메뉴 건너뛰기




Volumn 6, Issue 3 PART 1, 2011, Pages 650-660

Physical-layer secret key agreement in two-way wireless relaying systems

Author keywords

Physical layer network coding; physical layer security; radio propagation; secret key agreement; two way relaying

Indexed keywords

AMPLIFY-AND-FORWARD; ARTIFICIAL NOISE; CHANNEL INFORMATION; FADING COEFFICIENTS; MULTIPLE ACCESS; PHYSICAL-LAYER NETWORK CODING; PHYSICAL-LAYER SECURITY; RICIAN FADING CHANNEL; SECRET KEY; SECRET KEY AGREEMENT; SIMULATION RESULT; TWO-WAY RELAYING; WIRELESS RELAYING;

EID: 80051749392     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2147314     Document Type: Article
Times cited : (75)

References (35)
  • 1
    • 79551648542 scopus 로고    scopus 로고
    • Secret key agreement based on radio propagation characteristics in two-way relaying systems
    • Miami, FL, Dec
    • T. Shimizu, H. Iwai, H. Sasaoka, and A. Paulraj, "Secret key agreement based on radio propagation characteristics in two-way relaying systems", in Proc. 2010 IEEE Global Commun. Conf. (GLOBECOM'10), Miami, FL, Dec. 2010, pp. 1-6.
    • (2010) Proc. 2010 IEEE Global Commun. Conf. (GLOBECOM'10) , pp. 1-6
    • Shimizu, T.1    Iwai, H.2    Sasaoka, H.3    Paulraj, A.4
  • 2
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems", Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 3
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 4
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 5
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 6
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing", IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 7
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • Jan
    • J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management", IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
    • (1995) IEEE Trans. Commun. , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.E.1    Hassan, A.A.2    Yarlagadda, R.3
  • 10
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • DOI 10.1109/TAP.2005.858853
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels", IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005. (Pubitemid 41748822)
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 11
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • DOI 10.1109/TIFS.2007.902666
    • R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in UWB channels", IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 16
    • 33947617858 scopus 로고    scopus 로고
    • Wireless network coding by amplify-and-forward for bi-directional traffic flows
    • DOI 10.1109/LCOMM.2007.061436
    • P. Popovski and H. Yomo, "Wireless network coding by amplify-andforward for bi-directional traffic flows", IEEE Commun. Lett., vol. 11, no. 1, pp. 16-18, Jan. 2007. (Pubitemid 46501839)
    • (2007) IEEE Communications Letters , vol.11 , Issue.1 , pp. 16-18
    • Popovski, P.1    Yomo, H.2
  • 17
    • 38549175070 scopus 로고    scopus 로고
    • Physical network coding in two-way wireless relay channels
    • DOI 10.1109/ICC.2007.121, 4288792, 2007 IEEE International Conference on Communications, ICC'07
    • P. Popovski and H. Yomo, "Physical network coding in two-way wireless relay channels", in Proc. 2007 IEEE Int. Conf. Commun. (ICC'07), Glasgow, Scotland, Jun. 2007, pp. 707-712. (Pubitemid 351145618)
    • (2007) IEEE International Conference on Communications , pp. 707-712
    • Popovski, P.1    Yomo, H.2
  • 18
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • Dallas, TX, Sep
    • R. Negi and S. Goel, "Secret communication using artificial noise", in Proc. 62nd IEEE Veh. Technol. Conf. (VTC-Fall'05), Dallas, TX, Sep. 2005, vol. 3, pp. 1906-1910.
    • (2005) Proc. 62nd IEEE Veh. Technol. Conf. (VTC-Fall'05) , vol.3 , pp. 1906-1910
    • Negi, R.1    Goel, S.2
  • 19
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise", IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 20
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • New Orleans, LA, Dec
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming", in Proc. 2008 IEEE Global Commun. Conf. (GLOBECOM'08), New Orleans, LA, Dec. 2008, pp. 1-5.
    • (2008) Proc. 2008 IEEE Global Commun. Conf. (GLOBECOM'08) , pp. 1-5
    • He, X.1    Yener, A.2
  • 21
    • 77956908999 scopus 로고    scopus 로고
    • Achieving secret communication for fast rayleigh fading channels
    • Sep
    • Z. Li, R. Yates, and W. Trappe, "Achieving secret communication for fast rayleigh fading channels", IEEE Trans. Wireless Commun., vol. 9, no. 9, pp. 2792-2799, Sep. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.9 , pp. 2792-2799
    • Li, Z.1    Yates, R.2    Trappe, W.3
  • 22
    • 49549125198 scopus 로고    scopus 로고
    • A network coding approach to secret key distribution
    • Sep
    • P. Oliveira and J. Barros, "A network coding approach to secret key distribution", IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 414-423, Sep. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.3 , pp. 414-423
    • Oliveira, P.1    Barros, J.2
  • 24
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditionalinformation
    • Mar
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditionalinformation", IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 25
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • DOI 10.1109/18.825796
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper", IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Aug. 2002. (Pubitemid 30582727)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 27
    • 70449463810 scopus 로고    scopus 로고
    • Secure communication with a byzantine relay
    • Seoul, Korea, Jul
    • X. He and A. Yener, "Secure communication with a byzantine relay", in Proc. 2009 IEEE Int. Symp. Inf. Theory (ISIT'09), Seoul, Korea, Jul. 2009, pp. 2096-2100.
    • (2009) Proc. 2009 IEEE Int. Symp. Inf. Theory (ISIT'09) , pp. 2096-2100
    • He, X.1    Yener, A.2
  • 28
    • 70350504645 scopus 로고    scopus 로고
    • Optimal channel estimation and training design for two-way relay networks
    • Oct
    • F. Gao, R. Zhang, and Y. C. Liang, "Optimal channel estimation and training design for two-way relay networks", IEEE Trans. Commun., vol. 57, no. 10, pp. 3024-3033, Oct. 2009.
    • (2009) IEEE Trans. Commun. , vol.57 , Issue.10 , pp. 3024-3033
    • Gao, F.1    Zhang, R.2    Liang, Y.C.3
  • 29
    • 78149429387 scopus 로고    scopus 로고
    • MIMO two-way amplify-and-forward relaying with imperfect receiver CSI
    • Nov
    • A. Y. Panah and R. W. Heath, "MIMO two-way amplify-and-forward relaying with imperfect receiver CSI", IEEE Trans. Veh. Technol., vol. 59, no. 9, pp. 4377-4387, Nov. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.9 , pp. 4377-4387
    • Panah, A.Y.1    Heath, R.W.2
  • 30
    • 78650372707 scopus 로고    scopus 로고
    • Relay selection with ANC and TDBC protocols in bidirectional relay networks
    • Dec
    • M. Ju and I.-M. Kim, "Relay selection with ANC and TDBC protocols in bidirectional relay networks", IEEE Trans. Commun., vol. 58, no. 12, pp. 3500-3511, Dec. 2010.
    • (2010) IEEE Trans. Commun. , vol.58 , Issue.12 , pp. 3500-3511
    • Ju, M.1    Kim, I.-M.2
  • 33
    • 79851480049 scopus 로고    scopus 로고
    • Performance analysis of antenna array calibration and its impact on beamforming: A survey
    • Beijing, China, Aug
    • C. Zhang, J. Ni, Y. Han, and G. Du, "Performance analysis of antenna array calibration and its impact on beamforming: A survey", in Proc. 5th Int. ICST Conf. Commun. Netw. in China (CHINACOM'10), Beijing, China, Aug. 2010, pp. 1-5.
    • (2010) Proc. 5th Int. ICST Conf. Commun. Netw. in China (CHINACOM'10) , pp. 1-5
    • Zhang, C.1    Ni, J.2    Han, Y.3    Du, G.4
  • 35
    • 39749164774 scopus 로고    scopus 로고
    • Estimating mutual information
    • Jun
    • A. Kraskov, H. Stögbauer, and P. Grassberger, "Estimating mutual information", Phys. Rev. E, vol. 69, no. 6, p. 066138, Jun. 2004.
    • (2004) Phys. Rev. E , vol.69 , Issue.6 , pp. 066138
    • Kraskov, A.1    Stögbauer, H.2    Grassberger, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.