Citation: | LIU Jun, WANG Jingjing, LIU Weixin, et al., “A Novel Cooperative Physical Layer Security Scheme for Satellite Downlinks,” Chinese Journal of Electronics, vol. 27, no. 4, pp. 860-865, 2018, doi: 10.1049/cje.2018.05.016 |
J. Li, A.P. Etropulu and S. Weber, "On cooperative relaying schemes for wireless physical layer security", IEEE Transactions on Signal Processing, Vol.59, No.10, pp.4985-4997, 2015.
|
S. Redana, O. Bulakci, et al., "Relay-to-Relay interference coordination in a wireless communication network", Patent, WO/2012/089269,US,2012-05-07.
|
G. Zheng, L.C. Choo and K.K. Wong, "Optimal cooperative jamming to enhance physical layer security", IEEE Transactions on Signal Processing, Vol.59, No.3, pp.1317-1322, 2011.
|
Y.H. Zhao, M.F. Xie and Y. Shang, "Cooperative jamming with optimal relay selection and power allocation for physical layer security", Acta Electronica Sinica, Vol.43, No.4, pp.791-794, 2015. (in Chinese)
|
A. Mukherjee and A.L. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper", IEEE Transactions on Signal Processing, Vol.61, No.1, pp.82-91, 2010.
|
A. Sonee and S. Salimi, "A new achievable rate-equivocation region for the relay-eavesdropper channel", Proc. of Electrical Engineering (ICEE), Isfahan, Iran, pp.188-193, 2010.
|
C. Jeong, I.M. Kim and I.K. Dong," Joint secure beamforming design at the source and the relay for an amplify- and -forward MIMO untrusted relay system", IEEE Transactions on Signal Processing, Vol.60, No.1, pp.310-325, 2011.
|
J. Huang and A.L. Swindlehurst, "Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI", Proc. of Speech and Signal Processing (ICASSP) in Acoustics, Prague, Czech Republic, pp.3424-3427, 2012.
|
Z. Ding, K.K. Leung, et al.,"Opportunistic relaying for secrecy communications:Cooperative jamming vs. relay chatting", IEEE Transactions on Wireless Communications, Vol.10, No.6, pp.1725-1729, 2011.
|
T. Lun, "Cooperative node selection and power allocation strategy in two-way relay system", Journal of Electronicence & Information Technology of China, Vol.32, No.9, pp.2077-2082, 2010.
|
H.M. Wang, M. Luo, Q. Yin,et al., "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks", IEEE Transactions on Information Forensics & Security, Vol.8, No.12, pp.2007-2020, 2013.
|
L. Wang, C. Cao, M. Song, et al., "Joint cooperative relaying and jamming for maximum secrecy capacity in wireless networks", Proc. of 2014 IEEE International Conference on Communications (ICC), NSW, Sydney, pp.4448-4453, 2014.
|
J. Barros and M.R.D. Rodrigues, "Secrecy capacity of wireless channels", Proc. of 2006 IEEE International Symposium on Information Theory (ISIT), Seattle, USA, pp.356-360, 2006.
|
X. Li, H. Juite and E.P. Ratazzi, "Using antenna array redundancy and channel diversity for secure wireless transmissions", Journal of Communications, Vol.2, No.3, pp.24-32, 2007.
|
W.C. Liao, T.H. Chang, W.K. Ma, et al., "QoS-Based transmit beamforming in the presence of eavesdroppers:An optimized artificial-noise-aided approach", IEEE Transactions on Signal Processing, Vol.59, No.3, pp.1202-1216, 2011.
|