[1] |
Qian Hui,Li Guang-qiu,Ding Yi-fan.Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers[J].Telecommunications Science,2020,36(5):65-72.(in Chinese)
|
[2] |
Wu Qi,Liu Jing-hua,Zhao Rui,et al.Security performance analysis of full duplex relay system with wireless energy harvesting[J].Journal of Huaqiao University(Natural Science),2019,40(3):390-398.(in Chinese)
|
[3] |
Krikidis I.Opportunistic relay selection for cooperative networks with secrecy constraints[J].IET Communications,2010,4(15):1787-1791.
|
[4] |
Duy T T,Duong T Q,Thanh T L,et al.Secrecy performance analysis with relay selection methods under impact of co-channel interference[J].IET Communications,2015,9(11):1427-1435.
|
[5] |
Zhang T,Cai Y,Huang Y,et al.Secure full duplex spectrum-sharing wiretap networks with different antenna reception schemes[J].IEEE Transactions on Communications,2017,65(1):335-346.
|
[6] |
Liu Y W,Wang L F,Duy T T,et al.Relay selection for security enhancement in cognitive relay networks[J].IEEE Wireless Communications Letters,2015,4(1):46-49.
|
[7] |
Fan L,Zhang S,Duong T Q,et al.Secure switch-and-stay combining (SSSC) for cognitive relay networks[J].IEEE Transactions on Communications,2016,64(1):70-82.
|
[8] |
Zheng Zu-peng, Wang Zu-min,Peng Yang,et al.Survey of MAC protocols for energy harvesting sensor networks[J].Computer Engineering and Applications,2020,56(15):24-29.(in Chinese)
|
[9] |
Long Yan,Zhang Xiao-qian,Fang Xu-ming,et al.Resource allocation in cognitive radio network with energy harvesting[J].Journal on Communications,2018,39(9):67-75.(in Chinese)
|
[10] |
Singh A,Bhatnagar M R,Mallik R K.Secrecy outage of a simultaneous wireless information and power transfer cognitive radio system[J].IEEE Wireless Communications Letters,2016,5(3):288-291.
|
[11] |
El Shafifie A,Niyato D,Al-Dhahir N.Security of rechargeable energy-harvesting transmitters in wireless networks[J].IEEE Wireless Communications Letters,2016,5(4):384-387.
|
[12] |
Bhatnagar M R,Mallik R K,Tirkkonen O.Performance evaluation of best-path selection in a multihop decode-and-forward cooperative system[J].IEEE Transactions on Vehicular Technology,2016,65(4):2722-2728.
|
[13] |
Xu C,Zheng M,Liang W,et al.Outage performance of underlay multihop cognitive relay networks with energy harvesting[J].IEEE Communications Letters,2016,20(6):1148-1151.
|
[14] |
Dinh T, Duy T T,Kim B S.Performance enhancement for multi-hop harvest-to-transmit WSNS with path-selection methods in presence of eavesdroppers and hardware noises[J].IEEE Sensors Journal,2018,18(12):5173-5186.
|
[15] |
Duy T T,Choi S G.Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper[C]∥Proc of the 20th International Conference on Advanced Communication Technology,2018:323-328.
|
[16] |
Ding Z,Perlaza S M,Esnaola I,et al.Power allocation stra- tegies in energy harvesting wireless cooperative networks[J].IEEE Transactions on Wireless Communications,2014,13(2):846-860.
|
[17] |
Liu C, Lü T. Joint relay-user selection in energy harversting relay network with direct link[J]. Physical Communication,2018,28:123-129.
|
[18] |
Ojo F K,Salleh M F M. Throughput analysis of a hybridized power-time splitting based relaying protocol for wireless information and power transfer in cooperative networks[J].IEEE Access,2018,6:24137-24147.
|
[19] |
Gradshten I S,Ryzhik I M.Table of integrals[M].7th ed.New York:Academic Press,2007.
|
[20] |
Ashraf M,Jang J W,Han J K,et al.Capacity maximizing adaptive power splitting protocol for cooperative energy harvesting communication systems[J].IEEE Communications Letters,2018,22(5):902-905.
|
[21] |
Ha D B,Tran A T,Tran D D,et al.Secrecy performance analysis of energy harvesting aware relaying networks with adaptive power splitting and relay selection scheme[C]∥Proc of 2019 3rd International Conference on Recent Advances in Signal Processing,Telecommunications & Com- puting (SigTelCom),2019:1431-1442.
|
[22] |
Yi I M. Outage probability and optimum power allocation for analog network coding[J].IEEE Transactions on Wireless Communications,2011,10(2):407-412.
|
|
附中文参考文献:
|
[1] |
钱辉,李光球,丁一凡.随机位置窃听场景下SWIPT系统的物理层安全性能[J].电信科学,2020,36(5):65-72.
|
[2] |
吴奇, 刘菁华, 赵睿, 等.无线能量采集技术下的全双工中继
|
|
系统安全性能分析[J].华侨大学学报(自然科学版),2019,40(3):390-398.
|
[8] |
郑祖朋,汪祖民,彭杨,等.能量采集传感器网络中MAC协议研究综述[J].计算机工程与应用,2020,56(15):24-29.
|
[9] |
龙彦,张晓倩,方旭明,等.基于能量采集认知无线网中的资源分配方案研究[J].通信学报,2018,39(9):67-75.
|