Legitimate eavesdropping of wireless powered suspicious communication networks with a monitoring power station
Tài liệu tham khảo
Wyner, 1975, The wire-tap channel, Bell Syst. Tech. J., 54, 1355, 10.1002/j.1538-7305.1975.tb02040.x
Xu, 2018, Resource allocation for cognitive radio with primary user secrecy outage constraint, IEEE Syst. J., 12, 893, 10.1109/JSYST.2016.2585654
Zhang, 2018, Secure communications in NOMA system: Subcarrier assignment and power allocation, IEEE J. Sel. Areas Commun., 36, 1441, 10.1109/JSAC.2018.2825559
Xu, 2017, Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm, IEEE Wirel. Commun., 24, 152, 10.1109/MWC.2017.1600279
Xu, 2016, Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels, IEEE Wirel. Commun. Lett., 5, 80, 10.1109/LWC.2015.2498610
Xu, 2017, Proactive eavesdropping via cognitive jamming in fading channels, IEEE Trans. Wireless Commun., 16, 2790, 10.1109/TWC.2017.2666138
Xu, 2019, Secure transmission for SWIPT IoT systems with full-duplex IoT devices, IEEE Internet Things J., 6, 10915, 10.1109/JIOT.2019.2943377
Zhang, 2016, Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming, IEEE Trans. Ind. Inf., 12, 1714, 10.1109/TII.2015.2489610
Zhong, 2017, Multi-antenna wireless legitimate surveillance systems: Design and performance analysis, IEEE Trans. Wirel. Commun., 16, 4585, 10.1109/TWC.2017.2700379
Cai, 2017, Proactive monitoring via jamming for rate maximization over MIMO Rayleigh fading channels, IEEE Commun. Lett., 21, 2021, 10.1109/LCOMM.2017.2715337
Xu, 2017, Proactive eavesdropping via jamming over HARQ-based communications, 1
Moon, 2018, Proactive eavesdropping with full-duplex relay and cooperative jamming, IEEE Trans. Wireless Commun., 17, 6707, 10.1109/TWC.2018.2863287
Li, 2019, Energy efficiency of proactive cooperative eavesdropping over multiple suspicious communication links, IEEE Trans. Veh. Technol., 68, 420, 10.1109/TVT.2018.2880768
Han, 2019, Jamming-assisted eavesdropping over parallel fading channels, IEEE Trans. Inf. Forensics Secur., 14, 2486, 10.1109/TIFS.2019.2901821
Moon, 2019, Proactive eavesdropping with jamming and eavesdropping mode selection, IEEE Trans. Wireless Commun., 18, 3726, 10.1109/TWC.2019.2918452
Lu, 2018, Proactive eavesdropping in UAV-aided suspicious communication systems, IEEE Trans. Veh. Technol., 68, 1993, 10.1109/TVT.2018.2889397
Xu, 2020, Jamming-assisted legitimate surveillance of suspicious interference networks with successive interference cancellation, IEEE Commun. Lett., 24, 396, 10.1109/LCOMM.2019.2957217
Zhang, 2019
Xu, 2020, Legitimate surveillance of suspicious communications with QoS guarantees for unsuspicious users, IEEE Commun. Lett., 10.1109/LCOMM.2020.2982651
Zeng, 2016, Wireless information surveillance via proactive eavesdropping with spoofing relay, IEEE J. Sel. Top. Sign. Proces., 10, 1449, 10.1109/JSTSP.2016.2600519
Moon, 2018, Relay-assisted proactive eavesdropping with cooperative jamming and spoofing, IEEE Trans. Wireless Commun., 17, 6958, 10.1109/TWC.2018.2865305
Lu, 2015, Wireless networks with RF energy harvesting: A contemporary survey, IEEE Commun. Surv. Tutor., 17, 757, 10.1109/COMST.2014.2368999
Niyato, 2017, Wireless powered communication networks: Research directions and technological approaches, IEEE Wirel. Commun., 24, 88, 10.1109/MWC.2017.1600116
Xu, 2017, Joint power control and time allocation for wireless powered underlay cognitive radio networks, IEEE Wirel. Commun. Lett., 6, 294, 10.1109/LWC.2017.2676102
Zhang, 2018, Wireless powered cooperative jamming for secure OFDM system, IEEE Trans. Veh. Technol., 67, 1331, 10.1109/TVT.2017.2756877
Xu, 2019, Resource allocation for secure communications in cooperative cognitive wireless powered communication networks, IEEE Syst. J., 13, 2431, 10.1109/JSYST.2018.2883491
Liu, 2018, Exploiting interference for secrecy wireless information and power transfer, IEEE Wirel. Commun., 25, 133, 10.1109/MWC.2018.1700146
Xu, 2019, Jammer-assisted legitimate eavesdropping in wireless powered suspicious communication networks, IEEE Access, 7, 20363, 10.1109/ACCESS.2019.2895835
Xu, 2019, Legitimate surveillance with battery-aided wireless powered full-duplex monitor, IEEE Syst. J., 10.1109/JSYST.2019.2952119
M. Guillaud, D.T. Slock, R. Knopp, A practical method for wireless channel reciprocity exploitation through relative calibration, in: Proc. ISSPA, 2005, pp. 403–406.
Kang, 2015, Full-duplex wireless-powered communication network with energy causality, IEEE Trans. Wireless Commun., 14, 5539, 10.1109/TWC.2015.2439673
Yu, 2006, Dual methods for nonconvex spectrum optimization of multicarrier systems, IEEE Trans. Commun., 54, 1310, 10.1109/TCOMM.2006.877962
Boyd, 2004