[1] WYNER A D. The wire-tap channel[J]. The Bell System Technical Journal, 1975, 54(8):1355-1387. [2] WANG H M, XIA X G. Enhancing wireless secrecy via cooperation:signal design and optimization[J]. IEEE Communications Magazine, 2015, 53(12):47-53. [3] WANG H M, LUO M, XIA X G, et al. Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI[J]. IEEE Signal Processing Letters, 2013, 20(1):39-42. [4] 罗苗,王慧明,殷勤业.基于协作波束形成的中继阻塞混合无线物理层安全传输[J].中国科学:信息科学,2013,43(4):445-458.(LUO M, WANG H M, YIN Q Y. Hybrid relaying and jamming for wireless physical layer security based on cooperative beamforming[J]. SCIENTIA SINICA Informationis, 2013, 43(4):445-458.) [5] WANG H M, YIN Q Y, XIA X G. Improving the physical-layer security of wireless two-way relaying via analog network coding[C]//Proceedings of the 2011 IEEE Global Telecommunications Conference. Piscataway, NJ:IEEE, 2011:1-6. [6] 王慧明,黄芮,郑通兴.分布式双向中继系统的安全总速率优化[J].数据采集与处理,2015,30(3):486-495.(WANG H M, HUANG R, ZHENG T X. Secrecy sum rate optimization of distributed two-way relay system[J]. Journal of Data Acquisition and Processing, 2015, 30(3):486-495.) [7] YANG Y C, SUN C, ZHAO H, et al. Algorithms for secrecy guarantee with null space beamforming in two-way relay networks[J]. IEEE Transactions on Signal Processing, 2014, 62(8):2111-2126. [8] YANG Y, LI Q, MA W K, et al. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2012, 20(1):35-38. [9] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6):2180-2189. [10] 邓浩,王慧明,王文杰.基于多节点分组协作干扰的无线物理层安全传输[J].中国科学:信息科学,2014,44(11):1482-1494.(DENG H, WANG H M, WANG W J. Grouping cooperative jamming for wireless physical layer security[J]. SCIENTIA SINICA Informationis, 2014, 44(11):1482-1491.) [11] WANG H M, LUO M, YIN Q Y, et al. Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(12):2007-2020. [12] MUKHERJEE A, SWINDLEHURST A L. Detecting passive eavesdroppers in the MIMO wiretap channel[C]//Proceedings of the 2012 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ:IEEE, 2012:2809-2812. [13] HUANG J, SWINDLEHURST A L. Robust secure transmission in MISO channels based on worst-case optimization[J]. IEEE Transactions on Signal Processing, 2011, 60(4):1696-1707. [14] WANG C, WANG H M. Robust joint beamforming and jamming for secure AF networks:low-complexity design[J]. IEEE Transactions on Vehicular Technology, 2015, 64(5):2192-2198. [15] BECK A, BEN-TAL A, TETRUASHVILI L. A sequential parametric convex approximation method with applications to nonconvex truss topology design problems[J]. Journal of Global Optimization, 2010, 47(1):29-51. [16] GRANT M, BOYD S. CVX:Matlab software for disciplined convex programming, version 1.21[EB/OL]. http://cvxr.com/cvx/. |