Citation: | HUANG Kaizhi, WANG Bing, XU Xiaoming, KANG Xiaolei, ZHANG Bo. An Enhanced Coordinated Multipoint Transmission Policy Based on Secrecy Guard Zone[J]. Journal of Electronics & Information Technology, 2018, 40(1): 108-115. doi: 10.11999/JEIT170478 |
WANG C X, HAIDER F, GAO X Q, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. IEEE Communications Magazine, 2014, 52(2): 122-130. doi: 10.1109/MCOM.2014. 6736752.
|
BOCCARDI F, HEATH R W, LOZANO A, et al. Five disruptive technology directions for 5G[J]. IEEE Communications Magazine, 2013, 52(2): 74-80. doi: 10.1109/ MCOM.2014.6736746.
|
YANG N, WANG L F, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015, 53(4): 20-27. doi: 10.1109/MCOM.2015.7081071.
|
ZHONG Z H, PENG J H, LUO W Y, et al. A tractable approach to analyzing the physical-layer security in k-tier heterogeneous cellular networks[J]. China Communications, 2015, 12(s1): 166173. doi: 10.1109/CC.2015.7386165.
|
L T J, GAO H, and YANG S S. Secrecy transmit beamforming for heterogeneous networks[J]. IEEE Journal on Selected Areas in Communications, 2015, 33(6): 1154-1170. doi: 10.1109/JSAC.2015.2416984.
|
钟智豪, 罗文宇, 彭建华. 多层异构蜂窝网协作传输和协作干扰机制的安全性能分析[J]. 中国科学: 信息科学, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
|
ZHONG Zhihao, LUO Wenyu, and PENG Jianhua. Secrecy performance analysis of cooperative transmission and cooperative jamming for multi-tier heterogeneous cellular networks[J]. Science China Information Sciences, 2016, 46(1): 33-48. doi: 10.1360/N112015-00174.
|
WU H C, TAO X F, LI N, et al. Secrecy outage probability in multi-rat heterogeneous networks[J]. IEEE Communications Letters, 2016, 20(1): 53-56. doi: 10.1109/LCOMM.2015. 2499748.
|
WANG H M, ZHENG T X, YUAN J H, et al. Physical layer security in heterogeneous cellular networks[J]. IEEE Transactions on Communications, 2016, 64(3): 1204-1219. doi: 10.1109/TCOMM.2016.2519402.
|
QI X H, HUANG K Z, ZHONG Z H, et al. Physical layer security of multi-hop aided downlink MIMO heterogeneous cellular networks[J]. China Communications, 2016(S2): 120-130. doi: 10.1109/CC.2016.7833466.
|
XU M, TAO X F, YANG F, et al. Enhancing secured coverage with CoMP transmission in heterogeneous cellular networks[J]. IEEE Communications Letters, 2016, 20(11): 2272-2275. doi: 10.1109/LCOMM.2016.2598536.
|
GONG S Q, XING C W, FEI Z S, et al. Resource allocation for physical layer security in heterogeneous network with hidden eavesdropper[J]. China Communications, 2016, 13(3): 82-95. doi: 10.1109/CC.2016.7445504.
|
XU M, TAO X F, YANG F, et al. On energy efficient design for dynamic CoMP transmission in k-tier heterogeneous cellular networks[J]. China Communications, 2016, 13(6): 147-153. doi: 10.1109/CC.2016.7513210.
|
YUSUF M and ARSLAN H. Secure multi-user transmission using CoMP directional modulation[C]. IEEE Vehicular Technology Conference, Boston, USA, 2015: 1-2. doi: 10.1109 /VTCFall.2015.7391131.
|
CHAE S H, WAN C, LEE J H, et al. Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10): 1617-1628. doi: 10.1109/ TIFS.2014.2341453.
|
HEATH R W, KOUNTOURIS M, and BAI T Y. Modeling heterogeneous network interference using Poisson point processes[J]. IEEE Transactions on Signal Processing, 2012, 61(16): 4114-4126. doi: 10.1109/TSP.2013.2262679.
|
ZHOU X Y, GANTI R K, ANDREWS J G, et al. On the throughput cost of physical layer security in decentralized wireless networks[J]. IEEE Transactions on Wireless Communications, 2011, 10(8): 2764-2775. doi: 10.1109/TWC. 2011.061511.102257.
|
LIU W G, DING Z G, RATNARAJAH T, et al. On ergodic secrecy capacity of random wireless networks with protected zone[J]. IEEE Transactions on Vehicular Technology, 2016, 65(8): 1-5. doi: 10.1109/TVT.2015.2477315.
|
XU X M, YANG W W, and CAI Y M. Secure transmission in the random CRNs with secrecy guard zone and artificial noise[J]. Iet Communications, 2016, 10(15): 1904-1913. doi: 10.1049/iet-com.2016.0117.
|
XU X M, YANG W W, and CAI Y M. On the secure spectral-energy efficiency tradeoff in random cognitive radio networks[J]. IEEE Journal on Selected Areas in Communications, 2016, 34(10): 2706-2722. doi: 10.1109/ JSAC.2016.2605901.
|
MUKHERJEE A and SWINDLEHURST A L. Detecting passive eavesdroppers in the MIMO wiretap channel[C]. IEEE International Conference on Acoustics, Speech and Signal Processing, Kyoto, Japan, 2012: 2809-2812. doi: 10.1109/ICASSP.2012.6288501.
|
YANG N, YAN S H, YUAN J H, et al. Artificial noise: transmission optimization in multi-input single-output wiretap channels[J]. IEEE Transactions on Communications, 2015, 63(5): 1771-1783. doi: 10.1109/TCOMM.2015.2419634.
|
1. | 蔡卫红,郭旭静,李聪. 基于NFV的5G核心网络切片研究. 长沙大学学报. 2023(02): 6-11 . ![]() | |
2. | 蔡卫红,仇益彩,文杰斌,吕宏悦. 基于NST规范的5G网络切片计费设计. 湖南邮电职业技术学院学报. 2023(02): 13-18 . ![]() | |
3. | 王颖,张龙龙. 基于5G技术的化工智能园区虚拟网络功能仿真实验研究. 粘接. 2023(07): 132-136 . ![]() | |
4. | 惠聪. 基于流量预测的5G通信网络资源分配方法. 信息技术. 2023(07): 71-76 . ![]() | |
5. | 陈功平,王红. 基于雾计算及RoF-DAS架构的物联网调度系统设计. 太原学院学报(自然科学版). 2022(01): 53-58 . ![]() | |
6. | 李岚. 基于神经网络反馈的移动通信平台动态负载均衡算法. 大庆师范学院学报. 2022(03): 102-108 . ![]() | |
7. | 兰巨龙,朱棣,李丹. 面向多模态网络业务切片的虚拟网络功能资源容量智能预测方法. 通信学报. 2022(06): 143-155 . ![]() | |
8. | 刘春林,秦进. 面向5G网络的移动边缘计算节点部署算法设计. 计算机仿真. 2022(12): 436-439+473 . ![]() | |
9. | 唐伦,贺兰钦,谭颀,陈前斌. 基于深度确定性策略梯度的虚拟网络功能迁移优化算法. 电子与信息学报. 2021(02): 404-411 . ![]() | |
10. | 袁泉,游伟,季新生,汤红波. 虚拟网络功能资源容量自适应调整方法. 电子与信息学报. 2021(07): 1841-1848 . ![]() | |
11. | 武静雯,江凌云,刘祥军. 基于特征选择的VNF资源需求预测方法. 计算机应用研究. 2021(10): 3131-3136+3142 . ![]() | |
12. | 高志华,王居正,樊旻,张凌云,李国良. 基于5G网络切片在线映射算法的电力通信远程视频指挥系统设计. 内蒙古电力技术. 2021(05): 80-83 . ![]() | |
13. | 李锦煊,王维. 基于智能电网的5G网络切片资源优化分配模型构建及仿真. 自动化与仪器仪表. 2021(11): 36-39+44 . ![]() | |
14. | 黄宏程,鲍晓萌,胡敏. 边缘网络中一种VNF需求预测方法. 电讯技术. 2021(12): 1476-1483 . ![]() | |
15. | 纪浩,虞颖映,糜蒙. 面向健康老龄化的“5G+智慧养老”服务生态体系设计研究. 医学信息学杂志. 2021(11): 87-93 . ![]() | |
16. | 郭胜,孙立. SDN与NFV技术在延时敏感业务场景中的应用. 电子技术与软件工程. 2020(03): 16-18 . ![]() | |
17. | 陈云杰,游伟. 5G移动通信中基于安全信任的网络切片部署策略研究. 通信技术. 2020(09): 2206-2209 . ![]() | |
18. | 金涛伟. 共享移动互联空间离线网络短链接稳定性检测. 计算机仿真. 2020(09): 184-188 . ![]() | |
19. | 徐瑨,吴慧慈,陶小峰. 5G网络空间安全对抗博弈. 电子与信息学报. 2020(10): 2319-2329 . ![]() | |
20. | 孙士清,彭建华,游伟,李英乐. 基于在线实例配置的服务功能链部署方法. 计算机工程. 2019(12): 71-78 . ![]() |