메뉴 건너뛰기




Volumn 29, Issue 10, 2011, Pages 2067-2076

Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks

Author keywords

Cooperative Jamming; Information Theoretic Security; Scaling Laws; Wireless Networks

Indexed keywords

ARTIFICIAL NOISE; CONTROL APPROACH; COOPERATIVE RELAY; HIGH PROBABILITY; INFORMATION-THEORETIC SECURITY; MESSAGE RECEPTION; MULTIUSER DIVERSITY; PATH LOSS; SECURE TRANSMISSION; TRANSMITTER AND RECEIVER;

EID: 82055177123     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2011.111216     Document Type: Article
Times cited : (99)

References (16)
  • 1
    • 77957820646 scopus 로고    scopus 로고
    • A comparative review of commercial vs. tactical wireless networks
    • October
    • G. Elmasry, "A comparative review of commercial vs. tactical wireless networks," IEEE Commun. Mag., Vol. 48: pp. 54-59, October 2010.
    • (2010) IEEE Commun. Mag. , vol.48 , pp. 54-59
    • Elmasry, G.1
  • 3
    • 82055167001 scopus 로고    scopus 로고
    • National Security Agency Central Security Service, Historical Publications (available via WWW)
    • R. Benson, "The Verona Story," National Security Agency Central Security Service, Historical Publications (available via WWW).
    • The Verona Story
    • Benson, R.1
  • 4
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: a case for cooperative jamming", IEEE GLOBECOM, 2008.
    • (2008) IEEE GLOBECOM
    • He, X.1    Yener, A.2
  • 7
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise", IEEE Trans. Wireless Commun., Vol. 7: pp. 2180-2189, 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 8
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • March
    • L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., Vol. 58: pp. 1875-1888, March 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.3    Poor, H.V.4
  • 9
    • 33747142749 scopus 로고    scopus 로고
    • The capacity of wireless networks
    • 2000
    • P. Gupta and P. Kumar, 2000, "The capacity of wireless networks", IEEE Trans. Inf. Theory, Vol. 46: pp. 388-404, 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , pp. 388-404
    • Gupta, P.1    Kumar, P.2
  • 10
    • 85053985067 scopus 로고    scopus 로고
    • Security versus capacity tradeoffs in large wireless networks using keyless secrecy
    • S. Vasudevan, D. Goeckel, and D. Towsley, "Security versus capacity tradeoffs in large wireless networks using keyless secrecy," ACM MobiHoc, 2010.
    • (2010) ACM MobiHoc
    • Vasudevan, S.1    Goeckel, D.2    Towsley, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.