메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Secure physical layer using dynamic permutations in cognitive OFDMA systems

Author keywords

Cognitive; Confidentiality; DSA; Eavesdropping; IEEE 802.16e; Security; Subcarriers permutation

Indexed keywords

COGNITIVE; CONFIDENTIALITY; DSA; EAVESDROPPING; IEEE 802.16E; SECURITY; SUBCARRIERS PERMUTATION;

EID: 70349682523     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VETECS.2009.5073843     Document Type: Conference Paper
Times cited : (7)

References (16)
  • 1
    • 13844296408 scopus 로고    scopus 로고
    • Cognitive radio: Brain-empowered wireless communications
    • February
    • S. Haykin, "Cognitive radio: brain-empowered wireless communications," in IEEE Journal on Selected Areas in Communications, vol. 23, February 2005, pp. 201-220.
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , pp. 201-220
    • Haykin, S.1
  • 3
    • 33846911348 scopus 로고    scopus 로고
    • Cognitive networks: Adaptation and learning to achieve end-to-end performance objectives
    • R. Thomas, D. Friend, L. Desilva, and A. Mackenzie, "Cognitive networks: adaptation and learning to achieve end-to-end performance objectives," IEEE Communications Magazine, vol. 44, no. 12, pp. 51-57, 2006.
    • (2006) IEEE Communications Magazine , vol.44 , Issue.12 , pp. 51-57
    • Thomas, R.1    Friend, D.2    Desilva, L.3    Mackenzie, A.4
  • 5
    • 33846641223 scopus 로고    scopus 로고
    • An experimental study of cross-layer security protocols in public access wireless networks
    • December
    • A. Agarwal, W. Wang, and J. McNair, "An experimental study of cross-layer security protocols in public access wireless networks," in IEEE Global Telecommunications Conference, vol. 3, December 2005.
    • (2005) IEEE Global Telecommunications Conference , vol.3
    • Agarwal, A.1    Wang, W.2    McNair, J.3
  • 7
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • December
    • M. Bellare, J. Kilian, and P. Rogaway, "The security of the cipher block chaining message authentication code," in Journal of Computer and System Sciences, vol. 61, no. 3, December 2000, pp. 362-399.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 10
    • 70349686422 scopus 로고    scopus 로고
    • Ofdm method and apparatus for protecting and authenticating wirelessly trasmitted digital information,
    • Patent US/0180315 Al, August 2005
    • P. R. Chitrapu, J. D. Kaewell, R. L. Olesen, S. H. Shin, J. E. Hoffmann, and R. D. Herschaft, "Ofdm method and apparatus for protecting and authenticating wirelessly trasmitted digital information," Patent US2005/0180315 Al, August 2005.
    • (2005)
    • Chitrapu, P.R.1    Kaewell, J.D.2    Olesen, R.L.3    Shin, S.H.4    Hoffmann, J.E.5    Herschaft, R.D.6
  • 11
    • 48649093110 scopus 로고    scopus 로고
    • D. Tseng and J. Chiu, An ofdm speech scrambler without residual intelligibility, in TENCON - IEEE Region 10 Conference, 2007, pp. l-4.
    • D. Tseng and J. Chiu, "An ofdm speech scrambler without residual intelligibility," in TENCON - IEEE Region 10 Conference, 2007, pp. l-4.
  • 12
    • 47949086128 scopus 로고    scopus 로고
    • Feature suppression for physical-layer security in ofdm systems
    • T. Yucek and H. Arslan, "Feature suppression for physical-layer security in ofdm systems," in IEEE Military Communications Conference, 2007, pp. 1-5.
    • (2007) IEEE Military Communications Conference , pp. 1-5
    • Yucek, T.1    Arslan, H.2
  • 14
  • 15
    • 1542438026 scopus 로고    scopus 로고
    • A novel family of frequency hopping sequences for multi-hop bluetooth networks
    • Nov
    • Z. Li, Y. Chang, and L. Jin, "A novel family of frequency hopping sequences for multi-hop bluetooth networks," Consumer Electronics, IEEE Transactions on, vol. 49, no. 4, pp. 1084-1089, Nov. 2003.
    • (2003) Consumer Electronics, IEEE Transactions on , vol.49 , Issue.4 , pp. 1084-1089
    • Li, Z.1    Chang, Y.2    Jin, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.