B,Wang W,et al.Destination assisted secret wireless communication with cooperative helpers[J].IEEE Signal Proc.Letters,2013,20(11):1030-1033.
[26] Foschini GJ,Chizhik D,et al.Analysis and performance of some basic spacetime architectures[J].IEEE J Select Areas Commun,2013,21(1):303-320.
[27] Boyd S,Vandenberghe L,Convex Optimization[M].Combridge University Press,2004. |