1 |
QUEIROZ D V , ALENCAR M S , GOMES R D , et al. Survey and systematic mapping of industrial wireless sensor networks[J]. Journal of Network and Computer Applications, 2017, 97 (11): 96- 125.
|
2 |
CHETTRI L , BERA R . A comprehensive survey on internet of things (IoT) toward 5G wireless systems[J]. IEEE Internet of Things Journal, 2020, 7 (1): 16- 32.
doi: 10.1109/JIOT.2019.2948888
|
3 |
SALAM H A , KHAN B M . IWSN-standards, challenges and future[J]. IEEE Potentials, 2016, 35 (2): 9- 16.
doi: 10.1109/MPOT.2015.2422931
|
4 |
JING Q , VASILAKOS A Y , WAN J , et al. Security of the internet of things: perspectives and challenges[J]. Wireless Networks, 2014, 20 (8): 2481- 2501.
doi: 10.1007/s11276-014-0761-7
|
5 |
ZOU Y , WANG G . Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack[J]. IEEE Trans.on Industrial Informatic, 2016, 12 (2): 780- 787.
doi: 10.1109/TII.2015.2399691
|
6 |
TOMIC I , MCCANN J A . A survey of potential security issues in existing wireless sensor network protocols[J]. IEEE Internet of Things Journal, 2017, 4 (6): 1910- 1923.
doi: 10.1109/JIOT.2017.2749883
|
7 |
WYNER A D . The wire-tap channel[J]. Bell Systems Techno-logy Journal, 1975, 54 (8): 1355- 1387.
doi: 10.1002/j.1538-7305.1975.tb02040.x
|
8 |
HAMAMREH J M , FURQAN H M , ARSLAN H . Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey[J]. IEEE Communications Surveys and Tutorials, 2019, 21 (2): 1773- 1828.
doi: 10.1109/COMST.2018.2878035
|
9 |
WU Y , KHISTI A , XIAO C , et al. A survey of physical layer security techniques for 5G wireless networks and challenges ahead[J]. IEEE Journal on Selected Areas in Communications, 2018, 36 (4): 679- 695.
doi: 10.1109/JSAC.2018.2825560
|
10 |
朱江, 汪智豪. 时间反演联合接收端人工噪声的安全传输方案[J]. 系统工程与电子技术, 2020, 42 (10): 2374- 2380.
doi: 10.3969/j.issn.1001-506X.2020.10.28
|
|
ZHU J , WANG Z H . Secure transmission scheme of time reversal combined with artificial noise at receiver[J]. Systems Engineering and Electronics, 2020, 42 (10): 2374- 2380.
doi: 10.3969/j.issn.1001-506X.2020.10.28
|
11 |
JAMEEL F , WYNE S , KADDOUM G , et al. A comprehensive survey on cooperative relaying and jamming strategies for physical layer security[J]. IEEE Communications Surveys & Tutorials, 2018, 21 (3): 2734- 2771.
|
12 |
HU L , WEN H , WU B , et al. Cooperative jamming for physical layer security enhancement in internet of things[J]. IEEE Internet of Things Journal, 2017, 5 (1): 219- 228.
|
13 |
VO V N , NGUYEN T G , SO-IN C , et al. Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy[J]. IEEE Access, 2018, 6, 23406- 23419.
doi: 10.1109/ACCESS.2018.2829485
|
14 |
YANG M Q , ZHANG B N , HUANG Y Z , et al. Secure multiuser communications in wireless sensor networks with TAS and cooperative jamming[J]. Sensors, 2014, 16 (11): 1908.
|
15 |
PTR P H. A primer in game theory[M]. Harvester Wheatsheaf, 1992.
|
16 |
NAMVAR N, SAAD W, BAHADORI N, et al. Jamming in the internet of things: a game-theoretic perspective[C]//Proc. of the Global Communications Conference, 2016.
|
17 |
JIANG G X , SHEN S G , HU K L , et al. Evolutionary game-based secrecy rate adaptation in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2015, 2015 (25): 975454.
|
18 |
杜晓丽, 梁开荣, 李登峰. 基于CIS值的双边链路形成策略优化两型博弈方法[J]. 系统工程与电子技术, 2020, 42 (7): 1550- 1557.
|
|
DU X L , LIANG K R , LI D F . Biform game approach to strategy optimization of bilateral link formation based on CIS value[J]. Systems Engineering and Electronics, 2020, 42 (7): 1550- 1557.
|
19 |
ROMERO E , BLESA J , ARAUJO A . An adaptive energy aware strategy based on game theory to add privacy in the physical layer for Cognitive WSNs[J]. Ad Hoc Networks, 2018, 92, 102414.
|
20 |
WANG K , YUAN L , MIYAZAKI T , et al. Jamming and eavesdropping defense in green cyber-physical transportation systems using stackelberg game[J]. IEEE Trans.on Industrial Informatics, 2018, 14 (9): 4232- 4242.
doi: 10.1109/TII.2018.2841033
|
21 |
ZHANG R, SONG L, HAN Z, et al. Improve physical layer security in cooperative wireless network using distributed auction games[C]//Proc. of the Computer Communications Workshops, 2011: 18-23.
|
22 |
ZHOU H , HE D X , WANG H . Joint relay and jammer selection for secure cooperative networks with a full-duplex active eavesdropper[J]. IET Communications, 2020, 14 (6): 1043- 1055.
doi: 10.1049/iet-com.2019.1042
|
23 |
何崇林, 孙子文. 多跳IWSN物理层安全的Stackelberg博弈[J]. 信号处理, 2021, 37 (4): 578- 587.
|
|
HE C L , SUN Z W . Stackelberg game for physical layer security of multi-hop IWSN[J]. Journal of Signal Processing, 2021, 37 (4): 578- 587.
|
24 |
LI C X , LIU Y , XU Q , et al. Self-interference cancellation with frequency offset and nonlinear distortion suppression for cooperative jamming communications[J]. IEEE Communications Letters, 2019, 23 (11): 2091- 2094.
doi: 10.1109/LCOMM.2019.2936845
|
25 |
LEUNGYC S , HELLMAN M . The Gaussian wire-tap channel[J]. IEEE Trans.on Information Theory, 1978, 24 (4): 451- 456.
doi: 10.1109/TIT.1978.1055917
|
26 |
WU R J , VANGORDER R A . Nonlinear dynamics of discrete time multi-level leader-follower games[J]. Applied Mathema-tics and Computation, 2018, 320, 240- 250.
doi: 10.1016/j.amc.2017.09.034
|
27 |
FANG H , XU L , ZOU Y L , et al. Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication[J]. IEEE Trans.on Vehicular Technology, 2018, 67 (11): 10788- 10799.
doi: 10.1109/TVT.2018.2868900
|
28 |
金鑫. 无线信道传播模型的研究与实现[D]. 北京: 北京邮电大学, 2010.
|
|
JIN X. Research and implentation of wireless channel propagation modle[D]. Beijing: Beijing University of Posts and Telecommunications, 2010.
|
29 |
ZOU Y L , WANG X B , SHEN W M . Optimal relay selection for physical-layer security in cooperative wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013, 31 (10): 2099- 2111.
doi: 10.1109/JSAC.2013.131011
|
30 |
BASSILY R , ULUKUS S . Deaf cooperation and relay selection strategies for secure communication in multiple relay networks[J]. IEEE Trans.on Signal Processing, 2013, 61 (6): 1544- 1554.
doi: 10.1109/TSP.2012.2235433
|
31 |
WANG K , YUAN L , MIYAZAKI T , et al. Strategic antieavesdropping game for physical layer security in wireless cooperative networks[J]. IEEE Trans.on Vehicular Technology, 2017, 66 (10): 9448- 9457.
doi: 10.1109/TVT.2017.2703305
|
32 |
DUAN B W, CAI Y M, ZHENG J C, et al. Cooperative jammer power allocation-A Nash bargaining solution method[C]//Proc. of the International Conference on Wireless Communications & Signal Processing, 2015.
|
33 |
KIM T S , KIM S L . Random power control in wireless ad hoc networks[J]. IEEE Communications Letters, 2005, 9 (12): 1046- 1048.
doi: 10.1109/LCOMM.2005.1576583
|