Shannon C E. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949, 28: 656-715.
[2]
Leung-Yan-Cheong S K, Hellman M E. The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978, 24: 451-456.
[3]
Csiszár I, Körner J. Broadcast channels with confidential messages[J]. IEEE Transactions on Information Theory, 1978, 24: 339-348.
[4]
Chiurtu N, Rimoldi B, Telatar I E. On the capacity of multi-antenna Gaussian channels[C]∥IEEE International Symposium on Information Theory,Washington,2001.
[5]
Sendonaris A, Erkip E, Aazhang B. User cooperation diversity part I: system description and part II: implementation aspects and performance analysis[J]. IEEE Transactions on Communication, 2003, 51(11): 1927-1948.
[6]
Laneman J N, Tse D N C, Wornell G W. Cooperative diversity in wireless networks: efficient protocols and outage behavior[J]. IEEE Transactions on Information Theory, 2004, 50(12): 3062-3080.
[7]
Praveen K G, Lai L F, Gamal E L H. On the secrecy capacity of fading channels[J]. IEEE Transactions on Information Theory, 2008, 54(10): 4687-4698.
[8]
Li J Y, Petropulu A P, Weber S. On cooperative relaying schemes for wireless physical layer security[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4985-4997.
[9]
Lun D, Zhu H, Petropulu A P, et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010, 58(3): 1875-1888.
[10]
Ye Y, Li Q, Wing-Kin M, et al. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2013, 20(1): 35-38.
[11]
Liang Y B, Gerhard K, Vincent H, et al. Compound wiretap channels[J]. EURASIP Journal on Wireless Communications and Networking, 2007.
[12]
Boyd S, Vandenberghe L. Convex Optimization[M]. Cambridge, UK: Cambridge University Press, 2004.
[13]
Sturm J F. Using SeDuMi 1.02, a Matlab toolbox for optimization over symmetric cones[J]. Optimization Methods and Software, 1999, 11(1-4): 625-653.
[14]
Zhang J W, Gursoy M C. Collaborative relay beamforming for secrecy[C]∥Preceding of IEEE International Conference on Communications, 2010.
[15]
Huang J, Swindlehurst A L. Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884.
[16]
Wang H M, Yin Q Y, Xia X G. Distributed beamforming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Signal Processing, 2012, 60(7): 3532-3545.