參考文獻 |
[1] A. Abdi, W. Lau, M.-S. Alouini, and M. Kaveh, “A new simple model for land mobile
satellite channels: first- and second-order statistics,” IEEE Transactions on Wireless
Communications, vol. 2, no. 3, pp. 519–528, 2003.
[2] L. Dai, B. Wang, Y. Yuan, S. Han, I. Chih-lin, and Z. Wang, “Non-orthogonal multiple
access for 5g: solutions, challenges, opportunities, and future research trends,”
IEEE Communications Magazine, vol. 53, no. 9, pp. 74–81, 2015.
[3] S. M. R. Islam, N. Avazov, O. A. Dobre, and K.-s. Kwak, “Power-domain nonorthogonal
multiple access (noma) in 5g systems: Potentials and challenges,” IEEE
Communications Surveys & Tutorials, vol. 19, no. 2, pp. 721–742, 2017.
[4] Y. Liu, H.-H. Chen, and L. Wang, “Physical layer security for next generation wireless
networks: Theories, technologies, and challenges,” IEEE Communications Surveys
& Tutorials, vol. 19, no. 1, pp. 347–376, 2017.
[5] B. Li, Z. Fei, C. Zhou, and Y. Zhang, “Physical-layer security in space information
networks: A survey,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 33–52, 2020.
[6] M. G. Schraml, R. T. Schwarz, and A. Knopp, “Multiuser mimo concept for physical
layer security in multibeam satellite systems,” IEEE Transactions on Information
Forensics and Security, vol. 16, pp. 1670–1680, 2021.
[7] Z. Lin, M. Lin, J.-B. Wang, Y. Huang, and W.-P. Zhu, “Robust secure beamforming
for 5g cellular networks coexisting with satellite networks,” IEEE Journal on
Selected Areas in Communications, vol. 36, no. 4, pp. 932–945, 2018.
[8] J. Lei, Z. Han, M. n. Vazquez-Castro, and A. Hjorungnes, “Secure satellite communication
systems design with individual secrecy rate constraints,” IEEE Transactions
on Information Forensics and Security, vol. 6, no. 3, pp. 661–671, 2011.
[9] T. Zhao, G. Li, G. Zhang, and C.-X. Zhang, “Security-enhanced user pairing for
miso-noma downlink transmission,” in 2018 IEEE Global Communications Conference
(GLOBECOM), 2018, pp. 1–6.
[10] Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin, “Secure beamforming in downlink miso
nonorthogonal multiple access systems,” IEEE Transactions on Vehicular Technology,
vol. 66, no. 8, pp. 7563–7567, 2017.
[11] L. Lv, Z. Ding, Q. Ni, and J. Chen, “Secure miso-noma transmission with artificial
noise,” IEEE Transactions on Vehicular Technology, vol. 67, no. 7, pp. 6700–6705,
2018.
[12] N. Yang, M. Elkashlan, T. Q. Duong, J. Yuan, and R. Malaney, “Optimal transmission
with artificial noise in misome wiretap channels,” IEEE Transactions on Vehicular
Technology, vol. 65, no. 4, pp. 2170–2181, 2016.
[13] X. Zhou and M. R. McKay, “Secure transmission with artificial noise over fading
channels: Achievable rate and optimal power allocation,” IEEE Transactions on
Vehicular Technology, vol. 59, no. 8, pp. 3831–3842, 2010.
[14] N. Horiike, H. Kitagawa, E. Okamoto, and T. Yamamoto, “Chaos mimo-based
downlink non-orthogonal multiple access scheme with physical layer security,”
in 2018 15th IEEE Annual Consumer Communications & Networking Conference
(CCNC), 2018, pp. 1–7.
[15] I. Al-Musawi, W. Al-Hussaibi, Y. H. Tahir, and F. Ali, “Chaos-based secure powerdomain
noma for wireless applications,” in 2020 23rd International Symposium on
Wireless Personal Multimedia Communications (WPMC), 2020, pp. 1–6.
[16] Y. Masuda, E. Okamoto, K. Ito, and T. Yamamoto, “An uplink non-orthogonal multiple
access scheme having physical layer security based on chaos modulation,” in
2019 International Conference on Information Networking (ICOIN), 2019, pp. 136–
140.
[17] Y.-C. Tung, S. Han, D. Chen, and K. G. Shin, “Vulnerability and protection of channel
state information in multiuser mimo networks,” in Proceedings of the 2014 ACM
SIGSAC Conference on Computer and Communications Security, 2014, p. 775–786.
[18] Y. Yang, Y. Chen, W. Wang, and G. Yang, “Securing channel state information in
multiuser mimo with limited feedback,” IEEE Transactions on Wireless Communications,
vol. 19, no. 5, pp. 3091–3103, 2020.
[19] X. Zhang and E. W. Knightly, “csisnoop : Inferring channel state information in
multi-user mimo wlans,” IEEE/ACM Transactions on Networking, vol. 27, no. 1,
pp. 231–244, 2019.
[20] S. Ribouh, K. Phan, A. V. Malawade, Y. Elhillali, A. Rivenq, and M. A. A.
Faruque, “Channel state information-based cryptographic key generation for intelligent
transportation systems,” IEEE Transactions on Intelligent Transportation Systems,
vol. 22, no. 12, pp. 7496–7507, 2021.
[21] System Tool 1- 11, Analytical Graphics, Inc., 2019, [Online; accessed 27-July-2020].
[Online]. Available: https://www.agi.com/products/stk
[22] E. C. Cejudo, H. Zhu, and O. Alluhaibi, “On the power allocation and constellation
selection in downlink noma,” in 2017 IEEE 86th Vehicular Technology Conference
(VTC-Fall), 2017, pp. 1–5.
[23] X. Liu, Z. Chen, Y. Wang, F. Zhou, Y. Luo, and R. Q. Hu, “Ber analysis of nomaenabled
visible light communication systems with different modulations,” IEEE
Transactions on Vehicular Technology, vol. 68, no. 11, pp. 10 807–10 821, 2019. |