WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
|
LAI L and El GAMAL H. Cooperative secrecy: the relay- eavesdropper channel[C]. Proceedings of IEEE International Symposium on Information Theory, Nice, 2007: 931-935. doi: 10.1109/ISIT.2007.4557343.
|
SHRESTHA A P and KWAK K S. Secure opportunistic scheduling with transmit antenna selection[C]. Proceedings of IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), London, 2013: 461-465. doi: 10.1109/PIMRC.2013.6666180.
|
LANEMAN J N, TSE D N C, and WORNELL G W. Cooperative diversity in wireless networks: efficient protocols and outage behavior[J]. IEEE Transactions on Information Theory, 2004, 50(12): 3062-3080. doi: 10.1109/TIT.2004. 838089.
|
WANG L, ELKASHLAN M, HUANG J, et al. Secure transmission with antenna selection in MIMO Nakagami-m fading channels[J]. IEEE Transactions on Wireless Communications, 2014, 13(11): 6054-6067. doi: 10.1109/ TWC.2014.2359877.
|
YEOH P L, ELKASHLAN M, DUONG T Q, et al. Transmit antenna selection for interference management in cognitive relay networks[J]. IEEE Transactions on Vehicular Technology, 2014, 63(7): 3250-3262. doi: 10.1109/TVT.2014. 2298387.
|
YANG N, YEOH P L, ELKASHLAN M, et al. Transmit antenna selection for security enhancement in MIMO wiretap channels[J]. IEEE Transactions on Communications, 2013, 61(1): 144-154. doi: 10.1109/TCOMM.2012.12.110670.
|
YANG N, ELKASHLAN M, YEOH P L, et al. Multiuser MIMO relay networks in Nakagami-m fading channels[J]. IEEE Transactions on Communications, 2012, 60(11): 3298-3310. doi: 10.1109/TCOMM.2012.081412.110463.
|
DUONG T Q, BAO V N Q, and ZEPERNICK H J. On the performance of selection decode-and-forward relay networks over Nakagami-m fading channels[J]. IEEE Communications Letters, 2009, 13(3): 172-174. doi: 10.1109/LCOMM.2009. 081858.
|
IKKI S S and AHMED M H. Performance analysis of adaptive decode-and-forward cooperative diversity networks with best-relay selection[J]. IEEE Transactions on Communications, 2010, 58(1): 68-72. doi: 10.1109/TCOMM. 2010.01.080080.
|
HUANG J and SWINDLEHURST A L. Cooperative jamming for secure communications in MIMO relay networks [J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884. doi: 10.1109/TSP.2011.2161295.
|
CHEN X, LEI L, ZHANG H, et al. Large-scale MIMO relaying techniques for physical layer security: AF or DF?[J]. IEEE Transactions on Wireless Communications, 2015, 14(9): 5135-5146. doi: 10.1109/TWC.2015.2433291.
|
ALVES H, BRANTE G, SOUZA R D, et al. On the performance of secure full-duplex relaying under composite fading channels[J]. IEEE Signal Processing Letters, 2015, 22(7): 867-870. doi: 10.1109/LSP.2014.2374994.
|
ZOU Y, WANG X, and SHEN W. Optimal relay selection for physical-layer security in cooperative wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(10): 2099-2111. doi: 10.1109/JSAC.2013.131011.
|
WU N E and LI H J. Effect of feedback delay on secure cooperative networks with joint relay and jammer selection[J]. IEEE Wireless Communications Letters, 2013, 2(4): 415-418. doi: 10.1109/WCL.2013.051513.130110.
|
GRADSHTEYN I S and RYZHIK I M. Table of Integrals, Series, and Products[M]. New York: Academic Press, 2007: 1-1161.
|