메뉴 건너뛰기




Volumn 7, Issue 6, 2008, Pages 2180-2189

Guaranteeing secrecy using artificial noise

Author keywords

Privacy; Secrecy capacity; Wireless

Indexed keywords

ARTIFICIAL NOISES; CHANNEL-STATE INFORMATION (CSI); MULTIPLE ANTENNA (MA); MULTIPLE TRANSMIT ANTENNAS; WIRELESS MEDIUM (WM);

EID: 45849133457     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2008.060848     Document Type: Article
Times cited : (1858)

References (21)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inform. Theory , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 3
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 4
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 5
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • Sept
    • R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. VTC Fall 2005, vol. 3, pp. 1906-1910, Sept. 2005.
    • (2005) Proc. VTC Fall 2005 , vol.3 , pp. 1906-1910
    • Negi, R.1    Goel, S.2
  • 6
    • 33847353721 scopus 로고    scopus 로고
    • Secret communication in presence of colluding eavesdroppers
    • Nov
    • S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. MILCOM, vol. 3, pp. 1501-1506, Nov. 2005.
    • (2005) Proc. MILCOM , vol.3 , pp. 1501-1506
    • Goel, S.1    Negi, R.2
  • 7
    • 0032022195 scopus 로고    scopus 로고
    • On limits of wireless communications in a fading environment when using multiple antennas
    • Kluwer Academic Press
    • G. J. Foschini and M. J. Gans, "On limits of wireless communications in a fading environment when using multiple antennas," Wireless Personal Commun.: Kluwer Academic Press, no. 6, pp. 311-335, 1998.
    • (1998) Wireless Personal Commun , Issue.6 , pp. 311-335
    • Foschini, G.J.1    Gans, M.J.2
  • 8
    • 33745490574 scopus 로고    scopus 로고
    • Space-time transmissions for wireless secret-key agreement with information-theoretic secrecy
    • June
    • X. Li, M. Chen, and E. P. Ratazzl "Space-time transmissions for wireless secret-key agreement with information-theoretic secrecy," in Proc. IEEE SPAWC 2005, pp. 811-815, June 2005.
    • (2005) Proc. IEEE SPAWC 2005 , pp. 811-815
    • Li, X.1    Chen, M.2    Ratazzl, E.P.3
  • 10
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec
    • A. E. Hero, "Secure space-time communication," IEEE Trans. Inform. Theory, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Trans. Inform. Theory , pp. 3235-3249
    • Hero, A.E.1
  • 11
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the Intrinsic conditional information
    • Mar
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the Intrinsic conditional information," IEEE Trans. Inform. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inform. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 12
    • 44049095075 scopus 로고    scopus 로고
    • Secret communication via multi-antenna transmission
    • Mar, Baltimore, MD
    • Z. Li, W. Trappe, and R. Yates, "Secret communication via multi-antenna transmission," in Proc. CISS '07, pp. 905-910, Mar. 2007, Baltimore, MD.
    • (2007) Proc. CISS '07 , pp. 905-910
    • Li, Z.1    Trappe, W.2    Yates, R.3
  • 13
    • 39049144353 scopus 로고    scopus 로고
    • Secrecy capacity of wireless channels, to appear In Proc
    • July
    • J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," to appear In Proc. ISIT 2006, July 2006.
    • (2006) ISIT 2006
    • Barros, J.1    Rodrigues, M.R.D.2
  • 15
    • 0004083131 scopus 로고    scopus 로고
    • Capacity of multi-antenna Gaussian channels
    • Nov
    • E. Telatar, "Capacity of multi-antenna Gaussian channels," Eur. Trans. Telecomm. ETT, vol. 10, no. 6, pp. 585-596, Nov. 1999.
    • (1999) Eur. Trans. Telecomm. ETT , vol.10 , Issue.6 , pp. 585-596
    • Telatar, E.1
  • 17
    • 4544234593 scopus 로고    scopus 로고
    • Multiple-antenna channel hardening and its implications for rate feedback and scheduling
    • Sept
    • B. M. Hochwald, T. L. Marzetta, and V. Tarokh, "Multiple-antenna channel hardening and its implications for rate feedback and scheduling," IEEE Trans. Inform. Theory, vol. 50, no. 9, pp. 1893-1909, Sept. 2004.
    • (2004) IEEE Trans. Inform. Theory , vol.50 , Issue.9 , pp. 1893-1909
    • Hochwald, B.M.1    Marzetta, T.L.2    Tarokh, V.3
  • 18
    • 0000602132 scopus 로고
    • On the empirical distribution of eigenvalues of a class of large dimensional random matrices
    • J. W. Silverstein and Z. D. Bai, "On the empirical distribution of eigenvalues of a class of large dimensional random matrices," J. Mult. Anal., vol. 54, pp. 175-192, 1995.
    • (1995) J. Mult. Anal , vol.54 , pp. 175-192
    • Silverstein, J.W.1    Bai, Z.D.2
  • 19
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Springer-Verlag
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: from weak to strong secrecy for free," Lecture Notes in Computer Science, vol. 1807, pp. 352-368, Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 352-368
    • Maurer, U.1    Wolf, S.2
  • 20
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    • Dec
    • J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
    • (2004) IEEE Trans. Inform. Theory , vol.50 , Issue.12 , pp. 3062-3080
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 21
    • 45849139220 scopus 로고    scopus 로고
    • Y. Liang, H. V. Poor, and S. Shamai, Secure communication over fading channels, submitted to IEEE Trans. Inform. Theory, Nov. 2006.
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," submitted to IEEE Trans. Inform. Theory, Nov. 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.