메뉴 건너뛰기




Volumn 7, Issue 1 PART 2, 2012, Pages 125-138

Secure communication in stochastic wireless networks - Part I: Connectivity

Author keywords

Node degree; physical layer security; secure connectivity; stochastic geometry; wireless networks

Indexed keywords

CHANNEL-CODING TECHNIQUES; DIGITAL COMMUNICATIONS; LARGE-SCALE NETWORK; LOCAL CONNECTIVITY; MILITARY NETWORKS; NODE DEGREE; PHYSICAL-LAYER SECURITY; PROPAGATION CHANNELS; RANDOM GRAPHS; S-GRAPH; SECRET INFORMATION; SECURE COMMUNICATIONS; SECURE CONNECTIVITY; SPATIAL DENSITIES; STOCHASTIC GEOMETRY; WIRELESS PROPAGATION;

EID: 84855923041     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2165946     Document Type: Article
Times cited : (140)

References (40)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 29, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.29 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Korner, J.2
  • 4
    • 0017996501 scopus 로고
    • The Gaussian wire-tap channel
    • Jul.
    • S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.4 , pp. 451-456
    • Leung-Yan-Cheong, S.1    Hellman, M.2
  • 5
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec.
    • A. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero, A.1
  • 6
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • Dallas, TX, Sep.
    • R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Vehicular Technology Conf., Dallas, TX, Sep. 2005, vol. 3, pp. 1906-1910.
    • (2005) Proc. IEEE Vehicular Technology Conf. , vol.3 , pp. 1906-1910
    • Negi, R.1    Goel, S.2
  • 7
    • 70449503892 scopus 로고    scopus 로고
    • Secrecy capacity region of the gaussian multi-receiver wiretap channel
    • Seoul, Korea, Jun.
    • E. Ekrem and S. Ulukus, "Secrecy capacity region of the gaussian multi-receiver wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun. 2009, pp. 2612-2616.
    • (2009) Proc. IEEE Int. Symp. Inf. Theory , pp. 2612-2616
    • Ekrem, E.1    Ulukus, S.2
  • 8
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multipleantenna wiretap channel
    • Jun.
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 9
    • 70350706020 scopus 로고    scopus 로고
    • The capacity region of the degraded multiple-input multiple-output compound broadcast channel
    • Nov.
    • H.Weingarten, T. Liu, S. Shamai,Y. Steinberg, and P.Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.11 , pp. 5011-5023
    • Weingarten, H.1    Liu, T.2    Shamai, S.3    Steinberg, Y.4    Viswanath, P.5
  • 11
    • 33847353721 scopus 로고    scopus 로고
    • Secret communication in presence of colluding eavesdroppers
    • Oct.
    • S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. Military Commun. Conf., Oct. 2005, pp. 1501-1506.
    • (2005) Proc. Military Commun. Conf. , pp. 1501-1506
    • Goel, S.1    Negi, R.2
  • 12
    • 52349113391 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Toronto, ON, Jul.
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Jul. 2008, pp. 2217-2221.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory , pp. 2217-2221
    • Ekrem, E.1    Ulukus, S.2
  • 13
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • DOI 10.1109/ISIT.2005.1523727, 1523727, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2152-2155. (Pubitemid 44508426)
    • (2005) IEEE International Symposium on Information Theory - Proceedings , vol.2005 , pp. 2152-2155
    • Parada, P.1    Blahut, R.2
  • 17
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun.
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 18
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," Eurocrypt 2000, Lecture Notes in Computer Science, vol. 1807, p. 351, 2000.
    • (2000) Eurocrypt 2000, Lecture Notes in Computer Science , vol.1807 , pp. 351
    • Maurer, U.1    Wolf, S.2
  • 20
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 21
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 22
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and intrinsic conditional information
    • Mar.
    • U. M. Maurer and S.Wolf, "Unconditionally secure key agreement and intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 28
    • 52349086199 scopus 로고    scopus 로고
    • The secrecy graph and some of its properties
    • Toronto, Canada, Jul.
    • M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, Jul. 2008.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory
    • Haenggi, M.1
  • 29
    • 62949215603 scopus 로고    scopus 로고
    • Physical-layer security in stochastic wireless networks
    • Guangzhou, China, Nov.
    • P. C. Pinto, J. O. Barros, and M. Z. Win, "Physical-layer security in stochastic wireless networks," in Proc. IEEE Int. Conf. Commun. Systems, Guangzhou, China, Nov. 2008, pp. 974-979.
    • (2008) Proc. IEEE Int. Conf. Commun. Systems , pp. 974-979
    • Pinto, P.C.1    Barros, J.O.2    Win, M.Z.3
  • 30
    • 70449514137 scopus 로고    scopus 로고
    • Secrecy throughput of MANETs with malicious nodes
    • Jun.
    • Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," inProc. IEEEInt. Symp. Inf. Theory, Jun. 2009, pp. 1189-1193.
    • (2009) Proc. IEEEInt. Symp. Inf. Theory , pp. 1189-1193
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 32
    • 84855911932 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion
    • Feb.
    • P. C. Pinto, J. O. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, Feb. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1
    • Pinto, P.C.1    Barros, J.O.2    Win, M.Z.3
  • 34
    • 84055212368 scopus 로고    scopus 로고
    • The behavior of unbounded path-loss models and the effect of singularity on computed network characteristics
    • Sep.
    • H. Inaltekin, M. Chiang, H. V. Poor, and S. B.Wicker, "The behavior of unbounded path-loss models and the effect of singularity on computed network characteristics," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1078-1092, Sep. 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.7 , pp. 1078-1092
    • Inaltekin, H.1    Chiang, M.2    Poor, H.V.3    Wicker, S.B.4
  • 35
    • 0003523893 scopus 로고
    • London, U.K.: Oxford Univ. Press
    • J. Kingman, Poisson Processes. London, U.K.: Oxford Univ. Press, 1993.
    • (1993) Poisson Processes
    • Kingman, J.1
  • 38
    • 0000579421 scopus 로고
    • Randomsubdivisions of space into crystals
    • E. N. Gilbert, "Randomsubdivisions of space into crystals," Ann. Math. Statist., vol. 33, pp. 958-972, 1962.
    • (1962) Ann. Math. Statist. , vol.33 , pp. 958-972
    • Gilbert, E.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.