메뉴 건너뛰기




Volumn , Issue , 2011, Pages 306-315

Wireless secrecy in large-scale networks

Author keywords

connectivity; percolation; Physical layer security; secrecy capacity; stochastic geometry; wireless networks

Indexed keywords

CONNECTIVITY; PERCOLATION; PHYSICAL-LAYER SECURITY; SECRECY CAPACITY; STOCHASTIC GEOMETRY;

EID: 79955780857     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITA.2011.5743597     Document Type: Conference Paper
Times cited : (4)

References (49)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 29, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.29 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • October
    • A. D. Wyner, "The Wire-Tap Channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszár and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Korner, J.2
  • 4
    • 0017996501 scopus 로고
    • The gaussian wire-tap channel
    • July
    • S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.4 , pp. 451-456
    • Leung-Yan-Cheong, S.1    Hellman, M.2
  • 5
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec.
    • A. Hero, "Secure space-time communication," IEEE Transactions on Information, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Transactions on Information , vol.49 , Issue.12 , pp. 3235-3249
    • Hero, A.1
  • 6
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • Dallas TX Sept.
    • R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Vehicular Technology Conference, vol. 3, Dallas, TX, Sept. 2005, pp. 1906-1910.
    • (2005) Proc. IEEE Vehicular Technology Conference , vol.3 , pp. 1906-1910
    • Negi, R.1    Goel, S.2
  • 7
    • 70449503892 scopus 로고    scopus 로고
    • Secrecy capacity region of the gaussian multireceiver wiretap channel
    • Seoul Korea June
    • E. Ekrem and S. Ulukus, "Secrecy capacity region of the gaussian multireceiver wiretap channel," in Proc. IEEE Int. Symp. on Inf. Theory, Seoul, Korea, June 2009, pp. 2612-2616.
    • (2009) Proc.IEEE Int. Symp. on Inf. Theory , pp. 2612-2616
    • Ekrem, E.1    Ulukus, S.2
  • 8
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multipleantenna wiretap channel
    • June
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 9
    • 70350706020 scopus 로고    scopus 로고
    • The capacity region of the degraded multiple-input multiple-output compound broadcast channel
    • Nov.
    • H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.11 , pp. 5011-5023
    • Weingarten, H.1    Liu, T.2    Shamai, S.3    Steinberg, Y.4    Viswanath, P.5
  • 11
    • 33847353721 scopus 로고    scopus 로고
    • Secret communication in presence of colluding eavesdroppers
    • Oct
    • S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. Military Commun. Conf., Oct. 2005, pp. 1501- 1506.
    • (2005) Proc. Military Commun. Conf. , pp. 1501-1506
    • Goel, S.1    Negi, R.2
  • 12
    • 70449514539 scopus 로고    scopus 로고
    • Wireless physical-layer security: The case of colluding eavesdroppers
    • Seoul South Korea July
    • P. C. Pinto, J. O. Barros, and M. Z. Win, "Wireless physical-layer security: The case of colluding eavesdroppers," in Proc. IEEE Int. Symp. on Inf. Theory, Seoul, South Korea, July 2009, pp. 2442-2446.
    • (2009) Proc. IEEE Int. Symp. on Inf. Theory , pp. 2442-2446
    • Pinto, P.C.1    Barros, J.O.2    Win, M.Z.3
  • 13
    • 52349113391 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Toronto ON July
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, ON, July 2008, pp. 2217-2221.
    • (2008) Proc. IEEE Int. Symp. on Inf. Theory , pp. 2217-2221
    • Ekrem, E.1    Ulukus, S.2
  • 14
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • DOI 10.1109/ISIT.2005.1523727, 1523727, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. on Inf. Theory, Adelaide, Australia, Sept. 2005, pp. 2152-2155. (Pubitemid 44508426)
    • (2005) IEEE International Symposium on Information Theory - Proceedings , vol.2005 , pp. 2152-2155
    • Parada, P.1    Blahut, R.2
  • 18
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • June
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, pp. 2470-2492, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 19
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," Eurocrypt 2000, Lecture Notes in Computer Science, vol. 1807, pp. 351+, 2000.
    • (2000) Eurocrypt 2000 Lecture Notes in Computer Science , vol.1807 , pp. 351
    • Maurer, U.1    Wolf, S.2
  • 21
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 22
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 24
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and intrinsic conditional information
    • March
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, March 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 27
  • 30
    • 52349086199 scopus 로고    scopus 로고
    • The secrecy graph and some of its properties
    • Toronto Canada July
    • M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, Canada, July 2008.
    • (2008) Proc. IEEE Int. Symp. on Inf. Theory
    • Haenggi, M.1
  • 31
    • 62949215603 scopus 로고    scopus 로고
    • Physical-layer security in stochastic wireless networks
    • Guangzhou China Nov.
    • P. C. Pinto, J. O. Barros, and M. Z. Win, "Physical-layer security in stochastic wireless networks," in Proc. IEEE Int. Conf. on Commun. Systems, Guangzhou, China, Nov. 2008, pp. 974-979.
    • (2008) Proc. IEEE Int. Conf. on Commun. Systems , pp. 974-979
    • Pinto, P.C.1    Barros, J.O.2    Win, M.Z.3
  • 35
    • 78651282802 scopus 로고    scopus 로고
    • Continuum percolation in the intrinsically secure communications graph
    • Taichung Taiwan Oct.
    • P. C. Pinto and M. Z. Win, "Continuum percolation in the intrinsically secure communications graph," in Proc. IEEE Int. Symp. on Inf. Theory and Its Applications, Taichung, Taiwan, Oct. 2010, pp. 1-6.
    • (2010) Proc. IEEE Int. Symp. on Inf. Theory and Its Applications , pp. 1-6
    • Pinto, P.C.1    Win, M.Z.2
  • 36
    • 84055212368 scopus 로고    scopus 로고
    • The behavior of unbounded path-loss models and the effect of singularity on computed network characteristics
    • Sept.
    • H. Inaltekin, M. Chiang, H. V. Poor, and S. B. Wicker, "The behavior of unbounded path-loss models and the effect of singularity on computed network characteristics," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1078-1092, Sept. 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.7 , pp. 1078-1092
    • Inaltekin, H.1    Chiang, M.2    Poor, H.V.3    Wicker, S.B.4
  • 37
    • 62949241345 scopus 로고    scopus 로고
    • A mathematical theory of network interference and its applications
    • Feb. special issue on Ultra-Wide Bandwidth UWB Technology & Emerging Applications
    • M. Z. Win, P. C. Pinto, and L. A. Shepp, "A mathematical theory of network interference and its applications," Proc. IEEE, vol. 97, no. 2, pp. 205-230, Feb. 2009, special issue on Ultra-Wide Bandwidth (UWB) Technology & Emerging Applications.
    • (2009) Proc. IEEE , vol.97 , Issue.2 , pp. 205-230
    • Win, M.Z.1    Pinto, P.C.2    Shepp, L.A.3
  • 40
    • 79957978453 scopus 로고    scopus 로고
    • Stochastic geometry and random graphs for the analysis and design of wireless networks
    • M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.7 , pp. 1029-1046
    • Haenggi, M.1    Andrews, J.G.2    Baccelli, F.3    Dousse, O.4    Franceschetti, M.5
  • 42
    • 0000579421 scopus 로고
    • Random subdivisions of space into crystals
    • E. N. Gilbert, "Random subdivisions of space into crystals," Ann. Math. Statist., vol. 33, pp. 958-972, 1962.
    • (1962) Ann. Math. Statist. , vol.33 , pp. 958-972
    • Gilbert, E.N.1
  • 43
    • 79955750847 scopus 로고    scopus 로고
    • 200 000 000 random voronoi polygons
    • K. A. Brakke, "200,000,000 random Voronoi polygons," unpublished.
    • Unpublished
    • Brakke, K.A.1
  • 46
    • 0001012904 scopus 로고
    • On a continuum percolation model
    • M. D. Penrose, "On a continuum percolation model," Advances in Applied Probability, vol. 23, no. 3, pp. 536-556, 1991.
    • (1991) Advances in Applied Probability , vol.23 , Issue.3 , pp. 536-556
    • Penrose, M.D.1
  • 49
    • 79955774674 scopus 로고    scopus 로고
    • Full connectivity in the intrinsically secure communications graph
    • Kyoto Japan June to appear.
    • P. C. Pinto and M. Z. Win, "Full connectivity in the intrinsically secure communications graph," in Proc. IEEE Int. Conf. on Commun., Kyoto, Japan, June 2011, pp. 1-6, to appear.
    • (2011) Proc. IEEE Int. Conf. on Commun. , pp. 1-6
    • Pinto, P.C.1    Win, M.Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.