[1] KHALFI B, HAMDAOUI B, GUIZANI M. Extracting and exploiting inherent sparsity for efficient IoT support in 5G:challenges and potential solutions[J]. IEEE Wireless Communications, 2017, 24(5):68-73. [2] SIMSEK M, ZHANG D, ÖHMANN D, et al. On the flexibility and autonomy of 5G wireless networks[J]. IEEE Access, 2017, 5:22823-22835. [3] HUO F, GONG G. XOR encryption versus phase encryption, an in-depth analysis[J]. IEEE Transactions on Electromagnetic Compatibility, 2015, 57(4):903-911. [4] HUO F, GONG G. Physical layer phase encryption for combating the traffic analysis attack[C]//Proceedings of the 2014 IEEE International Symposium on Electromagnetic Compatibility. Piscataway, NJ:IEEE, 2014:604-608. [5] 穆鹏程,殷勤业,王文杰.无线通信中使用随机天线阵列的物理层安全传输方法[J].西安交通大学学报,2010,44(6):62-66.(MU P C, YIN Q Y, WANG W J. A security method of physical layer transmission using random antenna arrays in wireless communication[J]. Journal of Xi'an Jiaotong University, 2010, 44(6):62-66.) [6] FOK M P, WANG Z X, DENG Y H, et al. Optical layer security in fiber-optic networks[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):725-736. [7] 李明亮,黄开枝,钟州.基于空频联合加扰的物理层安全算法[J].电子与信息学报,2013,35(12):2966-2971.(LI M L, HUANG K Z, ZHONG Z. Physical-layer security algorithm based on joint scrambling with spatial and frequency resource[J]. Journal of Electronics and Information Technology, 2013, 35(12):2966-2971.) [8] YANG N, WANG L F, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015, 53(4):20-27. [9] SON P N, KONG H Y. Cooperative communication with energy-harvesting relays under physical layer security[J]. IET Communications, 2015, 9(17):2131-2139. [10] MUKHERJEE A. Physical-layer security in the Internet of things:sensing and communication confidentiality under resource constraints[J]. Proceedings of the IEEE, 2015, 103(10):1747-1761. [11] 胡爱群,李古月.无线通信物理层安全方法综述[J].数据采集与处理,2014,29(3):341-350.(HU A Q, LI G Y. Physical layer security in wireless communication:survey[J]. Journal of Data Acquisition and Processing, 2014, 29(3):341-350.) [12] MA R F, DAI L L, WANG Z C, et al. Secure communication in TDS-OFDM system using constellation rotation and noise insertion[J]. IEEE Transactions on Consumer Electronics, 2010, 56(3):1328-1332. [13] REILLY D, KANTER G S. Noise-enhanced encryption for physical layer security in an OFDM radio[C]//Proceedings of the 2009 IEEE Radio and Wireless Symposium. Piscataway, NJ:IEEE, 2009:344-347. [14] 高宝建,张自然,金媛媛.一种基于OFDM的信息安全算法[J].计算机工程与应用,2012,48(5):59-62.(GAO B J, ZHANG Z R, JIN Y Y. OFDM-based information security algorithm[J]. Computer Engineering and Applications, 2012, 48(5):59-62.) [15] LUENGO D, SANTAMARIA I. Secure communications using OFDM with chaotic modulation in the subcarriers[C]//Proceedings of the 2005 IEEE 61st Vehicular Technology Conference. Piscataway, NJ:IEEE, 2005:1022-1026. [16] TAHIR M, JAROT S P W, SIDDIQI M U. Wireless physical layer security using encryption and channel pre-compensation[C]//Proceedings of the 2010 International Conference on Computer Applications and Industrial Electronics. Piscataway, NJ:IEEE, 2010:304-309. |