메뉴 건너뛰기




Volumn 59, Issue 10, 2011, Pages 4871-4884

Cooperative jamming for secure communications in MIMO relay networks

Author keywords

Interference; jamming; physical layer security; relay networks; secrecy; wiretap channel

Indexed keywords

BEAMFORMERS; CLOSED FORM; DATA STREAM TRANSMISSION; DECODE-AND-FORWARD; GENERALIZED SINGULAR VALUE DECOMPOSITION; GEOMETRIC PROGRAMMING; JAMMING STRATEGIES; LINEAR PRECODING SCHEME; MIMO RELAY NETWORKS; MULTIPLE DATA STREAMS; OPTIMAL POWER ALLOCATION; PHYSICAL LAYER SECURITY; RELAY CHANNELS; RELAY NETWORK; RELAYING SCHEMES; SECRECY; SECURE COMMUNICATIONS; TWO-HOP RELAY NETWORKS; WIRETAP CHANNEL;

EID: 80052889357     PISSN: 1053587X     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSP.2011.2161295     Document Type: Article
Times cited : (333)

References (37)
  • 2
    • 0032164539 scopus 로고    scopus 로고
    • Cryptographic design vulnerabilities
    • B. Schneier, "Cryptographic design vulnerabilities," Comput., vol. 31, no. 9, pp. 29-33, Sep. 1998. (Pubitemid 128551914)
    • (1998) Computer , vol.31 , Issue.9 , pp. 29-33
    • Schneier, B.1
  • 4
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Jan.
    • A. D.Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 6
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • DOI 10.1109/ISIT.2005.1523727, 1523727, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. Int. Symp. Inf. Theory (ISIT), Sep. 2005, pp. 2152-2155. (Pubitemid 44508426)
    • (2005) IEEE International Symposium on Information Theory - Proceedings , vol.2005 , pp. 2152-2155
    • Parada, P.1    Blahut, R.2
  • 7
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 8
    • 51649110931 scopus 로고    scopus 로고
    • Achievable rates in Gaussian MISO channels with secrecy constraints
    • Jun.
    • S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 2466-2470.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 2466-2470
    • Shafiee, S.1    Ulukus, S.2
  • 9
    • 70449511650 scopus 로고    scopus 로고
    • An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
    • Jun.
    • R. Liu, R. Bustin, S. Shamai, and H. V. Poor, "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2009, pp. 2602-2606.
    • (2009) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 2602-2606
    • Liu, R.1    Bustin, R.2    Shamai, S.3    Poor, H.V.4
  • 11
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multipleantenna wiretap channel
    • Jun.
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 14
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 17
    • 51649095674 scopus 로고    scopus 로고
    • Capacity theorems for relay channels with confidential messages
    • Jun.
    • Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 926-930.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 926-930
    • Oohama, Y.1
  • 18
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 19
    • 76649123145 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 1-13, 2009.
    • (2009) EURASIP J. Wireless Commun. Netw. , vol.2009 , pp. 1-13
    • He, X.1    Yener, A.2
  • 20
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 21
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 25
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Jan.
    • A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 26
    • 45249083184 scopus 로고    scopus 로고
    • Secure communication with a relay helping the wire-tapper
    • Sep.
    • M. Yuksel and E. Erkip, "Secure communication with a relay helping the wire-tapper," in Proc. IEEE Inf. TheoryWorkshop (ITW), Sep. 2007, pp. 595-600.
    • (2007) Proc. IEEE Inf. TheoryWorkshop (ITW) , pp. 595-600
    • Yuksel, M.1    Erkip, E.2
  • 27
    • 0242302539 scopus 로고    scopus 로고
    • Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks
    • Oct.
    • J. N. Laneman and G. W.Wornell, "Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks," IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2415-2425, Oct. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.10 , pp. 2415-2425
    • Laneman, J.N.1    Wornell, G.W.2
  • 28
    • 29144473358 scopus 로고    scopus 로고
    • On the achievable diversity-multiplexing tradeoff in half-duplex cooperative channels
    • DOI 10.1109/TIT.2005.858920
    • K. Azarian, H. El Gamal, and P. Schniter, "On the achievable diversity- multiplexing tradeoff in half-duplex cooperative channels," IEEE Trans. Inf. Theory, vol. 51, no. 12, pp. 4152-4172, Dec. 2005. (Pubitemid 41800350)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.12 , pp. 4152-4172
    • Azarian, K.1    El Gamal, H.2    Schniter, P.3
  • 29
    • 79955465834 scopus 로고    scopus 로고
    • On ergodic secrecy rate for Gaussian MISO wiretap channels
    • Apr.
    • J. Li and A. P. Petropulu, "On ergodic secrecy rate for Gaussian MISO wiretap channels," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1176-1187, Apr. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.4 , pp. 1176-1187
    • Li, J.1    Petropulu, A.P.2
  • 30
    • 80052885871 scopus 로고    scopus 로고
    • MIMO wiretap channels with arbitrarily varying eavesdropper channel states Jul. [Online]. Available
    • X. He and A. Yener, "MIMO wiretap channels with arbitrarily varying eavesdropper channel states," Jul. 2010 [Online]. Available: http://arxiv.org/abs/1007.4801
    • (2010)
    • He, X.1    Yener, A.2
  • 31
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    • Dec.
    • J. N. Laneman, D. N. C. Tse, and G. W.Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3062-3080
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 33
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.