[1] A D Wyner.The wire-tap channel[J].Bell System Technical Journal,1975,54(8):1355-1387.
[2] M Bloch,M Debbah.Special issue on physical-layer security[J].Journal of Communications and Networks,2012,14(4):349-351.
[3] P H Lin,S H Lai.On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels[J].IEEE Journal on Selected Areas in Communications,2013,31(9):1728-1740.
[4] T H Chou,S C Draper.Secret key generation from sparse wireless channels:ergodic capacity and secrecy outage[J].IEEE Journal on Selected Areas in Communications,2013,31(9):1751-1764.
[5] G Dziwoki,W Sulek.Subchannel ordering scheme for LDPC-coded OFDM transmission over selective channels[A].International Conference on Telecommunications and Signal Processing[C].Rome:IEEE,2013.66-70.
[6] S Goel,R Negi.Guaranteeing secrecy using artificial noise[J].IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
[7] Xiangyun Zhou,Behrouz Maham.Pilot contamination for active eavesdropping[J].IEEE Transactions on Wireless Communications,2012,11(3):903-907.
[8] M Yuksel,E Erkip.Analysis and design of channel estimation in multi-cell multi-user MIMO OFDM systems[J].IEEE Transactions on Vehicular Technology,2014,64(2):610-620.
[9] Hao Li,Xianbin Wang.Dynamic subcarrier coordinate interleaving for eavesdropping prevention in OFDM systems[J].IEEE Communications Letters,2014,18(6):1059-1062.
[10] H Paik,N Sastry.Effectiveness of noise jamming with white Gaussian noise and phase noise in amplitude comparison monopulse radar receivers[A].IEEE International Conference on Electronics,Computing and Communication Technologies[C].Bangalore:IEEE,2014.1-5.
[11] S M Kay.Fundamentals of Statistical Signal Processing:Estimation Theory[M].New jersery:Prentice Hall,1993.
[12] A Mukherjee,A L Swindlehurst.Jamming games in the MIMO wiretap channel with an active eavesdropper[J].IEEE Transactions on Signal Processing,2013,61(1):82-91.
[13] A Mukherjee,A L Swindlehurst.Optimal strategies for countering dual-threat jamming/eavesdropping capable adversaries in MIMO channels[A].IEEE Military Communication[C].San Jose:IEEE,2010.476-481.
[14] Gan Zheng,Ioannis Krikidis,Jiangyuan Li.Improving physical layer secrecy using full-duplex jamming receivers[J].IEEE Transactions on Signal Processing,2013,61(20):4962-4974.
[15] Tamer Basar,Geert Jan Olsder.Dynamic Non-cooperative Game Theory[M].Second Edition.New York:Academic Press,1995. |