메뉴 건너뛰기




Volumn 54, Issue 6, 2008, Pages 2470-2492

Secure communication over fading channels

Author keywords

Confidential message; Ergodic capacity; Fading broadcast channel; Gaussian broadcast channel; Outage probability; Parallel broadcast channel; Power allocation; Secrecy capacity

Indexed keywords

BEAMFORMING; CHANNEL STATE INFORMATION; CODES (SYMBOLS); FADING (RADIO); FADING CHANNELS; FOOD ADDITIVES; GAUSSIAN DISTRIBUTION; INFORMATION THEORY; MICROFLUIDICS; MULTITASKING; OUTAGES; PROBABILITY; RADIO BROADCASTING; TARGETS; TRELLIS CODES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 45249119255     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.921678     Document Type: Article
Times cited : (794)

References (60)
  • 1
    • 0016562514 scopus 로고
    • The wiretap channel
    • Oct
    • A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • Adelaide, Australia, Sep
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Information Theory (ISIT , Adelaide, Australia, Sep. 2005, pp. 2152-2155.
    • (2005) Proc. IEEE Int. Symp. Information Theory (ISIT , pp. 2152-2155
    • Parada, P.1    Blahut, R.2
  • 7
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • submitted for publication
    • P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Gopala, P.1    Lai, L.2    El Gamal, H.3
  • 10
    • 45249089411 scopus 로고    scopus 로고
    • T. Liu and S. Shamai (Shitz), A note on the secrecy capacity of the multi-antenna wiretap channel, IEEE Trans. Inf. Theory, [Online]. Available: http://arxiv.org/PS_cache/arxiv/pdf/0710/ 0710.4105v1.pdf, submitted for publication
    • T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multi-antenna wiretap channel," IEEE Trans. Inf. Theory, [Online]. Available: http://arxiv.org/PS_cache/arxiv/pdf/0710/ 0710.4105v1.pdf, submitted for publication
  • 11
    • 69449086815 scopus 로고    scopus 로고
    • Towards the secrecy capacity of the Gaussian MIMO wiretap channel:THe 2-2-1 channel
    • submitted for publication
    • S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wiretap channel:THe 2-2-1 channel," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Shafiee, S.1    Liu, N.2    Ulukus, S.3
  • 12
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 13
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate region
    • Jun
    • R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate region," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.4
  • 14
    • 62749109096 scopus 로고    scopus 로고
    • Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages
    • submitted for publication
    • R. Liu and H. V. Poor, "Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Liu, R.1    Poor, H.V.2
  • 16
    • 0004015843 scopus 로고
    • The Capacity of the Degraded Spectral Gaussian Broadcast Channel,
    • Ph.D. dissertation, Stanford Univ, Stanford, CA
    • D. Hughes-Hartogs, "The Capacity of the Degraded Spectral Gaussian Broadcast Channel," Ph.D. dissertation, Stanford Univ., Stanford, CA, 1975.
    • (1975)
    • Hughes-Hartogs, D.1
  • 17
    • 0030706705 scopus 로고    scopus 로고
    • Optimal power allocation over parallel Gaussian broadcast channels
    • Ulm, Germany, Jun
    • D. N. C. Tse, "Optimal power allocation over parallel Gaussian broadcast channels," in Proc. IEEE Int. Symp. Information Theory (ISIT), Ulm, Germany, Jun. 1997, p. 27.
    • (1997) Proc. IEEE Int. Symp. Information Theory (ISIT) , pp. 27
    • Tse, D.N.C.1
  • 18
    • 0035270116 scopus 로고    scopus 로고
    • Capacity and optimal resource allocation for fading broadcast channels-Part I: Ergodic capacity
    • Mar
    • L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels-Part I: Ergodic capacity," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1083-1102, Mar. 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.3 , pp. 1083-1102
    • Li, L.1    Goldsmith, A.J.2
  • 19
    • 0035271101 scopus 로고    scopus 로고
    • Capacity and optimal resource allocation for fading broadcast channels-Part II: Outage capacity
    • Mar
    • L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels-Part II: Outage capacity," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1103-1127, Mar. 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.3 , pp. 1103-1127
    • Li, L.1    Goldsmith, A.J.2
  • 20
    • 5044251226 scopus 로고    scopus 로고
    • Capacity and dirty paper coding for Gaussian broadcast channels with common information
    • Chicago, IL, Jun./Jul
    • N. Jindal and A. Goldsmith, "Capacity and dirty paper coding for Gaussian broadcast channels with common information," in Proc. IEEE Int. Symp. Information Theory (ISIT), Chicago, IL, Jun./Jul. 2004, p. 215.
    • (2004) Proc. IEEE Int. Symp. Information Theory (ISIT) , pp. 215
    • Jindal, N.1    Goldsmith, A.2
  • 21
    • 0026153306 scopus 로고
    • A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
    • May
    • H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 634-638, May 1991.
    • (1991) IEEE Trans. Inf. Theory , vol.37 , Issue.3 , pp. 634-638
    • Yamamoto, H.1
  • 22
    • 0032668395 scopus 로고    scopus 로고
    • Optimal power control over fading channels
    • Jul
    • G. Caire, G. Taricco, and E. Bigheri, "Optimal power control over fading channels," IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1468-1489, Jul. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.5 , pp. 1468-1489
    • Caire, G.1    Taricco, G.2    Bigheri, E.3
  • 23
    • 0017495724 scopus 로고
    • A note on Wyner's wiretap channel
    • May
    • A. Carleial and M. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. IT-23, no. 3, pp. 387-390, May 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.IT-23 , Issue.3 , pp. 387-390
    • Carleial, A.1    Hellman, M.2
  • 24
    • 0017537504 scopus 로고
    • On a special class of wiretap channels
    • Sep
    • S. K. Leung-Yan-Cheong, "On a special class of wiretap channels," IEEE Trans. Inf. Theory, vol. IT-23, no. 5, pp. 625-627, Sep. 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.IT-23 , Issue.5 , pp. 625-627
    • Leung-Yan-Cheong, S.K.1
  • 25
    • 0024666944 scopus 로고
    • Coding theorem for secret sharing communication systems with two noisy channels
    • May
    • H. Yamamoto, "Coding theorem for secret sharing communication systems with two noisy channels," IEEE Trans. Inf. Theory, vol. 35, no. 3, pp. 572-578, May 1989.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , Issue.3 , pp. 572-578
    • Yamamoto, H.1
  • 26
    • 0031103783 scopus 로고    scopus 로고
    • On a special class of broadcast channels with confidential messages
    • Mar
    • M. van Dijk, "On a special class of broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 43, no. 2, pp. 712-714, Mar. 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.2 , pp. 712-714
    • van Dijk, M.1
  • 27
    • 33646073724 scopus 로고    scopus 로고
    • An achievable region for the Gaussian wiretap channel with side information
    • May
    • C. Mitrpant, A. J. H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.5 , pp. 2181-2190
    • Mitrpant, C.1    Vinck, A.J.H.2    Luo, Y.3
  • 28
    • 33749427184 scopus 로고    scopus 로고
    • On an upper bound of the secrecy capacity for a general wiretap channel
    • Adelaide, Australia, Sep
    • H. Koga and N. Sato, "On an upper bound of the secrecy capacity for a general wiretap channel," in Proc. IEEE Int. Symp. Information Theory (ISIT), Adelaide, Australia, Sep. 2005, pp. 1641-1645.
    • (2005) Proc. IEEE Int. Symp. Information Theory (ISIT) , pp. 1641-1645
    • Koga, H.1    Sato, N.2
  • 29
    • 5044245853 scopus 로고    scopus 로고
    • Generalized coset schemes for the wiretap channel: Applications to biometrics
    • Chicago, IL, Jun./Jul
    • G. Cohen and G. Zémor, "Generalized coset schemes for the wiretap channel: Applications to biometrics," in Proc. Int. Symp. Information Theory, Chicago, IL, Jun./Jul. 2004, p. 46.
    • (2004) Proc. Int. Symp. Information Theory , pp. 46
    • Cohen, G.1    Zémor, G.2
  • 31
    • 33645727315 scopus 로고    scopus 로고
    • General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel
    • Apr
    • M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.4 , pp. 1562-1575
    • Hayashi, M.1
  • 35
    • 84940647248 scopus 로고    scopus 로고
    • Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), Compound wiretap channels, in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 136-143.
    • Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wiretap channels," in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 136-143.
  • 36
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 37
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography-Part II: CR capacity
    • Jan
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahlswede, R.1    Csiszár, I.2
  • 38
    • 0027599802 scopus 로고
    • Secrete key agreement by public discussion based on common information
    • May
    • U. M. Maurer, "Secrete key agreement by public discussion based on common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 39
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Mar
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 40
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for mulitple terminals
    • Dec
    • I. Csiszár and P. Narayan, "Secrecy capacities for mulitple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 41
    • 33749441153 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • Adelaide, Australia, Sep
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," in Proc. IEEE Int. Symp. Information Theory (ISIT) Adelaide, Australia, Sep. 2005, pp. 2138-2141.
    • (2005) Proc. IEEE Int. Symp. Information Theory (ISIT) , pp. 2138-2141
    • Csiszár, I.1    Narayan, P.2
  • 42
    • 0034450066 scopus 로고    scopus 로고
    • From weak to strong information-theoretic key agreement
    • Sorrento, Italy, Jun
    • U. M. Maurer and S. Wolf, "From weak to strong information-theoretic key agreement," in Proc. IEEE Int. Symp. Information Theory (ISIT) Sorrento, Italy, Jun. 2000, p. 18.
    • (2000) Proc. IEEE Int. Symp. Information Theory (ISIT) , pp. 18
    • Maurer, U.M.1    Wolf, S.2
  • 43
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part I. Definitions and a completeness result
    • Apr
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I. Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 44
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part II. Privacy amplification
    • Apr
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part II. Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 45
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part III. Privacy amplification
    • Apr
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part III. Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.M.1    Wolf, S.2
  • 46
    • 0031647696 scopus 로고    scopus 로고
    • The common randomness capacity of a pair of independent discrete memoryless channels
    • Jan
    • S. Venkatesan and V. Anantharam, "The common randomness capacity of a pair of independent discrete memoryless channels," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 215-224, Jan. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 215-224
    • Venkatesan, S.1    Anantharam, V.2
  • 47
    • 0033892497 scopus 로고    scopus 로고
    • The common randomness capacity of a network of discrete memoryless channels
    • Mar
    • S. Venkatesan and V. Anantharam, "The common randomness capacity of a network of discrete memoryless channels," IEEE Trans. Inf. Theory vol. 46, no. 2, pp. 367-387, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 367-387
    • Venkatesan, S.1    Anantharam, V.2
  • 48
    • 40949147785 scopus 로고    scopus 로고
    • Multiple access channels with confidential messages
    • Mar
    • Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 50
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple access wiretap channel
    • submitted for publication
    • E. Tekin and A. Yener, "The Gaussian multiple access wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Tekin, E.1    Yener, A.2
  • 51
    • 84940659555 scopus 로고    scopus 로고
    • Achievable rates for the general Gaussian multiple access wiretap channel with collective secrecy
    • Monticello, IL, Sep
    • E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wiretap channel with collective secrecy," in Proc. 44th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2006, pp. 809-816.
    • (2006) Proc. 44th Annu. Allerton Conf. Communication, Control and Computing , pp. 809-816
    • Tekin, E.1    Yener, A.2
  • 52
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Cairns, Australia, Sep
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Information Theory Workshop (ITW), Cairns, Australia, Sep. 2001, pp. 87-89.
    • (2001) Proc. IEEE Information Theory Workshop (ITW) , pp. 87-89
    • Oohama, Y.1
  • 53
    • 51349098469 scopus 로고    scopus 로고
    • Relay channels with confidential messages
    • to be published
    • Y. Oohama, "Relay channels with confidential messages," IEEE Trans. Information Theory, to be published.
    • IEEE Trans. Information Theory
    • Oohama, Y.1
  • 54
    • 51649104090 scopus 로고    scopus 로고
    • L. Lai and H. El Gamal, Cooperative secrecy: The relay-eaves-dropper channel, in Proc. IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007, pp. 931-935, The extended journal version The relay-eavesdropper channel: Cooperation for secrecy, was submitted for publication in IEEE Trans. Inf. Theory..
    • L. Lai and H. El Gamal, "Cooperative secrecy: The relay-eaves-dropper channel," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007, pp. 931-935, The extended journal version "The relay-eavesdropper channel: Cooperation for secrecy," was submitted for publication in IEEE Trans. Inf. Theory..
  • 56
    • 45249083184 scopus 로고    scopus 로고
    • Secure communication with a relay helping the wiretapper
    • Lake Tahoe, CA, Sep
    • M. Yuksel and E. Erkip, "Secure communication with a relay helping the wiretapper," in Proc. IEEE Information Theory Workshop (ITW , Lake Tahoe, CA, Sep. 2007, pp. 595-600.
    • (2007) Proc. IEEE Information Theory Workshop (ITW , pp. 595-600
    • Yuksel, M.1    Erkip, E.2
  • 57
    • 84940652489 scopus 로고    scopus 로고
    • Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdú, Cognitive interference channels with confidential messages, in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 1-6.
    • Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdú, "Cognitive interference channels with confidential messages," in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 1-6.
  • 58
    • 0003179124 scopus 로고
    • Capacity of the product and sum of two unmatched broadcast channels
    • Jan, Mar
    • A. A. El Gamal, "Capacity of the product and sum of two unmatched broadcast channels," Probl. Inf. Transm., vol. 16, no. 1, pp. 1-16, Jan. -Mar. 1980.
    • (1980) Probl. Inf. Transm , vol.16 , Issue.1 , pp. 1-16
    • El Gamal, A.A.1
  • 60
    • 35148864632 scopus 로고    scopus 로고
    • Resource allocation for wireless fading relay channels: Max-min solution
    • Oct
    • Y. Liang, V. V. Veeravalli, and H. V. Poor, "Resource allocation for wireless fading relay channels: Max-min solution," IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3432-3453, Oct. 2007.
    • (2007) IEEE Trans. Inf. Theory , vol.53 , Issue.10 , pp. 3432-3453
    • Liang, Y.1    Veeravalli, V.V.2    Poor, H.V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.