[1] Haykin S.Cognitive radio:brain-empowered wireless communications[J].IEEE Journal on Selected Areas in Communications,2006,23(2):201-220.
[2] Khoshkholgh M G,Navaie K,Yanikomeroglu H.Access strategies for spectrum sharing in fading environment:overlay,underlay,and mixed[J].IEEE Transactions on Mobile Computing,2010,9(12):1780-1793.
[3] Attar A,Tang H,Vasilakos A V,et al.A survey of security challenges in cognitive radio networks:solutions and future research directions[J].Proceedings of the IEEE,2012,100(12):3172-3186.
[4] Gopala P K,Lai L,El Gamal H.On the secrecy capacity of fading channels[J].IEEE Transactions on Information Theory,2006,54(10):4687-4698.
[5] Dong L,Han Z,Petropulu A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888.
[6] Schaefer R F,Boche H.Physical layer service integration in wireless networks:signal processing challenges[J].IEEE Signal Processing Magazine,2014,31(3):147-156.
[7] 赵耀环,谢梦非,尚勇.物理层安全中的最优中继选择及协同干扰策略[J].电子学报,2015,43(4):791-794. Zhao Yao-huan,Xie Meng-fei,Shang Yong.Cooperative jamming with optimal relay selection and power allocation for physical layer security[J],Acta Electronica Sinica,2015,43(4):791-794(in Chinese).
[8] Pei Y,Liang Y C,Teh K C,et al.Secure communication in multiantenna cognitive radio networks with imperfect channel state information.[J].IEEE Transactions on Signal Processing,2011,59(4):1683-1693.
[9] Zou Y,Wang X,Shen W.Physical-layer security with multiuser scheduling in cognitive radio networks[J].IEEE Transactions on Communications,2013,61(12):5103-5113.
[10] Zhang H,Wang T,Song L,et al.Interference improves PHY security for cognitive radio networks[J].IEEE Transactions on Information Forensics & Security,2016,11(3):609-620.
[11] Sibomana L,Tran H,Zepernick H J.On physical layer security for cognitive radio networks with primary user interference[A].The 34th IEEE Military Communications Conference (Milcom-2015)[C].Tampa,FL,USA,2015.281-286.
[12] Wu Y,Liu K J R.An information secrecy game in cognitive radio networks[J].IEEE Transactions on Information Forensics & Security,2011,6(3):831-842.
[13] Gale D,Shapley L S.College admissions and the stability of marriage[J].American Mathematical Monthly,2013,120(69):9-15. |