A Khisti, A Tchamkerten, G W Wornell.Secure broadcasting over fading channels[J].IEEE Transactions on Information Theory, 2008, 54(6):2453-2469.
[2]
X Zhou, R K Ganti, J G Andrews, et al.On the throughput cost of physical layer security in decentralized wireless networks[J].IEEE Transactions on Wireless Communications, 2011, 10(8):2764-2775.[LL]
[3]
W C Ao, K C Chen.Broadcast transmission capacity of heterogeneous wireless ad hoc networks with secrecy outage constraints[A].IEEE Proceeding of Globecom Conference[C].USA:IEEE Press, 2011.1-5.
[4]
J E Paloheimo.A spatial bivariate Poisson distribution[J].Biometrika, 1972, 59(2):489-492.
[5]
A Babaei, B Jabbari.Distance distribution of bivariate Poisson network nodes[J].IEEE Communication Letters, 2010, 14(9):845-850.
[6]
P C Pinto, J Barros, M Z Win.Wireless physical-layer security:The case of colluding eavesdroppers[A].IEEE Proceedings of International Symposium on Information Theory[C].USA:IEEE Press, 2009.2442-2446.
[7]
Y Liang, H V Poor, L Ying.Secrecy throughput of MANETs with malicious nodes[A].IEEE Proceedings of International Symposium on Information Theory[C].USA:IEEE Press, 2009.1189-1193.
[8]
J Kingman.Poisson Processes[M].Oxford:UK:Oxford University Press, 1993.
[9]
C E Shannon.Communication theory of secrecy systems[J].Bell System Technical Journal, 1949, 28(4):656-715.
[10]
Y Liang, H V Poor, S Shamai.Information theoretic security[J].Foundations and Trends Communication Information Theory, 2009, 5(4):355-580.
[11]
A Wyner.The wire-tap channel[J].Bell System Technical Journal, 1975, 54(8):1355-1387.
[12]
P K Gopala, L Lai, H E Gamal.On the secrecy capacity of fading channels[J].IEEE Transactions on Information Theory, 2008, 54(10):4687-4698.
[13]
王育民.Shannon信息保密理论的新进展[J].电子学报, 1998, 26(7):27-34. Y M Wang.Developments in Shannon''s theory of information secrecy[J].Acta Electronica Sinica, 1998, 26(7):27-34.(in Chinese)
[14]
A Khisti, G W Wornell.Secure transmission with multiple antennas I:The MISOME wiretap channel[J].IEEE Transactions on Information Theory, 2010, 56(7):3088-3104.