1. Demestichas P, Georgakopoulos A, Karvounas D, et al. 5G on the horizon: key challenges for the radio-access network. IEEE Vehicular Technology Magazine, 2013, 8(3): 47-59
2. C-RAN the road towards green RAN. White Paper, ver 2.5. Beijing, China: China Mobile Research Institute, 2011
3. Wyner A D. The wire-tap channel. Bell System Technical Journal, 1975, 54(8): 1355-1387
4. Bloch M, Barros J, Rodrigues M R D, et al. Wireless information-theoretic security. IEEE Transactions on Information Theory, 2008, 54(6): 2515-2534
5. Yang Y C, Zhao H, Wang W B, et al. Joint power allocation and relay selection for decode-and-forward cooperative relay in secure communication. The Journal of China Universities of Posts and Telecommunications, 2013, 20(2): 79-85
6. Krikidis I, Thompson J S, McLaughlin S. Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 2009, 8(10): 5003-5011
7. Chen J C, Zhang R Q, Song L Y, et al. Joint relay and jammer selection for secure two-way relay networks. Proceedings of the IEEE International Conference on Communications (ICC’11), Jun 5-9, 2011, Kyoto, Japan. Piscataway, NJ, USA: IEEE, 2011: 5p
8. Huang J, Swindlehurst A L. Secure communications via cooperative jamming in two-hop relay systems. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’10), Dec 6-10, 2010, Miami, FL, USA. Piscataway, NJ, USA: IEEE, 2010: 5p
9. Liang Y B, Poor H V, Ying L. Secrecy throughput of MANETs with malicious nodes. Proceedings of the IEEE International Symposium on Information Theory (ISIT’09), Jun 28-Jul 3, 2009, Seoul, Republic of Korea. Piscataway, NJ, USA: IEEE, 2009: 1189-1193
10. Pinto P C, Barros J. Percolation and connectivity in the intrinsically secure communications graph. IEEE Transactions on Information Theory, 2012, 58(3): 1716-1730
11. Wang H, Zhou X Y, Reed M C. Physical layer security in cellular networks: a stochastic geometry approach. IEEE Transactions on Wireless Communications, 2013, 12(6): 2776-2787
12. Weber S P, Yang X Y, Andrews J G, et al. Transmission capacity of wireless ad hoc networks with outage constraints. IEEE Transactions on Information Theory, 2005 , 51(12): 4091-4102
13. Andrews J G, Baccelli F, Ganti R K. A new tractable model for cellular coverage. Proceedings of the 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton’10), Sept 29-Oct 1, 2010, Allerton, IL, USA. Piscataway, NJ, USA: IEEE, 2010:1204-1211
14. Hasan A, Andrews J G. The guard zone in wireless Ad hoc networks. IEEE Transactions on Wireless Communications, 2007, 6(4): 897-906
15. Baccelli F, B?aszczyszyn B. Stochastic geometry and wireless networks. West Bend, WI, USA: Now Publishers Inc, 2009
17. Cheung W C, Quek T Q S, Kountouris M. Throughput optimization, spectrum allocation, and access control in two-tier femtocell networks. IEEE Journal on Selected Areas in Communications, 2012, 30(3): 561-574
|