[1] SHAFIEE S,ULUKUS S.Achievable rates in Gaussian MISO channels with secrecy constraints[C]//Proceedings of 2007 IEEE International Symposium on Information Theory.Washington D.C.,USA:IEEE Press,2007:2466-2470. [2] KHISTI A,WORNELL G,WIESEL A,et al.On the Gaussian MIMO wiretap channel[C]//Proceedings of 2007 IEEE International Symposium on Information Theory.Washington D.C.,USA:IEEE Press,2007:2471-2475. [3] WANG Kun,WANG Xiyuan,ZHANG Xianda.SLNR-based transmit beamforming for MIMO wiretap channel[J].Wireless Personal Communications,2013,71(1):109-121. [4] LI Q,MA W K.Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming[J].IEEE Transactions on Signal Processing,2011,59(8):3799-3812. [5] BAGHERIKARAM G,MOTAHARI A S,KHANDANI A K.The secrecy capacity region of the Gaussian MIMO broadcast channel[J].IEEE Transactions on Theory,2013,59(5):2673-2682. [6] NEGI R,GOEL S.Secret communication using artificial noise[C]//Proceedings of Vehicular Technology Conference.Washington D.C.,USA:IEEE Press,2005:1906-1910. [7] LI Xiangyu,JIN Liang,HUANG Kaizhi,et al.A physical layer security transmission mechanism of relay system based on joint channel characteristics[J].Chinese Journal of Computers,2012,35(7):1399-1406.(in Chinese)李翔宇,金梁,黄开枝,等.基于联合信道特征的中继物理层安全传输机制[J].计算机学报,2012,35(7):1399-1406. [8] GAO Ruifeng,NI Danyan,BAO Zhihua,et al.Time-bandwidth allocation scheme for physical layer security in cooperative cognitive radio networks[J].Computer Science,2016,43(4):163-166,187.(in Chinese)高锐锋,倪丹艳,包志华,等.基于时频资源分配的认知无线中继网络物理层安全研究[J].计算机科学,2016,43(4):163-166,187. [9] LAI L,EL GAMAL H.The relay-eavesdropper channel:cooperation for secrecy[J].IEEE Transactions on Information Theory,2008,54(9):4005-4019. [10] LUO S,LI J,PETROPULU A.Physical layer security with uncoordinated helpers implementing cooperative jamming[C]//Proceedings of 2012 IEEE Sensor Array and Multichannel Signal Processing Workshop.Washington D.C.,USA:IEEE Press,2012:97-100. [11] DONG L,HAN Z,PETROPULU A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888. [12] EKREM E,ULUKUS S.Secrecy in cooperative relay broadcast channels[J].IEEE Transactions on Information Theory,2011,57(1):137-155. [13] SONG Huiying,GAO Yuanyuan,SHA Nan.An effective method of improving security performance of RFID system physical layer[J].Computer Engineering,2018,44(5):119-123.(in Chinese)宋慧颖,高媛媛,沙楠.一种有效提高RFID系统物理层安全性能的方法[J].计算机工程,2018,44(5):119-123. [14] WANG Shaodi,GAO Baojian,ZHANG Yucheng,et al.Physical layer security scheme based on jointly optimal relay selection[J].Computer Engineering,2019,45(2):148-153.(in Chinese)王少迪,高宝建,张育铖,等.基于中继联合优化选择的物理层安全方案[J].计算机工程,2019,45(2):148-153. [15] LIU Y,DRAPER S C,SAYEED A M.Exploiting channel diversity in secret key generation from multipath fading randomness[J].IEEE Transactions on Information Forensics and Security,2012,7(5):1484-1497. [16] AONO T,HIGUCHI K,OHIRA T,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784. [17] REN Kui,SU Hai,WANG Qian.Secret key generation exploiting channel characteristics in wireless commu-nications[J].IEEE Wireless Communications,2011,18(4):6-12. [18] BLOCH M,BARROS J,RODRIGUES M R D,et al.Wireless information-theoretic security[J].IEEE Transactions on Information Theory,2008,54(6):2515-2534. [19] GOERGEN N,LIN W S,LIU K J R,et al.Extrinsic channel-like fingerprint embedding for authenticating MIMO systems[J].IEEE Transactions on Wireless Communications,2011,10(12):4270-4281. [20] WILLIAM E C.Intrinsic physical-layer authentication of integrated circuits[J].IEEE Transactions on Information Forensics and Security,2011,7(1):14-24. [21] CHEN B,MARTINIAN E,WORNELL G W.Authentication with distortion criteria[J].IEEE Transactions on Information Theory,2005,51(7):2523-2542. [22] XI Chenjing,GAO Yuanyuan,SHA Nan,et al.Introduction of signal constellation design approach for physical layer security[J].Journal of Chinese Computer Systems,2018,39(12):2675-2680.(in Chinese)奚晨婧,高媛媛,沙楠,等.物理层安全信号星座的设计方法研究[J].小型微型计算机系统,2018,39(12):2675-2680. [23] MA Ruifeng,DAI Linglong,WANG Zhaocheng,et al.Secure communication in TDS-OFDM system using constellation rotation and noise insertion[J].IEEE Transactions on Consumer Electronics,2010,56(3):1328-1332. [24] HAN C,HASHIMOTO T,SUEHIRO N.Constellation-rotated vector OFDM and its performance analysis over rayleigh fading channels[J].IEEE Transactions on Communications,2010,58(3):828-838. [25] PÖPPER C,TIPPENHAUER N O,DANEV B,et al.Investigation of signal and message manipulations on the wireless channel[C]//Proceedings of European Conference on Research in Computer Security.Berlin,Germany:Springer,2011:40-59. [26] CHEN Bin,ZHU Chunsheng,LI Wei,et al.Original symbol phase rotated secure transmission against powerful massive MIMO eavesdropper[J].IEEE Access,2016,4:3016-3025. [27] XU Zhijiang,YUAN Teng,GONG Yi,et al.Achieving secure communication through random phase rotation technique[C]//Proceedings of Wireless Communications and Mobile Computing Conference.Washington D.C.,USA:IEEE Press,2017:23-36. [28] ALTHUNIBAT S,SUCASAS V,RODRIGUEZ J.A physical-layer security scheme by phase-based adaptive modulation[J].IEEE Transactions on Vehicular Technology,2017,66(11):9931-9942. [29] HUSAIN M I,MAHANT S,SRIDHAR R.CD-PHY:physical layer security in wireless networks through constellation diversity[C]//Proceedings of 2012 IEEE Military Communications Conference.Washington D.C.,USA:IEEE Press,2012:1-9. [30] MA R,WANG Z,YANG Z.Improving physical layer security using APSK constellations with finite-alphabet inputs[C]//Proceedings of 2013 International Wireless Communications and Mobile Computing Conference.Washington D.C.,USA:IEEE Press,2013:149-152. [31] ZANG Guozhen,HUANG Baohua,CHEN Lihua,et al.One transmission scheme based on variable MSK modulator for wireless physical layer security[C]//Proceedings of 2015 International Conference on Wireless Communications and Signal Processing.Washington D.C.,USA:IEEE Press,2015:1-5. [32] MAO Xiangning,LIN Kaijia,LIU Hao.A physical layer security algorithm based on constellation[C]//Proceedings of IEEE International Conference on Communication Technology.Washington D.C.,USA:IEEE Press,2018:52-69. [33] HUANG Y,EL-HAJJAR M.Multi-dimensional encryption scheme based on physical layer for fading channel[J].IET Communications,2018,12(19):25-36. [34] LEI Beibei.Research on modulation concealment algorithm based on physical layer encryption[D].Xi'an:Northwest University,2012.(in Chinese)雷蓓蓓.基于物理层加密的调制方式隐蔽算法研究[D].西安:西北大学,2012. [35] XIONG Tao,LOU Wei,ZHANG Jin,et al.MIO:enhancing wireless communications security through physical layer multiple inter-symbol obfuscation[J].IEEE Transactions on Information Forensics and Security,2015,10(8):1678-1691. [36] LIU Sijing,GAO Baojian,WU Qian,et al.Algorithm for OFDM physical layer security based on iterative encryp-tion[J].Computer Engineering and Applications,2014,50(22):88-91.(in Chinese)柳斯婧,高宝建,吴谦,等.基于迭代加密的OFDM系统物理层安全算法[J].计算机工程与应用,2014,50(22):88-91. |