[1] |
MASSEY J L. An introduction to contemporary cryptology[J]. Proceedings of the IEEE, 1988,76(5):533-549.
|
[2] |
WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 2014, 54(8): 1355-1387.
|
[3] |
CHEONG S L Y, HELLMAN M. The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 2003, 24(4): 451-456.
|
[4] |
MUKHERJEE A, FAKOORIAN S A, HUANG J, et al. Principles of physical layer security in multiuser wireless networks: A survey[J]. IEEE Communications Surveys and Tutorials, 2014, 16(3): 1550-1573.
|
[5] |
刘春国,李立忠. MIMO系统的物理层安全性[J]. 电讯技术,2015, 55(7): 725-729.
|
[6] |
LIAO W C, CHANG T H, MA W K, et al. QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificialnoise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3):1202-1216.
|
[7] |
BASHAR S, DING Z, LI G Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback[J]. IEEE Transactions on Wireless Communications, 2011, 10(4):1212-1223.
|
[8] |
王东,李永成,白铂,等. 放大转发中继网络中绿色的物理层安全通信技术[J].电子与信息学报, 2016,38(4):841-847.
|
[9] |
雷维嘉,左莉杰,江雪,等. 中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案[J]. 电子与信息学报,2015, 37(9): 2191-2197.
|
[10] |
王鼎宇,付晓梅,厚丽君. 中继行为的物理层安全博弈模型研究[J]. 南开大学学报, 2015, 5(5): 96-101.
|
[11] |
GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transations on Wireless Communications, 2008, 7(6): 2180-2189.
|
[12] |
SANAYEI S, NOSRATINIA A. Antenna selection in MIMO systems[J]. IEEE Communication Magazine, 2004, 42(10): 68-73.
|
[13] |
ALVE H, SOUZA R D, DEBBAH M, et tal. Performance of transmit antenna selection physical layer security schemes[J]. IEEE Signal Processing Letters, 2012, 19(6): 372-375.
|
[14] |
CHEN Z, YUAN J, VUCETIC B. Analysis of transmit antenna selection/maximal-ratio combining in rayleigh fading channels[J]. IEEE Transactions on Vehicular Technology, 2005, 54(4): 1312-1321.
|
[15] |
WANG L F, ELKASHALN M, HUANG J, et al. Secure transmission with antenna selection in MIMO nakagami-m fading channels[J]. IEEE Transations on Wireless Communications, 2014, 13(11): 6054-6067.
|
[16] |
YANG N, YEOH P L, ELKASHLAN M, et al. Transmit antenna selection for security enhancement in MIMO wiretap channels[J]. IEEE Transations on Wireless Communications, 2013, 61(1): 144-154.
|
[17] |
张亚军,梁涛,柳永祥,等. 联合发端天线选择和收端人工噪声的物理层安全传输方法[J]. 电子与信息学报, 2015, 37(9): 2183-2190.
|
[18] |
邓单,王伟,赵明. 联合天线选择和人工噪声的安全传输技术[J]. 系统仿真学报,2016,28(2):321-327.
|
[19] |
洪涛,宋茂忠,王保云. 基于随机天线阵列的物理层安全通信系统峰均功率比问题研究[J]. 电子与信息学报,2015,37(1):188-192.
|
[20] |
GRADSHTEYN I S, RYZHIK I M. Table of Integrals, Series and Products[M]. San Diego: Elsevier, 2007:25,337,340-341.
|
[1] |
MASSEY J L. An introduction to contemporary cryptology[J]. Proceedings of the IEEE, 1988,76(5):533-549.
|
[2] |
WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 2014, 54(8): 1355-1387.
|
[3] |
CHEONG S L Y, HELLMAN M. The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 2003, 24(4): 451-456.
|
[4] |
MUKHERJEE A, FAKOORIAN S A, HUANG J, et al. Principles of physical layer security in multiuser wireless networks: A survey[J]. IEEE Communications Surveys and Tutorials, 2014, 16(3): 1550-1573.
|
[5] |
刘春国,李立忠. MIMO系统的物理层安全性[J]. 电讯技术,2015, 55(7): 725-729.
|
[6] |
LIAO W C, CHANG T H, MA W K, et al. QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificialnoise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3):1202-1216.
|
[7] |
BASHAR S, DING Z, LI G Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback[J]. IEEE Transactions on Wireless Communications, 2011, 10(4):1212-1223.
|
[8] |
王东,李永成,白铂,等. 放大转发中继网络中绿色的物理层安全通信技术[J].电子与信息学报, 2016,38(4):841-847.
|
[9] |
雷维嘉,左莉杰,江雪,等. 中继网络中不准确信道状态信息下抗多窃听者的物理层安全方案[J]. 电子与信息学报,2015, 37(9): 2191-2197.
|
[10] |
王鼎宇,付晓梅,厚丽君. 中继行为的物理层安全博弈模型研究[J]. 南开大学学报, 2015, 5(5): 96-101.
|
[11] |
GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transations on Wireless Communications, 2008, 7(6): 2180-2189.
|
[12] |
SANAYEI S, NOSRATINIA A. Antenna selection in MIMO systems[J]. IEEE Communication Magazine, 2004, 42(10): 68-73.
|
[13] |
ALVE H, SOUZA R D, DEBBAH M, et tal. Performance of transmit antenna selection physical layer security schemes[J]. IEEE Signal Processing Letters, 2012, 19(6): 372-375.
|
[14] |
CHEN Z, YUAN J, VUCETIC B. Analysis of transmit antenna selection/maximal-ratio combining in rayleigh fading channels[J]. IEEE Transactions on Vehicular Technology, 2005, 54(4): 1312-1321.
|
[15] |
WANG L F, ELKASHALN M, HUANG J, et al. Secure transmission with antenna selection in MIMO nakagami-m fading channels[J]. IEEE Transations on Wireless Communications, 2014, 13(11): 6054-6067.
|
[16] |
YANG N, YEOH P L, ELKASHLAN M, et al. Transmit antenna selection for security enhancement in MIMO wiretap channels[J]. IEEE Transations on Wireless Communications, 2013, 61(1): 144-154.
|
[17] |
张亚军,梁涛,柳永祥,等. 联合发端天线选择和收端人工噪声的物理层安全传输方法[J]. 电子与信息学报, 2015, 37(9): 2183-2190.
|
[18] |
邓单,王伟,赵明. 联合天线选择和人工噪声的安全传输技术[J]. 系统仿真学报,2016,28(2):321-327.
|
[19] |
洪涛,宋茂忠,王保云. 基于随机天线阵列的物理层安全通信系统峰均功率比问题研究[J]. 电子与信息学报,2015,37(1):188-192.
|
[20] |
GRADSHTEYN I S, RYZHIK I M. Table of Integrals, Series and Products[M]. San Diego: Elsevier, 2007:25,337,340-341.
|