參考文獻 |
[1] A. Abdi, W. Lau, M.-S. Alouini, and M. Kaveh, “A new simple model for land mobile
satellite channels: first- and second-order statistics,” IEEE Transactions on Wireless
Communications, vol. 2, no. 3, pp. 519–528, 2003.
[2] K. An, M. Lin, J. Ouyang, and W.-P. Zhu, “Secure transmission in cognitive satellite
terrestrial networks,” IEEE Journal on Selected Areas in Communications, vol. 34,
no. 11, pp. 3025–3037, 2016.
[3] M. n. Vázquez, A. Pérez-Neira, D. Christopoulos, S. Chatzinotas, B. Ottersten, P.-D.
Arapoglou, A. Ginesi, and G. Taricco, “Precoding in multibeam satellite communications:
Present and future challenges,” IEEE Wireless Communications, vol. 23,
no. 6, pp. 88–95, 2016.
[4] L. You, A. Liu, W. Wang, and X. Gao, “Outage constrained robust multigroup multicast
beamforming for multi-beam satellite communication systems,” IEEE Wireless
Communications Letters, vol. 8, no. 2, pp. 352–355, 2019.
[5] L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of
massive mimo: Benefits and challenges,” IEEE Journal of Selected Topics in Signal
Processing, vol. 8, no. 5, pp. 742–758, 2014.
[6] L. You, X. Gao, X.-G. Xia, N. Ma, and Y. Peng, “Pilot reuse for massive mimo
transmission over spatially correlated rayleigh fading channels,” IEEE Transactions
on Wireless Communications, vol. 14, no. 6, pp. 3352–3366, 2015.
[7] A.-A. Lu, X. Gao, W. Zhong, C. Xiao, and X. Meng, “Robust transmission for massive
mimo downlink with imperfect csi,” IEEE Transactions on Communications,
vol. 67, no. 8, pp. 5362–5376, 2019.
[8] R. Miller and W. Trappe, “Subverting MIMO wireless systems by jamming the channel
estimation procedure,” ACM Conference on Wireless Network Security, pp. 19–
–24, 2010.
[9] G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa, “On the robustness of IEEE
802.11 rate adaptation algorithms against smart jamming,” ACM Conference on
Wireless Network Security, pp. 97––108, 2011.
[10] Y. Yang, Y. Chen, W. Wang, and G. Yang, “Securing channel state information in
multiuser MIMO with limited feedback,” IEEE Transactions on Wireless Communications,
vol. 19, no. 5, pp. 3091–3103, 2020.
[11] B. Li, Z. Fei, C. Zhou, and Y. Zhang, “Physical-layer security in space information
networks: A survey,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 33–52, 2020.
[12] M. G. Schraml, R. T. Schwarz, and A. Knopp, “Multiuser MIMO concept for physical
layer security in multibeam satellite systems,” IEEE Transactions on Information
Forensics and Security, vol. 16, pp. 1670–1680, 2021.
[13] Z. Lin, M. Lin, J.-B. Wang, Y. Huang, and W.-P. Zhu, “Robust secure beamforming
for 5G cellular networks coexisting with satellite networks,” IEEE Journal on
Selected Areas in Communications, vol. 36, no. 4, pp. 932–945, 2018.
[14] J. Lei, Z. Han, M. n. Vazquez-Castro, and A. Hjorungnes, “Secure satellite communication
systems design with individual secrecy rate constraints,” IEEE Transactions
on Information Forensics and Security, vol. 6, no. 3, pp. 661–671, 2011.
[15] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of
physical layer security in multiuser wireless networks: A survey,” IEEE Communications
Surveys Tutorials, vol. 16, no. 3, pp. 1550–1573, 2014.
[16] Y. Peng, P. Wang, W. Xiang, and Y. Li, “Secret key generation based on estimated
channel state information for TDD-OFDM systems over fading channels,” IEEE
Transactions on Wireless Communications, vol. 16, no. 8, pp. 5176–5186, 2017.
[17] C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam,
“Information-theoretically secret key generation for fading wireless channels,” IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 240–254,
2010.
[18] H. Liu, Y. Wang, J. Yang, and Y. Chen, “Fast and practical secret key extraction by
exploiting channel response,” IEEE INFOCOM, pp. 3048–3056, 2013.
[19] Z. Jiang, J. Zhao, X.-Y. Li, J. Han, and W. Xi, “Rejecting the attack: Source authentication
for Wi-Fi management frames using CSI information,” IEEE INFOCOM,
pp. 2544–2552, 2013.
[20] T.-Y. Liu, S.-C. Lin, and Y.-W. P. Hong, “On the role of artificial noise in training and
data transmission for secret communications,” IEEE Transactions on Information
Forensics and Security, vol. 12, no. 3, pp. 516–531, 2017.
[21] N. Yang, M. Elkashlan, T. Q. Duong, J. Yuan, and R. Malaney, “Optimal transmission
with artificial noise in MISOME wiretap channels,” IEEE Transactions on Vehicular
Technology, vol. 65, no. 4, pp. 2170–2181, 2016.
[22] Y.-C. Tung, S. Han, D. Chen, and K. G. Shin, “Vulnerability and protection of channel
state information in multiuser MIMO networks,” ACM SIGSAC Conference on
Computer and Communications Security, pp. 775––786, 2014.
[23] X. Zhang and E. W. Knightly, “CSIsnoop: Inferring channel state information in
multi-user MIMO WLANs,” IEEE/ACM Transactions on Networking, vol. 27, no. 1,
pp. 231–244, 2019.
[24] C. Zhang, Y. Jing, Y. Huang, and L. Yang, “Performance analysis for massive MIMO
downlink with low complexity approximate zero-forcing precoding,” IEEE Transactions
on Communications, vol. 66, no. 9, pp. 3848–3864, 2018.
[25] L. U. Khan, N. Khan, M. I. Khattak, and M. Shafi, “LS estimator: Performance analysis
for block-type and comb-type channel estimation in OFDM system,” International
Bhurban Conference on Applied Sciences Technology (IBCAST), pp. 420–424,
2014.
[26] Y. Liu and S. Sezginer, “Iterative compensated MMSE channel estimation in LTE
systems,” IEEE International Conference on Communications (ICC), pp. 4862–
4866, 2012.
[27] NR; Physical channels and modulation, 3GPP, Dec. 2020, TS 38.211 V16.4.0.
[28] Security architecture and procedures for 5G System, 3GPP, Mar. 2021, TS 33.501
V17.1.0.
[29] System Tool Kit 11, Analytical Graphics, Inc., 2019. [Online]. Available:
https://www.agi.com/products/stk
[30] Digital Video Broadcasting (DVB); Second Generation Framing Structure, Channel
Coding and Modulation Systems for Broadcasting, Interactive Services, News
Gathering and Other Broadband Satellite Applications; Part 1: DVB-S2, ETSI EN
302307-2, 2014.
[31] K. HIGUCHI and A. BENJEBBOUR, “Non-orthogonal multiple access (NOMA)
with successive interference cancellation for future radio access,” IEICE Transactions
on Communications, vol. E98.B, no. 3, pp. 403–414, 2015. |