[1] 姚富强.通信抗干扰工程与实践[M].北京:电子工业出版社,2008:7-8.(YAO F Q. Communication anti-jamming engineering and practice [M]. Beijing: Publishing House of Electronics Industry, 2008: 7-8.) [2] WYNER A D. The wire-tap channel [J]. Bell system technical journal, 1975, 54(8): 1355-1387. [3] ZHOU X, MCKAY M R. Physical layer security with artificial noise: secrecy capacity and optimal power allocation [C]// ICSPCS 2009: Proceedings of the 3rd International Conference on Signal Processing and Communication Systems. Piscataway, NJ: IEEE, 2009: 1-5. [4] YANG Y, LI Q, MA W K, et al. Cooperative secure beam forming for AF relay networks with multiple eavesdroppers [J]. IEEE signal processing letters, 2013, 20(1): 35-38. [5] DONG L, HAN Z, PETROPULU A P, et al. Improving wireless physical layer security via cooperating relays [J]. IEEE transactions on signal processing, 2010, 58(3): 1875-1888. [6] YILMAZ M H, ARSLAN H. Impersonation attack identification for secure communication [C]// Proceedings of the 2013 IEEE Globecom Workshops. Piscataway, NJ: IEEE, 2013: 1275-1279. [7] LAKSHMI B, SANMUGA L B, KARTHIKEYAN R. Detection and prevention of impersonation attack in wireless networks [J]. International journal of advanced research in computer science & technology, 2014, 2(1): 267-270. [8] DIFFIE W, HELLMAN M. New directions in cryptography [J]. IEEE transactions on information theory, 1976, 22(6): 644-654. [9] REN K, SU H, WANG Q. Secret key generation exploiting channel characteristics in wireless communications [J]. IEEE wireless communications, 2011, 18(4): 6-12. [10] SHIMIZU T, IWAI H, SASAOKA H. Physical-layer secret key agreement in two-way wireless relaying systems [J]. IEEE transactions on information forensics and security, 2011, 6(3): 650-660. [11] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise [J]. IEEE transactions on wireless communications, 2008, 7(6): 2180-2189. [12] ANDREW S T, DAVID J W.计算机网络[M].严伟,潘爱民,译.5版.北京:清华大学出版社,2008:151-194.(ANDREW S T, DAVID J W. Computer networks [M]. YAN W, PAN A M, translated. 5th ed. Beijing: Tsinghua University Press, 2008: 151-194.) |