[1] MATHUR S, REZNIK A, YE Chun Xuan, MUKHERJEE R, RAHMAN A, SHAH Y, TRAPPE W, MANDAYAM N. Exploiting the physical layer for enhanced security [J]. IEEE Wireless Communications, 2010, 17(5): 63-70.[2] DEBBAH M, EI-GAMAL H, POOR H V, SHAMAI S. Editorial: wireless physical layer security [J]. Eurasip Journal on Wireless Communications and Networking, 2009, 2009: 1-2.[3] WYNER A. The wire-tap channel [J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.[4] CSISZAR I, KORNER J. Broadcast channels with confidental messages [J]. IEEE Transactions on Information Theory, 1978, 24(3): 339-348.[5] HERO A O III. Secure space-time communication [J]. IEEE Transactions on Information Theory, 2003, 49(12): 3235-3249.[6] KHISTI A, WORNELL G W. Secure transmission with multiple antennas I: the MISOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(7): 3088- 3104.[7] KHISTI A, WORNELL G W. Secure transmission with multiple antennas—Part II: the MIMOME wiretap channel [J]. IEEE Transactions on Information Theory, 2010, 56(11): 5515-5532.[8] KRIKIDIS I, THOMPSON J, MCLAUGHLIN S. Relay selection for secure cooperative networks with jamming [J]. IEEE Transactions on Wireless Communications, 2009, 8(10): 5003-5011.[9] LUN Dong, ZHU Han, PETROPULU A P, POOR H V. Improving wireless physical layer security via cooperating relays [J]. IEEE Transactions on Signal Processing, 2010, 58(3): 1875-1888.[10] SIMEONE O, POPOVSKI P. Secure communications via cooperating base stations [J]. IEEE Communications Letters, 2008, 12(3): 188-190.[11] LI Zheng, XIA Xianggen. A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of interception [J]. IEEE Transactions on Wireless Communications, 2009, 8(7): 3372-3379.[12] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise [J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180-2189.[13] LIAO Weicheng, CHANG Tsung-hui, MA Wing-kin, CHI Chong-yung. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach [J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1202-1216.[14] ZHU Jing-ge, MO Jian-hua, TAO Mei-xia. Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel [J]. IEEE Communications Letters, 2010, 14(10): 885-887.[15] HONG Tao, SONG Maozhong, LIU Yu. Directional sensitive modulation signal transmitted by monopulse cassegrain antenna for physical layer secure communication [J]. Progress in Electromagnetics Research M, 2011, 17: 167-181.[16] LI Xiaohua, HWU J, RATAZZI E P. Using antenna array redundancy and channel diversity for secure wireless transmissions [J]. Journal of Communications, 2007, 2(3): 24-32.[17] 穆鹏程,殷勤业,王文杰. 无线通信中使用随机天线阵列的物理层安全传输方法 [J]. 西安交通大学学报,2010,44(6): 62-66.MU Pengcheng, YIN Qinye, WANG Wenjie. A security method of physical layer transmission using random antenna arrays in wireless communication [J]. Journal of Xi’an Jiaotong University, 2010, 44(6): 62-66. (in Chinese)[18] HONG Tao, SONG Maozhong, LIU Yu. RF directional modulation technique using a switched antenna array for physical layer secure communication applications [J]. Progress in Electromagnetics Research, 2011, 116: 363-379.[19] DALY M P, BERNHARD J T. Directional modulation technique for phased arrays [J]. IEEE Transactions on Antennas and Propagation, 2009, 57(9): 2633-2640.[20] DALY M P, DALY E L, BERNHARD J T. Demonstration of directional modulation using a phased array [J]. IEEE Transactions on Antennas and Propagation, 2010, 58(5): 1545-1550.[21] DALY M P, BERNHARD J T. Beamsteering in Pattern Reconfigurable Arrays Using Directional Modulation [J]. IEEE Transactions on Antennas and Propagation, 2010, 58(7): 2259-2265.[22] BABAKHANI A, RUTLEDGE D B, HAJIMIRI A. Transmitter architectures based on near-field direct antenna modulation [J]. IEEE Journal of Solid-State Circuits, 2008, 43(12): 2674-2692. |