E. D. Silva, A. L. Santos, L. C. Albini, and M. Lima, Identity based key management in mobile ad hoc networks: Techniques and applications, IEEE Trans. Wireless Commun, vol.15, issue.5, pp.46-52, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01167540

E. Tekin and A. Yener, The general gaussian multiple access and twoway wire-tap channels: achievable rates and cooperative jamming, IEEE Trans. Inform. Theory, vol.54, pp.2735-2751, 2008.

P. Popovski and O. Simeone, Wireless secrecy in cellular systems with infrastructure-aided cooperation, IEEE Trans. Inform. Forensics and Security, vol.4, issue.2, pp.242-256, 2009.

G. Chen, Z. Tian, Y. Gong, Z. Chen, and J. A. Chambers, Max-ratio relay selection in secure buffer-aided cooperative wireless networks, IEEE Trans. Inform. Forensics and Security, vol.9, issue.4, pp.719-729, 2014.

T. Liu and S. Shamai, A note on the secrecy capacity of the multipleantenna wiretap channel, IEEE Trans. Information Theory, vol.55, pp.2547-2553, 2009.

H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, The capacity region of the degraded multiple-input multiple-output compound broadcast channel, IEEE Trans. Inf. Theory, vol.55, pp.5011-5023, 2009.

G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, Physical layer network security in the full-duplex relay system, IEEE Trans. Inform. Forensics and Security, vol.10, issue.3, pp.574-583, 2015.

G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, Dual antenna selection in secure cognitive radio networks, IEEE Trans. Veh. Technol, 2016.

L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, Secure wireless communications via cooperation, Proc. 46th Ann. Allerton Conf. Communication, Control, and Computing, 2008.

L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, Amplify-and-forward based cooperation for secure wireless communications, Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, 2009.

M. Haenggi, The secrecy graph and some of its properties, Proc. IEEE Int. Symp. Inf. Theory, pp.539-543, 2008.

P. C. Pinto, J. Barros, and M. Z. Win, Physical-layer security in stochastic wireless networks, Proc. IEEE Int, pp.974-979, 2008.

X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjorungnes, On the throughput cost of physical layer security in decentralized wireless networks, IEEE Transactions on Wireless Communications, vol.10, pp.2764-2775, 2011.

G. Geraci, S. Singh, J. G. Andrews, J. Yuan, and I. B. Collings, Secrecy rates in broadcast channels with confidential messages and external eavesdroppers, IEEE Trans. on Wireless Commun, vol.13, pp.2931-2943, 2014.

T. X. Zheng, H. M. Wang, and Q. Yin, On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers, IEEE Commun. Lett, vol.18, pp.1299-1302, 2014.

M. Ghogho and A. Swami, Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers, Communications Workshops (ICC), 2011 IEEE International Conference on, pp.1-5, 2011.

T. X. Zheng, H. M. Wang, J. Yuan, D. Towsley, and M. H. Lee, Multiantenna transmission with artificial noise against randomly distributed eavesdroppers, IEEE Trans. on Commun, vol.63, pp.4347-4362, 2015.

S. Hong, J. Brand, J. Choi, M. Jain, J. Mehlman et al., Applications of self-interference cancellation in 5G and beyond, IEEE Commun. Magazine, vol.52, issue.2, pp.114-121, 2014.

X. Zhang, X. Zhou, and M. R. Mckay, Enhancing secrecy with multiantenna transmission in wireless ad hoc networks, IEEE Transactions on Information Forensics and Security, vol.8, pp.1802-1814, 2013.

C. Wang, H. M. Wang, X. G. Xia, and C. Liu, Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach, IEEE Transactions on Wireless Communications, vol.14, pp.2596-2612, 2015.

X. Zhang, X. Zhou, and M. R. Mckay, On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels, IEEE Transactions on Vehicular Technology, vol.62, pp.2170-2181, 2013.

P. C. Pinto, J. Barros, and M. Z. Win, Secure communication in stochastic wireless networks-part I: Connectivity, IEEE Trans. Inf. Forensics and Security, vol.7, pp.125-138, 2012.

I. S. Gradshteyn and I. M. Ryzhik, Table of integrals, series, and products, 2007.

E. Hossain and M. Hasan, 5G cellular: key enabling technologies and research challenges, IEEE Instrumentation Measurement Magazine, vol.18, pp.11-21, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01121142