[1] WYNER A D. The wire-tap channel[J]. Bell Labs Technical Journal, 1975, 54(8):1355-1387. [2] CSISZÁR I, KORNER J. Broadcast channels with confidential messages[J]. IEEE Transactions on Information Theory, 2003, 24(3):339-348. [3] LEUNG-YAN-CHEONG S, HELLMAN M E. The Gaussian wire-tap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4):451-456. [4] ZHAO Y, ADVE R, TENG J L. Improving amplify-and-forward relay networks:optimal power allocation versus selection[C]//Proceedings of the 2006 IEEE International Symposium on Information Theory. Piscataway, NJ:IEEE, 2006:1234-1238. [5] IKKI S, AHMED M H. Performance analysis of adaptive decode-and-forward cooperative diversity networks with best-relay selection[J]. IEEE Transactions on Communications, 2010, 58(1):68-72. [6] LANEMAN J N, TSE D N C, WORNELL G W. Cooperative diversity in wireless networks:efficient protocols and outage behavior[J]. IEEE Transactions on Information Theory, 2004, 50(12):3062-3080. [7] ZHANG R, SONG L, HAN Z, et al. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8):3693-3704. [8] KRIKIDIS I, THOMPSON J S, McLAUGHLIN S. Relay selection for secure cooperative networks with jamming[J]. IEEE Transactions on Wireless Communications, 2009, 8(10):5003-5011. [9] DING Z, MA Z, FAN P. Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise[J]. IEEE Transactions on Wireless Communications, 2014, 13(4):2189-2203. [10] AGGARWAL P, TRIVEDI A. An approach for secure wireless communication using friendly noise[C]//Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics. Piscataway, NJ:IEEE, 2014:1578-1584. [11] 雷维嘉, 林秀珍, 杨小燕, 等. 利用人工噪声提高合法接收者性能的物理层安全方案[J]. 电子与信息学报, 2016, 38(11):2887-2892. (LEI W J, LIN X Z, YANG X Y, et al. Physical layer security scheme exploiting artificial noise to improve the performance of legitimate user[J]. Journal of Electronics and Information Technology, 2016, 38(11):2887-2892.) [12] BLOCH M, BARROS J, RODRIGUES M R D, et al. Wireless information theoretic security[J]. IEEE Transactions on Information Theory, 2008, 54(6):2515-2534. [13] LAI L, LIANG Y, POOR H V. A Unified framework for key agreement over wireless fading channels[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):480-490. [14] SHIMIZU T, IWAI H, SASAOKA H. Physical-layer secret key agreement in two-way wireless relaying systems[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):650-660. [15] DING X, SONG T, ZOU Y, et al. Security-reliability tradeoff analysis of artificial noise aided two-way opportunistic relay selection[J]. IEEE Transactions on Vehicular Technology, 2017, 66(5):3930-3941. [16] SHANNON C E. A mathematical theory of communication[J]. Bell Labs Technical Journal, 1948, 27(3):379-423. [17] ZOU Y, WANG X, SHEN W, et al. Security versus reliability analysis of opportunistic relaying[J]. IEEE Transactions on Vehicular Technology, 2014, 63(6):2653-2661. [18] KIM S I, KIM I M, HEO J. Secure transmission for multiuser relay networks[J]. IEEE Transactions on Wireless Communications, 2015, 14(7):3724-3737. [19] YANG Y, CHEN J, HUANG Y, et al. Secure transmission of wireless relaying systems with jammer and multiple-user selection[J]. IEEE Access, 2017, 5(99):8771-8779. [20] 龙航, 袁广翔, 王静, 等. 物理层安全技术研究现状与展望[J]. 电信科学, 2011, 27(9):60-65. (LONG H, YUAN G X, WANG J, et al. Physical layer security:survey and future[J]. Telecommunications Science, 2011, 27(9):60-65.) [21] 吴迪. 空域自适应抗干扰在数据链通信中的应用[J]. 计算机应用, 2017, 37(6):1569-1573. (WU D. Application of space-domain adaptive anti-jamming technology in data-link communication[J]. Journal of Computer Applications, 2017, 37(6):1569-1573.) |